I built a home SOC lab on a $300 refurbished laptop. Realistically how much of this transfers to actual SOC work?
I’ve been quietly grinding on a home SOC lab and I'm getting to the point where I'm second-guessing whether any of this actually matters when you get hired into a real SOC. I currently have IT Support / Helpdesk experience for about 3 years.
What I built:
Refurb Dell Latitude 5400 (32GB RAM), VirtualBox, 3 main VMs plus a separate one for Wazuh:
Ubuntu SIEM running Elastic + Kibana + Fleet
Windows 10 victim with Sysmon (SwiftOnSecurity config) and the Elastic Agent
Kali attacker
Wazuh XDR running on its own Ubuntu VM (manager + indexer + dashboard)
Suricata IDS on the SIEM box with custom rules. Host-only networking between VMs, NAT adapter for internet.
What's actually working:
-Failed logon detection, admin group changes mapped to MITRE T1098, account creation mapped to T1136, suspicious PowerShell via Sysmon Event 1, FIM on Windows sensitive dirs, Security Configuration Assessment against CIS benchmark, vulnerability detection finding real CVEs on Windows.
-5 Kibana dashboards covering event volume, top event codes, parent-child processes, destination IPs, process activity.
-Documented every build session publicly on GitHub.
What I'm genuinely unsure about:
- The actual day-to-day in a real SOC — is it mostly tuning out alerts from one EDR (CrowdStrike, SentinelOne, Defender) and a SIEM (Splunk/Sentinel)? Because my lab has been mostly setup and detection engineering, not really high-volume triage practice.
- How transferable is this stack to a real production environment? Like will an interviewer see Elastic + Wazuh and think “useful foundation” or “none of this is what we use?”
- What would you add as the next phase if you were me? Right now I’m planning AD + Kerberoasting + BloodHound, then Splunk alongside Elastic. But open to better ideas.