Blue Team Handbook: SOC, SIEM, and Threat Hunting (Practical Techniques for Security Operations and Threat Hunting Teams)
| Expected release date is Sep 29th 2026 |
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Overview
As cyberthreats become more sophisticated and alert volumes rise, security teams need more than just tools—they need strategy, structure, and field-tested guidance. Following the success of the original print edition, this updated edition of Blue Team Handbook: SOC, SIEM, and Threat Hunting is still the essential resource for building, optimizing, and managing modern detection engineering practices and security operations centers.
This practical guide distills over 20 years of frontline cybersecurity experience into an actionable playbook for analysts, SOC managers, architects, detection engineers, and threat hunters. Author Don Murdoch delivers expert insights designed to help teams improve quickly. Whether you're refining your current operations or launching a SOC from scratch, this book empowers you with proven, real-world techniques to defend against today's most persistent threats.
- Build and organize SOC teams for maximum operational impact
- Understand how to launch and execute a comprehensive telemetry, audit data, and SIEM deployment strategy
- Create effective SOC use cases, including risk-based alerting
- Develop and apply meaningful metrics to evaluate SOC effectiveness, analyst performance, and SIEM utility
- Identify advanced threats using real-world threat hunting techniques









