Soc Operations

What I've learned running a shift handoff

3 min read

A shift handoff looks simple. One analyst tells another what happened. The next analyst picks up where the last one left off. In practice, it’s one of the most failure-prone parts of SOC operations — not because the information doesn’t exist, but because it gets transferred in the wrong form.

In a multi-tenant MSSP, the problem is amplified. You’re handing off a mental model of a dozen or more tenants, each with its own alert baseline and its own open threads. The gap between the outgoing analyst’s context and the incoming analyst’s context is where incidents get dropped.

Here’s what I’ve found actually helps.

Don’t hand off an open alert without a running hypothesis

If an alert is open at shift change, the worst thing you can do is hand it off as “unworked.” The incoming analyst starts cold, reads the raw event data, and builds the same mental model you already built. You just doubled the work — while they’re also picking up everything else.

Even a rough hypothesis — “I think this is the scheduled scan job from SVC_SCANNER$, but I haven’t confirmed the process tree yet” — gives the incoming analyst a starting point. They can confirm or invalidate it quickly. That’s useful. An open alert with no context is just queued anxiety.

If you don’t have a hypothesis after working an alert for an hour, that’s worth documenting too. “I’ve checked X and Y, ruled out Z, still unclear on the source” is better than silence.

The handoff doc isn’t a ticket status dump

Ticket systems are for tracking work state. Handoff documents are for transferring situational awareness. These are different things.

A status dump — “Alert 4821: open. Alert 4822: closed FP. Alert 4823: escalated” — tells the incoming analyst what buttons were pressed. It doesn’t tell them what they’re walking into.

A useful handoff note sounds more like: “We had elevated brute-force activity against fabrikam.local domain controllers between 14:00 and 16:30. Volume dropped off, but the source IPs haven’t been blocked yet. If you see follow-on auth alerts from 192.168.4.x, treat them as related.” That’s context. That’s what allows the incoming analyst to connect the dots without starting over.

The discipline is writing the handoff for someone who wasn’t there — not for your own documentation of what you did.

Assume the incoming analyst is tired

This isn’t about capability. It’s about cognitive state. The person picking up your shift may be coming off a commute, may have had a rough previous day, may be covering for someone else. They’re not going to absorb a dense wall of text at shift start.

Write short. Use structure. Put the most important tenant situation first, not last. If there’s one thing that can’t be missed, say so explicitly: “Watch contoso.com — there’s an active investigation on a suspected compromised account, ticket #4831. Don’t close that alert chain without checking with the team lead.”

Clear handoffs aren’t about dumbing things down. They’re about respecting the cognitive cost of context-switching and making the first ten minutes of the incoming shift as efficient as possible.

Call out what you don’t know

This one’s harder, because it can feel like admitting failure. It isn’t.

If you spent two hours on something and still aren’t sure whether it’s malicious, say that. If a tenant’s data feed dropped for 45 minutes and you don’t have full visibility into that window, say that. The incoming analyst needs to know where the uncertainty is — otherwise they inherit the same gaps without knowing to look.

Shift leads who are always “confident” about everything are either working easy tenants or hiding gaps. Neither is useful to the team.


Handoffs take about ten minutes to do well. The cost of doing them poorly is measured in hours when something gets missed. The discipline is treating the incoming analyst as a peer who deserves real information — not a summary that makes the outgoing shift look tidy.