The Computer Security Incident Response Team (CSIRT) plays a pivotal role in managing critical security incidents and strengthening digital resilience. But how does a CSIRT function, and is it truly only deployed during cyberattacks?
December 2025, Text: Theophane Ngne Djoua, Image: Swisscom 10 Min.
In a world where connectivity is ubiquitous and cyberattacks are becoming increasingly sophisticated – amplified by the use of Artificial Intelligence – merely implementing preventive measures is no longer sufficient. Today, even the largest organizations are at risk. The question is no longer if an attack will occur, but when – and how well prepared you are.
his is precisely where the CSIRT (Computer Security Incident Response Team) comes into play. Often referred to as the “IT fire department” it is a central building block for a company's digital resilience. Working closely with the SOC (Security Operations Center) the CSIRT forms the last human and technical line of defence, mobilized during the most critical security incidents.
The CSIRT is a specialized team for handling IT security incidents. While the SOC acts as a control centre, monitoring infrastructure around the clock, detecting threats, and neutralizing them automatically, the CSIRT intervenes when attacks overcome standard defences or require in-depth analysis and expert intervention.
An incident usually starts with an alert from the SOC, which uses platforms like SIEM (Security Information and Event Management) or SOAR (Security Orchestration, Automation and Response) to collect, correlate, and analyse suspicious signals. The goal is to filter billions of log entries from various systems and identify unusual or malicious activities. If, for example, a complex attack is detected – such as malware in a suspicious document –, the SOC escalates the incident to the CSIRT specialists.
The CSIRT's work follows a globally recognized standard process based on a SANS Institute model, ensuring structured and rigorous crisis management:
Upon receiving an incident, the CSIRT analyst must act quickly to limit damage – isolate compromised devices, suspend affected accounts, etc. But the work doesn't end there: it's crucial to identify Indicators of Compromise (IoCs) to uncover the attacker's trail and ensure no backdoors remain. This involves analysing logs, network data, and suspicious files. Knowledge of attackers' TTPs (Tactics, Techniques and Procedures) provides a framework for the investigation and facilitates the detection of complex incidents. Every incident is a puzzle that must be solved under time pressure – with the utmost precision.
The CSIRT works closely with the SOC: The SOC processes alerts and hands over critical incidents to the CSIRT. Additionally, the CSIRT trains SOC analysts, develops new Detection Use Cases, and automates repetitive incident workflows using modern technologies such as EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), and SOAR.
The experience gained from such incidents strengthens detection and response capabilities, helps anticipate new attack patterns, and continuously optimizes tools, processes, and training. Proactive prevention and continuous improvement are crucial – as is teamwork.
The role of a CSIRT analyst requires technical expertise, versatility, and rapid responsiveness. A CSIRT not only provides support in containing attacks, restoring systems, and strengthening the security architecture – discreetly and professionally – but also offers preventive services such as assistance with:
These measures raise management awareness, test incident response processes, and uncover hidden threats. They are aimed at SMEs as well as large enterprises and increase the ability to react quickly and effectively to incidents. Because in today's threat landscape, no one is safe from cyberattacks.
In case of doubt or a confirmed incident: Don't wait if you need support! Contact our CSIRT – available 24/7. We will help you contain the attack, restore security, and guide you through all necessary steps.
Theophane Ngne Djoua is a DFIR Analyst (Digital Forensic and Incident Response) in the CSIRT for B2B customers at Swisscom.