So, from a summary of what I have found on the internet, a SOC collects information and the CSIRT makes conclusions based on that info.
However, from what I see in labs/challenges websites like BlueTeam Labs Online, those lines aren't that defined since different challenges from both fields (Operations Center example: Log Analysis - Sysmon, IR example: Log Analysis - Compromised Wordpress) can ask you to do the same thing (the earlier two examples ask you to do some researching from the Logs) and their questions are a lot like what files... or what did the attacker use to....
Can anyone out there sharpen the line between SOC and CSIRT (at least from the perspective of these challenges)?