Why Good SOC Analysts Know Offense & Defense
If you’re a SOC analyst or managing them, it’s important to know what factors build proficiency. The first is your mindset. Many SOC analysts spend a lot of time on the system administration and log monitoring. You’ve got to understand both offense and defense at a deep level to become proficient as a SOC analyst. Both drive each other. As a blue teamer, knowing proper exploitation methods helps you hunt threat actors on a network. As a red teamer, knowing how detection engineering works helps you design attacks that are much stealthier.
The second factor for SOC analysts is to build and train on a home lab. A home lab is like a gym for SOC analysts. Gyms help athletes become faster and stronger. Home labs help you become more proficient with both offensive and defensive tools. You don’t need many resources to build a home lab. A desktop tower with enough RAM and CPU lets you virtualize operating systems or network appliances like firewalls. If you’re on a budget, a few Raspberry Pi’s and your laptop, physically wired to a cheap switch, can be enough as well.
The third factor for successful SOC analysts is constant love for learning. Whether you’re a voracious reader or binge watcher, there're resources everywhere. Blog articles, tweets, books, podcasts, YouTube, can all guide you along the learning path. In many cases, they can be more valuable than an actual cyber security course! Good SOC analysts know how to track resources to stay organized or reference back to later. Simple tools like OneNote, Google Drive, and Bookmarks can all do the trick.
The road to mastery is long. But armed with these three pieces, it’s much more attainable than you think. Level Up.
FULL INTERVIEW: https://youtu.be/5oGQNu4CJL8
00:00 Building a Home Lab
01:30 Offensive and Defensive Toolkits
03:15 How to Keep Track of Tools & Resources
03:57 Red vs. Blue Mindsets
05:03 Are Cyber Security Certifications Valuable?
06:16 SOC Analyst Skills and Salaries
07:45 Interviewing for a Cyber Security Job
09:12 The Journey from Beginner to Pro
11:24 Tips as a Technical Leader
12:51 Security Advice for Your Mother
#SOCAnalyst #CyberSecurity #Cyberspatial
Видео Why Good SOC Analysts Know Offense & Defense канала Cyberspatial
The second factor for SOC analysts is to build and train on a home lab. A home lab is like a gym for SOC analysts. Gyms help athletes become faster and stronger. Home labs help you become more proficient with both offensive and defensive tools. You don’t need many resources to build a home lab. A desktop tower with enough RAM and CPU lets you virtualize operating systems or network appliances like firewalls. If you’re on a budget, a few Raspberry Pi’s and your laptop, physically wired to a cheap switch, can be enough as well.
The third factor for successful SOC analysts is constant love for learning. Whether you’re a voracious reader or binge watcher, there're resources everywhere. Blog articles, tweets, books, podcasts, YouTube, can all guide you along the learning path. In many cases, they can be more valuable than an actual cyber security course! Good SOC analysts know how to track resources to stay organized or reference back to later. Simple tools like OneNote, Google Drive, and Bookmarks can all do the trick.
The road to mastery is long. But armed with these three pieces, it’s much more attainable than you think. Level Up.
FULL INTERVIEW: https://youtu.be/5oGQNu4CJL8
00:00 Building a Home Lab
01:30 Offensive and Defensive Toolkits
03:15 How to Keep Track of Tools & Resources
03:57 Red vs. Blue Mindsets
05:03 Are Cyber Security Certifications Valuable?
06:16 SOC Analyst Skills and Salaries
07:45 Interviewing for a Cyber Security Job
09:12 The Journey from Beginner to Pro
11:24 Tips as a Technical Leader
12:51 Security Advice for Your Mother
#SOCAnalyst #CyberSecurity #Cyberspatial
Видео Why Good SOC Analysts Know Offense & Defense канала Cyberspatial
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![What Is the Future of Cyberspace? (w/ Roderick Jones)](https://i.ytimg.com/vi/sqXa29dnaPQ/default.jpg)
![How to Add and Remove Folders in Linux (rmdir, mkdir, pushd)](https://i.ytimg.com/vi/7YwYQAN33cA/default.jpg)
![CallStranger: Another UPnP Vulnerability (Overview)](https://i.ytimg.com/vi/jnZd4XBMDj0/default.jpg)
![How to Use Command-Line Reference Tools in Linux (apropos, which, whereis, whatis)](https://i.ytimg.com/vi/2f2C7QJrFuo/default.jpg)
![How to Navigate the Command Line in Linux (cd, ls)](https://i.ytimg.com/vi/5QQoKZamqpU/default.jpg)
![Life of a SOC Lead (w/ Alberto Rodriguez)](https://i.ytimg.com/vi/5oGQNu4CJL8/default.jpg)
![Cyber Defense Tips to Rival the NSA](https://i.ytimg.com/vi/FxjGktOwTQM/default.jpg)
![Is Coding Important for Cyber Security?](https://i.ytimg.com/vi/ID3_gbiXIUc/default.jpg)
![How I Turn Packet Captures Into Network Maps Instantly With Teleseer (Demo Tutorial)](https://i.ytimg.com/vi/at7ePLucQp4/default.jpg)
![How to Redirect Text Input/Output in Linux (cat, tee)](https://i.ytimg.com/vi/DwfncFCrkHc/default.jpg)
![Why Diceware is Best for Strong Passwords](https://i.ytimg.com/vi/Z15kFt00poQ/default.jpg)
![How to Copy, Move, Remove Files in Linux (mv, cp, rm)](https://i.ytimg.com/vi/QpV2qnakpOo/default.jpg)
![How North Korea Conducts Cyber Operations](https://i.ytimg.com/vi/KN1oWeGDfQA/default.jpg)
![How to Learn Cyber Security Faster In 5 Simple Steps](https://i.ytimg.com/vi/gpI6RUQ56Ek/default.jpg)
![4 Best Ways to Send Files to Yourself](https://i.ytimg.com/vi/53LebnPRI5w/default.jpg)
![Life of a DevSecOps Engineer (w/ Aras "Russ" Memisyazici)](https://i.ytimg.com/vi/1SL_sxsEB5o/default.jpg)
![Real Hacking: Learn The Cyber Kill Chain](https://i.ytimg.com/vi/oCUrkc_0tmw/default.jpg)
![Virtualbox Tutorial: How to Build Virtual Machines](https://i.ytimg.com/vi/lzRMYTf6X2o/default.jpg)
![RunCode: Practical Programming Challenges (w/ Josh Rykowski)](https://i.ytimg.com/vi/qV11RrkPTUI/default.jpg)
![Why You Need a DIFFERENT EMAIL Address for Every Account](https://i.ytimg.com/vi/RsrpL3lx9JE/default.jpg)