letsdefend.io Open in urlscan Pro
104.26.15.61  Public Scan

URL: https://letsdefend.io/blog/soc-analyst-career-without-a-degree/
Submission: On July 11 via manual from IL — Scanned from DE

Form analysis 4 forms found in the DOM

GET https://letsdefend.io/blog/

<form role="search" aria-label="Search for:" method="get" class="search-form" action="https://letsdefend.io/blog/">
  <label for="search-form-1">
    <span class="screen-reader-text"> Search for: </span>
    <input type="search" id="search-form-1" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

POST https://letsdefend.io/blog/wp-comments-post.php

<form action="https://letsdefend.io/blog/wp-comments-post.php" method="post" id="commentform" class="thin max-percentage" novalidate="">
  <p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message" aria-hidden="true">Required fields are marked <span class="required" aria-hidden="true">*</span></span></p>
  <p class="comment-form-comment"><label for="comment">Comment <span class="required" aria-hidden="true">*</span></label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required=""></textarea></p>
  <p class="comment-form-author"><label for="author">Name <span class="required" aria-hidden="true">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" required=""></p>
  <p class="comment-form-email"><label for="email">Email <span class="required" aria-hidden="true">*</span></label> <input id="email" name="email" type="email" value="" size="30" maxlength="100" aria-describedby="email-notes" required=""></p>
  <p class="comment-form-url"><label for="url">Website</label> <input id="url" name="url" type="url" value="" size="30" maxlength="200"></p>
  <p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
      I comment.</label></p>
  <p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="542" id="comment_post_ID">
    <input type="hidden" name="comment_parent" id="comment_parent" value="0">
  </p>
</form>

GET https://letsdefend.io/blog/

<form role="search" method="get" class="search-form" action="https://letsdefend.io/blog/">
  <label for="search-form-2">
    <span class="screen-reader-text"> Search for: </span>
    <input type="search" id="search-form-2" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Name: mc-embedded-subscribe-formPOST https://letsdefend.us14.list-manage.com/subscribe/post?u=74bda5edf824cea8aad36e707&id=b5b70df1e0

<form action="https://letsdefend.us14.list-manage.com/subscribe/post?u=74bda5edf824cea8aad36e707&amp;id=b5b70df1e0" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="validate" target="_blank" novalidate="">
  <div id="mc_embed_signup_scroll">
    <h2>Subscribe</h2>
    <div class="mc-field-group">
      <label for="mce-EMAIL">Email Address <span class="asterisk">*</span>
      </label>
      <input type="email" value="" name="EMAIL" class="required email" id="mce-EMAIL">
    </div>
    <div hidden="true"><input type="hidden" name="tags" value="7162497"></div>
    <div id="mce-responses" class="clear">
      <div class="response" id="mce-error-response" style="display:none"></div>
      <div class="response" id="mce-success-response" style="display:none"></div>
    </div> <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->
    <div style="position: absolute; left: -5000px;" aria-hidden="true"><input type="text" name="b_74bda5edf824cea8aad36e707_b5b70df1e0" tabindex="-1" value=""></div>
    <div class="clear"><input type="submit" value="Subscribe" name="subscribe" id="mc-embedded-subscribe" class="button"></div>
  </div>
</form>

Text Content

Skip to the content
LetsDefend Blue Team Blog
.cls-1{fill:%23313335}

Search for:
Close search

 * Home
   
 * Posts
   
 * SOC Analyst
   
 * SOC Analyst Career Without a Degree

Categories
SOC Analyst


SOC ANALYST CAREER WITHOUT A DEGREE

 * Post author .cls-1{fill:%23313335} By Admin
 * Post date .cls-1{fill:%23313335} February 14, 2022
 * No Comments on SOC Analyst Career Without a Degree



In this article, we will talk about what SOC analyst is in general and what
skills analyst candidates who want to improve themselves should have. Generally,
there is a perception that being a university graduate has to get a degree.
University education and having a degree are of course important in the career
path. But it is not a basic requirement to become a SOC analyst.

CLOSEContents
 * What is a SOC Analyst?
 * Basic Technical Skills that a SOC Analyst Should Have
   1. Operating Systems Knowledge
   2. Network Technologies Knowledge
   3. Basic Programming Knowledge
 * Topics to Highlight the Candidate
   1. Projects
   2. Events
   3. Certification
   4. Internship
   5. Blog
 * Final


WHAT IS A SOC ANALYST?

A security operations center (SOC) analyst is a cybersecurity professional
responsible for monitoring and combating threats to an organization’s IT
infrastructure. While performing his duties, the SOC analyst must have a good
grasp of some technical background knowledge related to the IT infrastructure.


BASIC TECHNICAL SKILLS THAT A SOC ANALYST SHOULD HAVE


OPERATING SYSTEMS KNOWLEDGE

Operating systems are system software running on corporate devices. Operating
system information plays an important role in detecting security breaches. The
analyst has to know what the records of the operating systems mean on the
screens he follows as these details of the operating system are examined for
anomaly detection and it is decided whether there is a security breach.
Depending on the type of operating system, this information may differ, but
mostly contains similar information.


NETWORK TECHNOLOGIES KNOWLEDGE

Examining the corporate inbound traffic coming from external sources is vital in
the detection of security violations. At the same time, it is necessary to
monitor the internal traffic to avoid anything unwanted. Therefore, it is
necessary to know the network technologies of the IT devices. Knowing which
network protocol is used and how, and determining when network-based security
breaches occur requires knowledge of network technologies. Devices that provide
or control the communication of network technologies are of particular
importance. For instance, knowing the task of the firewall device and knowing
the network protocols it supports are critical in attack detection.


BASIC PROGRAMMING KNOWLEDGE

SOC analysts use SIEM and various security software. These softwares are mostly
visual panels. Dashboards are especially important for rapid response to alarms.
In some extreme cases, the analyst may have to write specific rules or plug-ins
into these software. In this case, the analyst needs basic programming
knowledge. If the analyst candidate has basic programming knowledge, he or she
can make a more targeted attack detection than other analysts.


TOPICS TO HIGHLIGHT THE CANDIDATE


PROJECTS

Project studies are practical studies for SOC analyst candidates both
individually and in groups. The next stage of the candidates who have
theoretical knowledge is the project studies. There should not be much
requirements to be able to do project work. For example, having a computer
connected to the internet may be sufficient for the candidate. A research study
to assist SOC operating practices or the development of an application that can
be used for SOC would be good examples of such projects. The candidate analyst
can develop a stand-alone application from the scratch or an add-on to an
existing application. In addition, they can work in groups and contribute to
large projects. In both cases, the analyst candidate will sharpen his/her skills
and be visible within the world of the IT field.

If a candidate without hands-on experience develops projects on a technical
subject, this would make the candidate stand out and the hiring employer will
evaluate this positively as this will show that the candidate follows the
related technology, keeps himself/herself up-to-date, and uses this information
in practical work. Candidates with repetitive studies may have difficulty
putting themselves in the foreground.


EVENTS

Studies on SOC do not have a long history compared to the red team, so it
updates itself day by day. For SOC analysts, online or offline activities are
important to keep up-to-date information. In this field, where new information
is updated every day, the analyst needs to keep himself/herself updated with the
new technology in the field. It also ensures that from the employers’
perspective the candidates are well into the field, curious and determined to
learn more. Event participation may elevate the candidates in the job
interviews.

The role of the candidate in the events is also important. If a candidate is
present in an organization as an organizer, he or she will gain a better ground.
This is the ability to organize and manage. The candidate can benefit from this
experience later in his career. Analyst candidates may attend or organize
conferences, competitions, and workshops. Each event will have a positive impact
on the candidate’s resume. You can also check our “How to Prepare SOC Analyst
Resume” blog post.


CERTIFICATION

Certification is one of the preferred methods, especially to prove your
knowledge of certain SOC topics. With certification, candidates learn selected
sub-topics of education and improve themselves. If the candidate successfully
completes the exam at the end of the training, he/she gets a certificate. Even
though going through the certification process creates a financial and timely
burden on the candidate it is strongly recommended. Even though it is not
compulsory to have a job, having a certificate takes the person one step ahead
of other candidates. Some companies may place more emphasis on certifications.
In the applications made to these companies, the candidate stands out more.


INTERNSHIP

SOC analyst candidates have to develop themselves with real-life scenarios.
Realizing projects in virtual environments carries the analyst up to a point,
but going further and analyzing and observing cases in real terms starts with
internship processes. The candidate first gets the opportunity to see live and
large systems during the internship. In addition, there is an opportunity to
gain knowledge from experienced employees by watching them and working together
with them. Internship is a kind of opening the door of business life and making
yourself noticed. The analyst candidate who has had a successful internship
process is now ready for job interviews.


BLOG

An analyst blogging is beneficial for both himself and the security community.
With blog posts, the analyst puts what he has learned into writing and archives
it. They create technical notes for themselves or others that they can look back
on. In addition, he/she will have documentation that they can present in job
interviews. Candidates makes his name reach more people by announcing his name
on social media. This can sometimes lead to job offers through platforms such as
LinkedIn.


FINAL

College education and degree can be helpful to become a SOC analyst. But it is
not a requirement to be a SOC analyst. An analyst candidate who applies the
topics we have mentioned above and constantly improves himself can be a good
expert analyst in the future. In addition, he can test himself with real-life
scenarios on platforms such as LetsDefend and gain up-to-date application
practice.


Share on social media



 * Tags .cls-1{fill:%23313335} soc analyst career, without degree soc analyst

← How to Prepare SOC Analyst Resume → SOC Analyst Levels: Description,
Requirements, Career


LEAVE A REPLY CANCEL REPLY

Your email address will not be published. Required fields are marked *

Comment *

Name *

Email *

Website

Save my name, email, and website in this browser for the next time I comment.



Search for:


SUBSCRIBE

Email Address *






CATEGORIES

 * Attacking
 * Cyber Security
 * Detection
 * Incident Response
 * Malware
 * News
 * Phishing
 * Python
 * SIEM
 * SOC Analyst
 * Success Story
 * Writeup

 * 

Credence Powered by WordPress
↑ ↑