SOC Analyst
SOC Analyst
SOC Analyst
SKILLS FOR
SUCCESS
DEFENSIVE
Operating Systems CYBERSECURITY
WINDOWS / LINUX ANALYSIS / IDS & IPS / DLP /
SOC Analyst INCIDENT RESPONSE / SIEM /
Networking
CORE ANALYSIS
NETWORKING
COMMUNICATIONS
SKILLS PROTOTCOL ANALYSIS /
NETWORK EVENTS / ATTACK
ANALYSIS / MALWARE
DETECTION & RESPONSE /
OFFENSIVE INCIDENT RESPONSE
TECHNIQUES
OFFENSIVE TACTICS / CLOUD &
TECHNIQUES / PROCEDURES VIRTUALIZATION
CLOUD SECURITY /
VIRTUALIZATION /
CONTAINERIZATION
Let’s Explor e
The Core
Skills
OPERATING 1 Windows Users / Groups
SY STEMS Directories
Permissions
Services
An understanding of how to secure Windows and Linux
Directories
is important along with knowledge of what Operating
Permissions
System components are targeted by attackers.
Networking
Networks allow communications, so
SOC Analysts need to understand:
Protocols
RISK /
TECHNIQUES THREATS
IDENTIFY RISKS AND THREATS TO
THE METHODS AND ACTIONS
PROTECT
ATTACKERS USE TO EXECUTE
TACTICS
Know what to look for
and how to respond!
DEFENSIVE
CYBER S E C U R I T Y
DETECT
Analyze a RECOVER
nd Identif
Network a
nd Event
y Attacks
Through DEFEND Obtain
IDS / IPS Analysis: I
Create oCs
t tack:
SIEM P An A D
Updat etection R
T o STO e Conf ules
DLP A c t io n Restor igurat
FILE/URL A Take tacks e Data ions
nalyzers o c k A t Monito
ANTI-MAL Bl t ion s r
c
WARE STOP A Spread s
e ve n t g at ion
Pr t M iti
p le m en
Im
Analyze Network
Traffic Patterns To
Identify Suspicious
Behavior
ANALYSIS SKILLS Identify Malware To
Prevent Infections
Protocols Detection
Identify And Respond
Recognize Attacks to To Incidents And Stop
Alert and Respond Attacks
Attacks
Response
Cloud & Virtualization
MONITOR & PROTECT SERVICES IaaS PaaS SaaS
1 Understand How To Protect Cloud
Services
2 Monitor Cloud Service Access Infrastructure As A Service - IaaS: Enforce access
controls, patch, and implement network segmentation.
3 Secure Cloud Networks
Platform as a Service (PaaS): Use strict access controls,
encryption for data at rest and in transit, and monitor
4 Monitor Cloud Events logs.
Opera
ting
Syste
?
rking ms
wo
Net
Defens iv e
s ec urity
Cyber
Cloud &
ualization Do You Have The
Virt
Skills
Offensive
Needed For Success?
TTPs
NEW TO CYB E R S E C U R I T Y ?