Amazon Web Services is currently experiencing an outage that may impact your experience on the Cybrary application. We apologize for any inconvenience and will be monitoring this situation closely
https://app.cybrary.it/soc-analyst-level-2
career-paths
career-path
This Career Path is for a Security Operations Center Analyst (SOC Analyst). This particular Career Path covers a more intermediate-level SOC role. As a SOC Analyst, your primary duty is to ensure that the organization’s digital assets are secure and protected from unauthorized access. That means that you are responsible for protecting both online and on-premise infrastructures, monitoring data to identify suspicious activity, and identifying and mitigating risks before there is a breach. In the event that a breach does occur, a SOC analyst will be on the front line, working to counter the attack. This career path is aligned to the Cyber Defense Incident Responder NICE/NIST Work Role.
Start CourseNeed to train your team? Learn More
Create Free AccountNeed to train your team? Learn More
Create a free account to start exploring the platform.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
or sign up with
47
H
46
M
Time
intermediate
difficulty
ceu/cpe
Overview
What Are Some SOC Analyst Roles and Responsibilities?
In general, the role of the SOC analyst is to plan, monitor, and implement security measures to protect an organization’s computer systems, networks, and data. To do this, SOC analysts must stay up-to-date on the most current intelligence, including hackers’ practices and tactics, to anticipate and prevent security threats and breaches.
In addition to the above, as an SOC analyst, you will likely be required to:
What Are Some SOC Analyst Job Requirements?
Each organization that is hiring an SOC analyst will have its own degree and work experience requirements for candidates. However, it’s most common for organizations to require that SOC analyst candidates have a bachelor’s degree in computer science or another relevant field, as well as at least one year of IT work experience.
Some of the other common requirements for SOC analyst positions are:
Some of the common technical knowledge requirements include:
What is a Typical SOC Analyst Job Description?
As a security operations center analyst your primary duty is to ensure that the organization’s digital assets are secure and protected from unauthorized access. That means that you are responsible for protecting both online and on-premise infrastructures, monitoring metrics and data to identify suspicious activity, and identifying and mitigating risks before there is a breach. In the event that a breach does occur, an SOC analyst will be on the front line, working to counter the attack.
Additionally, SOC analysts must generate reporting for managers and IT administrators to evaluate the effectiveness of current security protocols. Then you will be responsible for making any necessary modifications to establish a more secure network. You may be required to create training programs and curriculum to educate the organization’s employees and network users on proper security policies and procedures.
Candidates for the SOC analyst position must have analytical skills, communication skills, and the desire to stay up-to-date on the latest technology. It’s also important that you are prepared to sift through huge amounts of information to identify threats or other security issues, and to be flexible and available at any time – because threats and attacks can happen at any time, day or night.
A Day in the Life of an SOC Analyst
As an SOC analyst, you will likely find that no two days are alike in a security operations center – hackers and other adversaries don’t follow a specific schedule, and how much time you have to spend on an individual incident can depend on many factors. You may be able to circumvent an attack quickly in some cases, while others much more time and attention.
While you will be required to ascertain the weaknesses of hardware, software, and network infrastructure and establish ways to protect it daily, the nature of information security means that each day may bring different situations, tasks, and challenges. When there is a threat or an attack, your team will likely work nonstop to expose the attack, shut down access to your systems, resolve the issue, work to prevent the same type of attack from happening in the future, and document and communicate appropriate information to management or clients.
SOC analysts may have to be willing to work at odd hours, outside of the normal workday, to perform the necessary incident response to protect the digital assets of the organization. You can rest assured that as an SOC analyst, you will not experience boredom or repetition in your daily duties.
Frequently Asked Questions
No items found.
How Long Will It Take To Be Job Ready?
If you can dedicate
hours per week, you can be certified in just...
2 months
What Will I Learn?
Foundations
Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
Defensive Security
Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
Engineering and Operations
Focused on building and operating information systems.
Governance, Risk, and Compliance
Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
Leadership and Management
Focused on program design and oversight. Covers project and program management.
Offensive Security
Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
Offensive Security
Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
Instructors
No items found.
Course Outline
Course
Free
6
H:
17
M
7
CEUS
NMAP
The network mapper (NMAP) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal. This NMAP course offers the NMAP skills and commands needed to become a better network administrator, incident responder, or penetration tester. Learn NMAP fundamentals and even create personal hands-on labs.
Learn More & Enroll
Course
Free
8
H:
29
M
10
CEUS
Application of the MITRE ATT&CK Framework
This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.
Learn More & Enroll
Course
Free
4
H:
13
M
5
CEUS
Advanced Cyber Threat Intelligence
Do you want to take your cyber threat intelligence skills to the next level so you can better protect your organization? Learn to leverage existing data sources, reduce false positives, and use models like the Cyber Kill Chain, and the MITRE ATT&CK framework to structure your analysis in this Advanced Cyber Threat Intelligence course.
Learn More & Enroll
Course
Free
7
H:
26
M
7
CEUS
Incident Response and Advanced Forensics
Need some incident response training on your path to becoming a network engineer or cyber defense analyst? This course will introduce you to incident response and prepare you to conduct forensic collections. Learn how to develop protection plans, dive into insider and malware threats, and commence incident recovery.
Learn More & Enroll
Course
Free
H:
52
M
1
CEUS
Incident Response Recovery
Incident Response Recovery covers the actual recovery process from an incident that was identified and managed. It goes over the proper documentation necessary after the incident is handled, the legal concerns associated with the incident, and the lessons learned.
Learn More & Enroll
Course
Free
17
H:
43
M
18
CEUS
Computer Hacking and Forensics
If you love the idea of doing digital forensics investigations to catch cybercriminals and want to earn your CHFI certification, this course is for you. Learn how to detect online criminal activity, gather evidence, and recover deleted data. Prepare for the EC Council’s CHFI certification and be ready to fill jobs that are in high demand.
Learn More & Enroll
No items found.
LAB
1
H:
M
CEUS
Perform a Network Vulnerability Assessment Using Nmap
The Network Vulnerability Assessment Using Nmap Advanced IT pro Challenge from Learn on Demand challenges students to perform a variety of network vulnerability scans in Ubuntu against hosts and machines. This requires the installation of Nmap, Apache2 packages, and configuring the Linux Uncomplicated Firewall(ufw) to block ICMP ping requests.
Learn More & Enroll
LAB
H:
45
M
CEUS
Identify Non-Secure Network Traffic
In this IT Pro Challenge virtual lab, you will get hands-on experience using Wireshark to sniff network traffic and detect non-secure protocols being used in the environment. You will investigate evidence of secured versus non-secure traffic. The skills you will learn in this lab are essential for network security analysts and penetration testers.
Learn More & Enroll
Words from our users
We're proud of our happy customers. Hear what our team customers have to say about their experiences with our courses.
I've been having concerns on how to start in terms of building my #cybercareer with a sustained path. So I got introduced to Cybrary and I was able to enroll and startup early last week and I have gone through two sessions, getting to know Cybrary and also a view of what cybersecurity is from their perspective. That gave me an overall view of what jobs are found in the space, their general responsibilities, required skills, necessary certifications and their average salary pay... Cybrary has given me a greater reason to pursue my hearts desire at all cost.
Jamal O.
Student
Thanks to Cybrary I'm now a more complete professional! Everyone in [the] cybersecurity area should consider enrollment in any Cybrary courses.
João S.
IT Administrator - CISSP
The interviewer said the certifications and training I had completed on my own time showed that I was a quick learner, and they gave me a job offer.
Justin B.
IT Specialist
Our partnership with Cybrary has given us the opportunity to provide world-class training materials at no cost to our clients, thanks to the funding we’ve received from the government. Cybrary offers a proven method for building a more skilled cybersecurity workforce.
Katie Adams
Senior Director
All of the knowledge, skills, and abilities gained through the program were essential to me impressing the employer during the interview.
Gabby H.
Senior Security Analyst
Cybrary is a one-stop-shop for my cybersecurity learning needs. Courses on vulnerability management, threat intelligence, and SIEM solutions were key for my early roles. As I grow into leadership roles influencing business policy, I’m confident Cybrary will continue developing the knowledge and skills I need to succeed.
No Name
Senior Cybersecurity Consultant and Virtual CISO
After tens of minutes, I proudly have achieved my certificate of continuing education for Intro to Infosec... Doing everything I can to avoid retaking the CISSP test! Thanks Cybrary - 1 CPE at a time!
Alex H.
We’ve had six students this summer, all with different schedules, so we’ve been trying to balance their learning experience with some practical work. It’s not like they’re all sitting in a classroom at the same time, so the ability for them to learn at their own pace without any additional support has probably been the biggest benefit of using Cybrary.
Collin Ricker
Business Development Manager
Just finished the third out of four MITRE ATT&CK Defender courses on Cybrary... If anyone is interested in learning how to do ATT&CK based SOC assessments I would definitely recommend this course. The best part is that it is FREE!
Eric T.
AWS Certified Cloud Practitioner
Excellent new series of courses from Cybrary, each course covers a different CVE, demonstrates vulnerability and its mitigation.
Raul C.
Cybersecurity Specialist
I've successfully completed the career path provided by Cybrary to become a SOC Analyst - Level 2. Eventually, do what you love, and do it well - that's much more meaningful than any metric.
Wissal Ayari
SOC Analyst
Cybrary is helping me proactively build skills and advance my career. Labs put concepts immediately into practice, reinforcing the content (and saving me time not having to spin up my own VM). Career paths lay everything out clearly, so I know what skills to prioritize.
No Name
Enterprise Analyst
I got a job as a cybersecurity analyst at Radware with a salary I've never even dreamed about AND with no prior experience.
Alexei Z.
Cybersecurity Analyst
Thank you to Cybrary for providing this opportunity to complete the Cybrary Orientation Certification program with such sleekness and detail-oriented learning.
Ganesh Y.
So far I have really been enjoying Cybrary's SOC Analyst Training, it has been very informative. I just finished up with the command line section and now I'm on to the more fun stuff (Malware Analysis). I think it's so dope that platforms like this exist. This is a game changer.
Tobias Castleberry
SOC Analyst, Security+ Certified
I decided to check out Cybrary and the courses they had to offer after seeing a few posts from people who had completed their courses. I'm happy to say that their instructors are knowledgeable and clear, and their course catalogues are extensive and offer relevant career path courses.
Nazli S.
AWS Certified Cloud Practitioner
Glad to have discovered Cybrary they are such a great tool to use to help diversify your knowledge through lessons, assessments and practices. All compact[ed] into highly detailed and informative chunks of information. Feeling very content with the results.
Temi B.
Cisco Certified Network Associate
Well, it took a long time, yet I struggled hard to complete the course "Become a SOC Analyst - Level 2" by Cybrary. Cybrary is the best platform that I have ever come across. Tons of virtual labs, great in-depth insights from the experts, and the best career path/learning modules.
Madiraju Pranay Kashyap
Programmar Analyst Trainee
I am currently working in a restaurant and going to school full time. But it is not stopping me from working on gaining more and more skills. I have already spent more than 30 hours on Become a SOC Analyst level 1 [with] Cybrary and still have 67 hours to go.
Abibou F.
SOC Analyst Level 1 Learner