Thinking about stepping up your cyber security game, gaining some new skills and exploring new career paths, but not sure what to do next?
Well, if you're either just starting out, or currently tackling cyber security challenges solo for a small company, then becoming a SOC analyst might just be your next big career move!
And I know what you’re thinking:
Don’t worry!
In this guide, I’ll answer all of these questions and more, as well as explain what a SOC is, how analysts fit into this (as well as other cyber security roles), why a SOC is crucial for modern large businesses, and more.
Now only that, but we’ll look at the specific skills needed for this role, as well as recommendations of where and how to learn them.
So grab a coffee and a notepad and let’s dive in!
In simple terms, a SOC analyst is a cyber security expert who works inside of a SOC or ‘Security Operations Center'.
The role can vary slightly depending on what level of analyst they are, but it can also vary based on the size of the company.
To explain it better, we need to look at how an SOC actually works, and the tasks inside of them, so let's get that first.
A Security Operations Center (SOC) is a centralized cybersecurity unit within a company, dedicated to addressing security issues at both an organizational and a technical level.
Their main goal is to perform continuous, 24/7, systematic monitoring and analysis of an organization's security posture to detect and respond to cybersecurity threats effectively.
Some of which are proactive, while other tasks are reactive.
As you can see, the SOC functions as a vital component of an organization's cybersecurity infrastructure, offering a focused and coordinated defense against cyber threats.
However, it’s probably a little different to what you might have experienced so far in your career, both in terms of team size and specific skills and roles, so let’s look at this in more detail.
In theory, there are 6 key roles within an SOC, with tiered levels to some of those roles.
However, the reality is that the structure and distribution of roles within an SOC can vary significantly based on the organization's size and available resources.
Some key roles typically found within a SOC include:
This role oversees the entire SOC operations, manages the team and resources, ensures performance and security goals are met, and collaborates with other organizational units on security issues.
These are the front-line professionals responsible for monitoring security systems, analyzing alerts, and detecting potential threats, and the goal of our guide.
We’ll cover them in more detail later (such as skills and salary, etc), but SOC analysts are often categorized into different levels based on their expertise:
There’s a few reasons for this tiered system, but basically it comes down to filtering of threats, and managing of human resources.
Initial sorting and handling of alerts by Level 1 analysts ensure that only the most serious threats are escalated to higher levels, allowing more experienced analysts to focus on critical and complex issues without being overwhelmed by routine tasks.
That said, it also means that level 1 analysts get a lot of experience with early threat analysis and management.
Important: There are 4 more roles inside of a SOC that we haven't covered yet.
From the initial overview of the 3 levels of SOC analyst, you might think these other roles are possibly redundant. However, there are some subtle differences, as well as depth of focus, hence why these are also dedicated roles.
Incident Responders are specialized in dealing specifically with confirmed cybersecurity incidents. Their main focus is on containment, eradication, and recovery, which requires a specific set of skills in incident management and crisis control, and restoring systems to normal operations.
While SOC analysts, especially at Level 2 and Level 3, may participate in some aspects of incident response, Incident Responders are dedicated to this phase and are trained to manage incidents from start to finish.
Threat Hunters proactively and continuously search for not yet identified threats that exist within the network. This role requires a proactive mindset and skills in advanced analytics, hypothesis creation, and deep knowledge of adversaries.
While Level 3 analysts may perform similar tasks as part of their role, Threat Hunters are solely focused on hunting, which involves more strategic and speculative searching than the typically reactive nature of SOC analyst duties.
Compliance Auditors focus on ensuring that the organization meets all external regulatory requirements and internal policies. This role involves a thorough understanding of laws and standards, conducting audits, and working closely with legal, regulatory, and compliance teams.
This role is separate from the daily operational focus of SOC analysts and involves more interaction with compliance frameworks and auditing processes, which are typically not part of the regular duties of SOC analysts.
Security Engineers are primarily responsible for the design, implementation, and maintenance of the security infrastructure. This includes the development and tuning of tools like firewalls, intrusion detection systems, and security software.
Unlike SOC analysts who use tools to monitor and respond to incidents, Security Engineers are focused on the technical development, configuration, and optimization of those tools.
Since the SOC analyst role is more of an entry-level to mid-level role (depending on tier classification and experience), it's a great place to start a career in Cyber Security.
It's also a great role for people wanting to be part of a more structured and larger scale cybersecurity team.
Bearing in mind that not every company will have a SOC, there are fewer roles available than broader cybersecurity positions. However, you will almost always be at a larger, more tech focused company.
With that out of the way, at the time of writing, there are currently 12,315 open SOC Analyst jobs available in the US.
Also, this is just what is available on a single job posting site, with many more options to search through.
This can vary based on factors like experience, location, organization size, and specific job responsibilities.
The average SOC analyst salary for those 12,000+ jobs posted on ZipRecruiter is around $99,000+ per year.
That being said, a large section of those roles are at around $125,000+, but this is for SOC analysts at Level 2 and 3.
Nope! While a degree in computer science, cybersecurity, or a related field is sometimes required for SOC analyst roles, most organizations will accept candidates based on a combination of education, certifications, and work experience instead.
Heck, here's a current SOC analyst job open at Google, and even they say that relevant similar experience is fine, instead of a degree:
However, if you don’t have a degree, you will need to show and prove relevant experience (from work and projects), as well as specific skills and certifications that prove you can do the job.
But people will degrees still have to have these things to prove their skills too.
So what skills do you need to show? Here are the most important ones.
That Google job posting gives hints at a lot of these, but here’s a little bit more information.
You need to understand network protocols (TCP/IP, HTTP, DNS, etc.) and network infrastructure components (routers, switches, firewalls, etc.).
You'll also need experience with operating systems, particularly Windows, Linux, and UNIX, as well as the command-line interfaces for these systems.
Knowledge of security principles, cybersecurity threats, attack techniques, and mitigation methods is vital.
You also need experience with security tools such as firewalls, antivirus software, intrusion detection systems (IDS), and intrusion prevention systems (IPS), as well as proficiency in Security Information and Event Management (SIEM) software.
You need to be able to write scripts to automate routine tasks and parse data.
Python is highly recommended for this, due to its ease of use and widespread support in cybersecurity tools.
Other useful programming languages might include PowerShell for Windows environments, Bash for UNIX/Linux, or even JavaScript for web-based threat analysis.
As you would probably have already guessed, you need strong problem-solving skills to identify, assess, and remediate security threats.
You also need an attention to detail to carefully monitor systems and spot out-of-the-ordinary behaviors, as well as the ability to analyze and interpret data from various sources to determine potential security breaches.
You need to be able to clearly communicate security risks and incidents to both technical and non-technical stakeholders. This isn't just verbal though, you also need some writing skills for effective report writing and documentation of incidents and procedures.
Because the SOC is a team, you need to be able to colloborate with other team members and departments.
The cybersecurity landscape is constantly evolving, so being able to learn and adapt to new threats and technologies is essential. You also need to want to learn about new tech and threats. Not everyone has this drive for continuous learning.
This is an entry-level certification that covers basic cybersecurity knowledge and best practices.
It helps to stay up-to-date with new threats and is a common ‘must have’ before you can be hired (certifications like this one are more important than a degree for most companies).
There are others certifications if you want to go for higher levels of SOC analyst though, such as:
So yeah, just a few things to learn! The good news is, if you’ve been doing some cybersecurity for a while now, you probably have some of these already.
Also, keep in mind that you don't need to be the very best in all of these areas. There are many requirements needed and recommended for a SOC analyst, but nobody expects you to be a master at all of them since that would be close to impossible.
That is why SOC analysts work in a SOC team that has other people who are good in different sets of skills.
But if you take the courses and complete the projects I recommend, you'll be proficient in the most important areas and will have the skills needed to get hired.
Realistically, you need to learn the skills I've outlined, prove that you have those skills, and then apply for jobs!
Let's recap the skills you need with specific resources:
They might seem like a lot, but these same skills will open up multiple cyber security career options, so the benefits just keep on compounding!
As you're learning these skills, make sure to do the included projects so you that you have something to put on your portfolio which you'll need when applying to jobs.
As you can see, the SOC analyst role is a great place to start a career in tech and is definitely a great entry point into the world of cybersecurity.
The pay is solid, and there’s definite room for growth - both in terms of roles and experience gained. Not only that, but by training for a role like this, you’ll also open up even more opportunities.
All that’s left to do now is to start learning!
All of the resources that I’ve mentioned in this guide, are all available with a ZTM membership, for a single monthly fee (with discount for annual or lifetime purchases).
This means that if you become a member, then you have access to all of these courses right away and will have everything you need in one place to learn for this role (and even other cybersecurity roles).
Plus, as part of your membership, you'll get to join me and 1,000s of other people (some who are alumni mentors and others who are taking the same courses that you will be) in the ZTM Discord.
Ask questions, help others, or just network with other cybersecurity experts and other tech professionals.
Make today the day you take a chance on YOU. There's no reason why you couldn't be applying for SOC Analyst jobs just 6-12 months from now if you just follow the steps I outlined and put in the hard work.