SOC Analyst – who are u?

Life of a SOC Analyst
Hackers and other adversaries don’t follow a specific schedule, and how much time you have to spend on an individual incident can depend on many factors.
Some of the incidents can handle quickly while some of them can be solved end be contained after days or even months.
While you will be required to ascertain the weaknesses of hardware, software, and network infrastructure and establish ways to protect it daily, the nature of information security means that each day may bring different situations, tasks, and challenges. When there is a threat or an attack, your team will likely work nonstop to expose the attack, shut down access to your systems, resolve the issue, work to prevent the same type of attack from happening in the future, and document and communicate appropriate information to management or clients.

Generally, analysts learn all the time, SOC analysts may have to be willing to work at odd hours, outside of the normal workday, to perform the necessary incident response to protect the digital assets of the organization. You can rest assured that as a SOC analyst, you will not experience boredom or repetition in your daily duties.
SOC Analyst’s Roles and Responsibilities
SOC analysts must stay up-to-date on the most current intelligence, including hackers’ practices and tactics, to anticipate and prevent security threats and breaches.

In addition to the above, as a SOC analyst, you will likely be required to:

• Provide threat analysis and security logs for security devices
• Analyze and respond to hardware and software weaknesses and vulnerabilities
• Investigate, document, and report security problems and emerging security trends
• Coordinate with other analysts and departments regarding the system and network security when needed
• Create, implement, and maintain security protocols and controls, including the protection of digital files and data against
unauthorized access
• Maintain data and monitor security access
• Perform risk analyses, vulnerability testing, and security assessments
• Perform security audits, internal and external
• Anticipate threats, incidents, and alerts to help prevent the likelihood of them occurring
• Manage network intrusion detection systems
• Analyze all security breaches to determine the root causes
• Make recommendations of countermeasures and install approved tools
• Coordinate security plans with relevant vendors
• Have some knowledge of the automation process and how to build them.
SOC Analyst Job Requirements

Each organization that is hiring a SOC analyst will have its own degree and work experience requirements for candidates. However, it’s most common for organizations to require that SOC analyst candidates have a bachelor’s degree in computer science or another relevant field, as well as at least one year of IT work experience.

Some of the other common requirements for SOC analyst positions are:

• Knowledge of all security policies
• Training or educating network users about security protocols
• Administration of network firewalls
• Troubleshooting and problem-solving skills
• Identification of security areas that can be improved, and the implementation of solutions to those areas
• Dependability and flexibility, being on-call or available outside of regular work hours

Some of the common technical knowledge requirements include:

• Security Information and Event Management (SIEM)
• SQL
• TCP/IP, computer networking, routing and switching
• C, C++, C#, Java or PHP programming languages
• IDS/IPS, penetration and vulnerability testing
• Firewall and intrusion detection/prevention protocols
• Windows, UNIX and Linux operating systems
• Network protocols and packet analysis tools
• Anti-virus and anti-malware
• Various certifications including Security+, CEH, GIAC, CASP, CISSP
• IOT / OT

Candidates for the SOC analyst position must have analytical skills, communication skills, and the desire to stay up-to-date on the latest technology. It’s also important that you are prepared to sift through huge amounts of information to identify threats or other security issues, and to be flexible and available at any time – because threats and attacks can happen at any time, day or night.