EP 65: How to Best Prepare for a Role in the SOC

EP 65: How to Best Prepare for a Role in the SOC

Author: Kip Boyle March 4, 2022 Duration: 42:15

https://www.yourcyberpath.com/65

In this episode, we are focused on preparing for a role in a security operations center (SOC). To be effective in a SOC, you need to understand how everything works, including promotions, how to work with other people, the skills you need to be hired in the first place, and a good understanding of the tools to use to perform the job successfully.

When working for a security operations center, you usually need to be willing to work 24/7/365, since cybersecurity analysts often work on shifting schedules. After all, the bad actors out there don’t stop hacking just because it's 2am on a Saturday morning. If you’re a jobseeker, it is imperative to ask for the organization's staffing so that you can know what that schedule will look like. For example, you could find yourself working 8-hour or 12-hour shifts, and it could include holidays and weekends.

There are 5 skills and tools that you need to be able to do your job well - knowing how to read log analysis, packet analysis, how to use security information and event monitor, vulnerability scanning and patch management. In this lesson, we dive into each of these to give you the resources needed to learn these skills and be effective when working in a security operations center.

What You’ll Learn

●     What skills are needed to conduct log analysis

●     What full packet capture is

●     How to use a security information and event monitor system

●     Why cybersecurity organizations need vulnerability scanning and patch management

Relevant Websites For This Episode

●     www.YourCyberPath.com

Other Relevant Episodes

●     Episode 30 - Cybersecurity Job That Fits Like A Glove

●     Episode 31 - All The Jobs in A Large Cybersecurity Organization

●     Episode 37 - Security Operations Overview


Navigating a career in cybersecurity can feel like a maze without a clear map. Your Cyber Path: How to Get Your Dream Cybersecurity Job, hosted by Kip Boyle, cuts through the noise by focusing on the perspective of the people who actually make hiring decisions. This isn't just generic advice; it's a direct line to understanding what employers are truly looking for in candidates, from entry-level roles to advanced positions. Each episode delves into the practical, often unspoken, steps needed to build your skills, craft your resume, and ace interviews in this competitive field. You'll hear concrete strategies for bridging the gap between where you are now and that ideal job, all framed within the broader contexts of business, technology, and personal growth. Tune into this podcast for honest conversations that translate complex career pathways into actionable plans, helping you move forward with confidence. Whether you're considering a pivot or aiming to advance, the guidance here is rooted in real-world hiring dynamics, making it a valuable resource for anyone serious about building a future in cybersecurity.
Author: Language: English Episodes: 100

Your Cyber Path: How to Get Your Dream Cybersecurity Job
Podcast Episodes
EP 86: The CIA Triad - The Basis of Cybersecurity (Availability) [not-audio_url] [/not-audio_url]

Duration: 42:17
https://www.yourcyberpath.com/86/ In this episode, Kip and Jason discuss everything that makes the A in the CIA Triad, Availability. Availability is when you like to use a system and it's there ready for you to use, beca…
EP 85: The CIA triad - The Basis of Cyber Security (Integrity) [not-audio_url] [/not-audio_url]

Duration: 40:05
https://www.yourcyberpath.com/85/ In this episode, Kip and Jason discuss the second pillar of the CIA pentagram, Integrity. The whole idea of integrity is making sure any entity that you interact with has not been modifi…
EP 84: The CIA triad - The Basis of Cyber Security (Confidentiality) [not-audio_url] [/not-audio_url]

Duration: 28:53
https://www.yourcyberpath.com/84/ In this short episode, Jason and Kip discuss the first aspect of the CIA Triad which is Confidentiality. They break down the critically important confidentiality point and how it works i…
EP 82: From Truck Driver to Cybersecurity Analyst with Mike Hillman [not-audio_url] [/not-audio_url]

Duration: 36:04
https://www.yourcyberpath.com/82/ In this episode, we get to learn about our guest’s inspirational story as he went from truck driver to Cybersecurity Analyst in less than 15 months. Mike Hillman, former truck driver and…
EP 81: How to Negotiate a Pay Raise with Ed Skipka [not-audio_url] [/not-audio_url]

Duration: 46:54
https://www.yourcyberpath.com/81/ In this episode, we listen to Kip and Ed go over how Ed managed to get a 25% pay raise in a very short period of time and the whole details of his situation. Edward Skipka, a vulnerabili…
EP 80: Risk Management Framework with Drew Church [not-audio_url] [/not-audio_url]

Duration: 1:06:26
https://www.yourcyberpath.com/80/ In this episode, Kip and Jason, along with special guest Drew Church, take a closer look at the NIST risk management framework to help facilitate selecting the right kind of security for…
EP 79: Mid-Career Transition Success Story with Steve McMichael [not-audio_url] [/not-audio_url]

Duration: 40:56
https://www.yourcyberpath.com/79/ In this episode, Kip and Jason are joined by Steve McMichael who has rapidly climbed the cybersecurity career ladder. Within 2 years, Steve was able to move up to the position of Directo…
EP 77: Get Into the Talent Pipeline With Max Shuftan and Winnie Yung [not-audio_url] [/not-audio_url]

Duration: 40:11
https://www.yourcyberpath.com/podcast/77/ In this episode, Kip and Jason, with special guests Max Shuftan and Winnie Yung, talk about what a talent pipeline is and why hiring managers should be using a solid talent pipel…