Webcast: The SOC Age Or, A Young SOC Analyst’s Illustrated Primer





Many people get started in security as a Security Operations Center (SOC) analyst. In this Black Hills Information Security (BHIS) webcast we discuss the core skills that a SOC analyst needs in order to be successful.

Trust us, these skills are more than just watching the SIEM and letting the SOAR platform handle everything through a AI powered single pane of glass.

Security has been and will continue to be, hard. This webcast will help people who are getting started be more successful and hopefully happier in their jobs.

I mean, we can’t make people happy. But, being good at one’s job is a good step in that direction. The rest is on you.

We also cover some techniques that can be used to help stop SOC burnout. Because that is a real thing….. It is a real thing that many SOC analysts go through. When they do, they often entertain dreams of getting out of security and buying a food truck.

Let’s help stop that. The world does not need another mediocre falafel truck powered by the crushed hopes and dreams of another infosec burnout.

Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/10/SLIDES_TheSOCAge.pdf

Join the BHIS Discord Community — https://discord.gg/aHHh3u5

“Pay What You Can” SOC Core Skills 16-Hour Training Course: https://wildwesthackinfest.com/online-training/soc-core-skills-john-strand/

0:00:00 – PreShow Banter™ – A Weird Flex

0:12:24 – FEATURE PRESENTATION: SOC Analyst Key Skills

0:16:53 – Server Analysis

0:20:13 – There’s A Guide For That

0:26:54 – Memory Forensics

0:34:16 – Egress Traffic Analysis

0:43:39 – Logs Are Better Than Bad, They’re a Train Wreck

0:48:40 – “False Positives”

0:52:16 – Endpoint Analysis

0:55:36 – Overlapping Fields of View

1:01:33 – Lateral Movement

1:06:07 – Vulnerability Management

1:09:58 – Things That Make You Go ARRRGHGHGHH!

1:13:42 – Sticking A Fork In This Thing

Referenced Links:

Windows Live Forensics

https://youtu.be/HcUMXxyYsnw

Investigating Malware Using Memory Forensics – A Practical Approach

https://youtu.be/BMFCdAGxVN4

Investigating Malware Using Memory Forensics

https://youtu.be/R6ZvEIyS_O4

Active Countermeasures

https://www.activecountermeasures.com/blog/

https://www.activecountermeasures.com/category/video-blog/

BHIS | Elk

https://www.blackhillsinfosec.com/tag/elk/

Let’s Talk About ELK Baby, Let’s Talk About You and AD

https://youtu.be/c0qOmu3pChc

Attack Tactics 7: The logs you are looking for

https://youtu.be/jL6Somex_58

BHIS | Rainy Day Windows

https://www.blackhillsinfosec.com/rainy-day-windows-command-research-results/

SANS Cheat Sheets

https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/

Live Forensics & Memory Analysis

https://youtu.be/fEip9gl2MTA

Linux Command Line Dojo II – Return of the Sensei

https://youtu.be/dtyX7XO-GSg



Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.

https://www.blackhillsinfosec.com/services/cyber-range/



Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.

Join 2,878 other subscribers