Many people get started in security as a Security Operations Center (SOC) analyst. In this Black Hills Information Security (BHIS) webcast we discuss the core skills that a SOC analyst needs in order to be successful.
Trust us, these skills are more than just watching the SIEM and letting the SOAR platform handle everything through a AI powered single pane of glass.
Security has been and will continue to be, hard. This webcast will help people who are getting started be more successful and hopefully happier in their jobs.
I mean, we can’t make people happy. But, being good at one’s job is a good step in that direction. The rest is on you.
We also cover some techniques that can be used to help stop SOC burnout. Because that is a real thing….. It is a real thing that many SOC analysts go through. When they do, they often entertain dreams of getting out of security and buying a food truck.
Let’s help stop that. The world does not need another mediocre falafel truck powered by the crushed hopes and dreams of another infosec burnout.
Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/10/SLIDES_TheSOCAge.pdf
Join the BHIS Discord Community — https://discord.gg/aHHh3u5
“Pay What You Can” SOC Core Skills 16-Hour Training Course: https://wildwesthackinfest.com/online-training/soc-core-skills-john-strand/
0:00:00 – PreShow Banter™ – A Weird Flex
0:12:24 – FEATURE PRESENTATION: SOC Analyst Key Skills
0:16:53 – Server Analysis
0:20:13 – There’s A Guide For That
0:26:54 – Memory Forensics
0:34:16 – Egress Traffic Analysis
0:43:39 – Logs Are Better Than Bad, They’re a Train Wreck
0:48:40 – “False Positives”
0:52:16 – Endpoint Analysis
0:55:36 – Overlapping Fields of View
1:01:33 – Lateral Movement
1:06:07 – Vulnerability Management
1:09:58 – Things That Make You Go ARRRGHGHGHH!
1:13:42 – Sticking A Fork In This Thing
Windows Live Forensics
Investigating Malware Using Memory Forensics – A Practical Approach
Investigating Malware Using Memory Forensics
BHIS | Elk
Let’s Talk About ELK Baby, Let’s Talk About You and AD
Attack Tactics 7: The logs you are looking for
BHIS | Rainy Day Windows
SANS Cheat Sheets
Live Forensics & Memory Analysis
Linux Command Line Dojo II – Return of the Sensei
Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.
Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.