Become a SOC Analyst - Level 2
Advance in your SOC Analyst Career Path, level 2 opens the door to Incident Response and Computer Hacking Forensics to protect your organization across their threat landscape.
Already a Tier 2 Analyst, Threat Analyst?
Check our Catalog and let us help sharpen your skills
This Career Path is for a Security Operations Center Analyst (SOC Analyst). This particular Career Path covers a more intermediate-level SOC role. As a SOC Analyst, your primary duty is to ensure that the organization’s digital assets are secure and protected from unauthorized access. That means that you are responsible for protecting both online and on-premise infrastructures, monitoring data to identify suspicious activity, and identifying and mitigating risks before there is a breach. In the event that a breach does occur, a SOC analyst will be on the front line, working to counter the attack. This career path is aligned to the Cyber Defense Incident Responder NICE/NIST Work Role.
Frequently Asked Questions
How Long Will It Take To Be Job Ready?
I can dedicate
hours per week
What Our Learners Are saying
"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing."
"I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary."
"The knowledge and skills I gained with Cybrary helped me to land my first IT role as a Digital Field Support Administrator. Knowing that I have the Cybrary community behind me has been helpful as I continue to learn and advance my career goals."
Average Salary via Payscale.com
What Will I Learn?
Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
Additional Skills You Will Gain
Cyber Threat Analysis