Webcast: The SOC Age Or, A Young SOC Analyst’s Illustrated Primer
Many people get started in security as a Security Operations Center (SOC) analyst. In this Black Hills Information Security (BHIS) webcast we discuss the core skills that a SOC analyst needs in order to be successful.
Trust us, these skills are more than just watching the SIEM and letting the SOAR platform handle everything through a AI powered single pane of glass.
Security has been and will continue to be, hard. This webcast will help people who are getting started be more successful and hopefully happier in their jobs.
I mean, we can’t make people happy. But, being good at one’s job is a good step in that direction. The rest is on you.
We also cover some techniques that can be used to help stop SOC burnout. Because that is a real thing….. It is a real thing that many SOC analysts go through. When they do, they often entertain dreams of getting out of security and buying a food truck.
Let’s help stop that. The world does not need another mediocre falafel truck powered by the crushed hopes and dreams of another infosec burnout.
Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/10/SLIDES_TheSOCAge.pdf
Join the BHIS Discord Community — https://discord.gg/aHHh3u5
“Pay What You Can” SOC Core Skills 16-Hour Training Course: https://wildwesthackinfest.com/online-training/soc-core-skills-john-strand/
0:00:00 – PreShow Banter™ – A Weird Flex
0:12:24 – FEATURE PRESENTATION: SOC Analyst Key Skills
0:16:53 – Server Analysis
0:20:13 – There’s A Guide For That
0:26:54 – Memory Forensics
0:34:16 – Egress Traffic Analysis
0:43:39 – Logs Are Better Than Bad, They’re a Train Wreck
0:48:40 – “False Positives”
0:52:16 – Endpoint Analysis
0:55:36 – Overlapping Fields of View
1:01:33 – Lateral Movement
1:06:07 – Vulnerability Management
1:09:58 – Things That Make You Go ARRRGHGHGHH!
1:13:42 – Sticking A Fork In This Thing
Referenced Links:
Windows Live Forensics
Investigating Malware Using Memory Forensics – A Practical Approach
Investigating Malware Using Memory Forensics
Active Countermeasures
https://www.activecountermeasures.com/blog/
https://www.activecountermeasures.com/category/video-blog/
BHIS | Elk
https://www.blackhillsinfosec.com/tag/elk/
Let’s Talk About ELK Baby, Let’s Talk About You and AD
Attack Tactics 7: The logs you are looking for
BHIS | Rainy Day Windows
https://www.blackhillsinfosec.com/rainy-day-windows-command-research-results/
SANS Cheat Sheets
https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/
Live Forensics & Memory Analysis
Linux Command Line Dojo II – Return of the Sensei
Want to level up your skills and learn more straight from John himself?
You can check out his classes below!
Active Defense & Cyber Deception
Available live/virtual and on-demand