🔏
RootGuard
HomeSOC OperationsIncident ResponseWindows ForensicsLinux ForensicsKQL Investigations
  • Welcome
    • RootGuard
      • Who Am I?
        • Professional Profile
  • Resources Hub
    • Blogs
      • Articles
        • Safeguarding SMEs: The Strategic Importance of a Security Operations Center (SOC)
      • Posts
        • Roadmap to Becoming a Cybersecurity Specialist
        • Starting a Career in Cybersecurity
        • A Guide to Landing Your First Cybersecurity Analyst Role
        • Moving from Intermediate to Expert Incident Responder
  • SOC Operations
    • Introduction
      • Development Resources
        • SOC Analysts Roadmap
        • Becoming A SOC Analyst
        • SOC Analysts Prep Interview Questions
    • Essential Skills
      • Critical Windows EventIDs to Monitor
    • Junior Analyst Skills
      • Splunk Use Cases
      • KQL Use Cases
        • Reconnaissance (TA0043)
        • Initial Access (TA0001)
        • Execution (TA0002)
        • Persistence (TA0003)
        • Privilege Escalation (TA0004)
        • Defence Evasion (TA0005)
        • Credential Access (TA0006)
        • Discovery (TA0007)
        • Lateral Movement (TA0008)
        • Collection (TA0009)
        • Command and Control (TA0011)
        • Exfiltration (TA0010)
        • Impact (TA0040)
      • Investigating Common Attacks
        • Domain Dominance Attacks - Detection & Analysis
        • Investigating a Suspected AD FS Distributed Key Management (DKM) Attack
        • Authentication From Suspicious DeviceName
        • Identifying Interactive or RemoteInteractive Session From Service Account
        • Identifying Split or Part Archive File Transfers
        • Detect Potential Cleartext Credentials in Command Line
        • Detecting Command Line Interpreters Launched via Scheduled Tasks
        • Detecting Files Containing Potentially Sensitive Data
        • Detecting DeviceNetworkEvents From Windows Processes and Domains by TLD
        • Detecting Silent cmd.exe Execution With Redirected STDERR & STDOUT
        • Detecting Low Prevalence DLL Loaded From Process In User Downloads Directory
        • Detecting Virtual Drive Mounted From Archive
        • Identify Execution of Script From User's Downloads Folder
        • Identify Potential RDP Tunneled Sessions
        • Identify Instances of PowerShell Invoke-WebRequest, IWR or Net.WebClient
        • Identify Processes Launched by PowerShell Remoting (WSMProvHost.exe)
        • Detect DeviceNetworkEvents for LOLBAS with Download or Upload Functions
        • Detect Execution of PSEXESVC via Remote Systems
        • Identify Suspicious String in Service Creation ImagePath
        • Identify File with Double Extensions
        • Detect Potential Cleartext Credentials in Commandline
        • Detect When Large Number of Files Downloaded From OneDrive or SharePoint
        • Identify and Investigate Phishing Attacks with KQL
      • PowerShell for SecOps
        • Powershell Remoting
        • Reconnaissance Discovery
        • Initial Access Discovery
        • Execution Discovery
        • Persistence Discovery
        • Privilege Escalation Discovery
        • Defence Evasion Discovery
        • Credential Access Discovery
        • Discovery
        • Lateral Movement Discovery
        • Collection Discovery
        • Command & Control (C2) Discovery
        • Exfiltration Discovery
        • Impact Discovery
      • Packet Analysis (pcap)
        • Tcpdump
        • Tcpdump (Intermediate)
        • Tshark
        • Ngrep
      • Investigating Suspicious Emails Using KQL
    • Intermediate and Advanced Skills
      • Investigate Using MITRE ATT&CK Methodology
        • Reconnaissance (TA0043) Techniques
        • Resource Development (TA0042) Techniques
        • Initial Access (TA0001) Techniques
        • Command Execution (TA0002) Techniques
        • Persistence (TA0003) Techniques
        • Privilege Escalation (TA0004) Techniques
        • Defence Evasion (TA0005) Techniques
        • Credential Access (TA0006) Techniques
        • Discovery (TA0007) Techniques
        • Lateral Movement (TA0008) Techniques
        • Collection (TA0009) Techniques
        • Command and Control (C2) (TA0011) Techniques
        • Exfiltration (TA0010) Techniques
        • Impact (TA0040) Techniques
    • Vulnerability Management
    • Malware Analysis
  • DFIR
    • Incident Response
      • Incident Triage
        • Triage Types and Processes
        • PowerShell for Detection and Analysis
          • Malware or Compromise Investigation
          • Lateral Movement Discovery
        • Registry Analysis
        • Sysinternals Intrusion Analysis
        • PowerShell Intrusion Analysis
        • Velociraptor Intrusion Analysis
        • Zimmerman Tools Intrusion Analysis
      • KAPE Artifacts Analysis
      • Velociraptor Artifacts Analysis
      • Using The Unified Kill Chain Model to Analyse Individual Cyber Attacks
        • Phase 1 - Gaining an Initial Foothold
          • Gaining Access to the Network
          • Establishing a Foothold
          • Network Discovery
      • Response Strategies
        • Privilege Escalation Assessment
        • Command and Control Assessment
        • Command Execution Assessment
        • Defence Evasion Assessment
        • Detection Assessment
        • Discovery Assessment
        • Exfiltration Assessment
        • Initial Access Assessment
        • Initial Impact Assessment Techniques
        • Lateral Movement Assessment
        • Persistence Assessment
    • Windows Forensics
      • Evidence of Execution
      • Window Artifact Analysis
        • Account Usage
        • User Activity Tracking (Event Logs)
        • Program Execution
        • File and Folder Opening
        • File Download
        • Browser Usage
        • Deleted File or File Knowledge
        • External Device & USB Usage
    • Linux Forensics
      • Linux Commandline Basics
      • Host Compromise Assessment
    • KQL for Defender & Sentinel
      • MDO (Office)
      • MDI (Identity)
      • MDE (Endpoint)
    • Memory Forensics
      • Memory Forensics (Volatility 3)
    • Playbooks
      • First Responder DFIR Playbook
        • Device Isolation
        • Evidence Collection
          • Acquire Triage Image Using KAPE
          • Acquire Triage Data Using Velociraptor
          • Acquire Triage Data Using Powershell
          • Acquire Triage Memory Image
          • Acquire Image Using FTK
          • AXIOM Cyber Data Collection
        • Windows Forensic Artefacts
          • Application Execution
          • File & Folder Knowledge
          • External Device Usage
          • Network Activity
          • Windows Event Logs
        • Initial Analysis
          • Memory Analysis (Vol 3)
          • Axiom Cyber Examiner
  • Detection Engineering
    • AD Attack Detections & Mitigations
      • Kerberoasting
      • Authentication Server Response (AS-REP) Roasting
      • Password Spraying
      • MachineAccountQuota Compromise
      • Unconstrained Delegation
      • Password in Group Policy Preferences (GPP) Compromise
      • Active Directory Certificate Services (AD CS) Compromise
      • Golden Certificate
      • DCSync
      • Dumping ntds.dit
      • Golden Ticket
      • Silver Ticket
      • Golden Security Assertion Markup Language (SAML)
      • Microsoft Entra Connect Compromise
      • One-way Domain Trust Bypass
      • Security Identifier (SID) History Compromise
      • Skeleton Key
      • Active Directory Security Controls
      • Active Directory Events for Detecting Compromise
    • Attack Triage Playbooks (KQL Triage)
      • Windows Malware Detection Playbook
      • Linux Host Intrusion Detection Playbook (CLI)
      • Linux Intrusion Detection Playbook
      • Large-Scale Compromise Detection Playbook
      • Ransomware Detection Playbook
      • Phishing Email Compromise Detection Playbook
      • Scam Detection Playbook
      • Customer Phishing Detection Playbook
      • Insider Abuse Detection Playbook
      • Information Leakage Detection Playbook
      • Social Engineering Detection Playbook
      • Malicious Network Behaviour Detection Playbook
      • Windows Intrusion Detection Playbook
      • Vulnerability Detection Playbook
      • Business Email Compromise Detection Playbook
    • Process Execution (KQL Triage)
    • Threat Hunting
      • Hunting Ransomware Indicators
      • Hunting With KQL
        • Detecting Malware Infection (MITRE ATT&CK: T1566, T1059)
        • Discovery Activities (MITRE ATT&CK: T1016, T1083, T1046)
        • Credential Theft (MITRE ATT&CK: T1003, T1078)
        • Lateral Movement (MITRE ATT&CK: T1076, T1021)
        • Data Theft (MITRE ATT&CK: T1041, T1071)
        • Detecting CommandLine Executions (MITRE ATT&CK: T1059)
        • Windows Security Logs (Identity and Logon Activities)
      • Hunting With Splunk
Powered by GitBook
On this page
  • Introduction
  • Step 1: Master the Basics of Cybersecurity
  • Step 2: Develop Technical Skills
  • Step 3: Obtain Certifications
  • Step 4: Gain Practical Experience
  • Step 5: Stay Updated
  • Step 6: Specialise and Plan Your Career Path
Edit on GitHub
  1. SOC Operations
  2. Introduction
  3. Development Resources

SOC Analysts Roadmap

PreviousDevelopment ResourcesNextBecoming A SOC Analyst

Last updated 4 months ago

Introduction

The demand for competent Security Operations Center (SOC) Analysts is high. This is partially driven by the rise in demand for Managed Detection and Response (MDR) services and organisations looking to improve and grow their in-house security teams. Whatever the source, competent SOC Analyst skills are in demand even with the growth of Artificial Intelligence (AI) capabilities.

While several blogs and articles have been written on cybersecurity development roadmaps and how to prepare and eventually get into a role, it is a constantly moving target that requires frequent updating. One of the main objectives of this site is to support junior and entry-level analysts already in the field and those looking to enter. The hope is that this roadmap becomes helpful to individuals for whom the pathway is less clear and who are finding it challenging knowing how or where to start.

Cybersecurity is an interesting and rewarding field, but like all other sectors, it has its challenges. Move forward and make your mark. All that's required to start is a positive attitude and the willingness to learn. There are plenty of freely available resources provided on this and other areas online, such as , to get you started.

Note: This section is not meant to be a doctoral thesis on everything required for a Security Analyst to prepare and ultimately land their dream job. Instead, it provides the baseline of information for the foundational requirement of the role. As a result, I will periodically reference other material or books that will allow you to dive deeper into particular topics to prevent the guide from becoming an overly long read.

Step 1: Master the Basics of Cybersecurity

Building a strong foundation is critical for aspiring SOC analysts. Start by acquiring knowledge in these key areas:

  • Computer Networking: Learn networking principles, including protocols, network design, and traffic analysis.

  • Computer Hardware Components: Understand how hardware functions and its role in IT infrastructure.

  • Operating Systems: Gain proficiency in Linux and Windows for a start, as SOC analysts often work across various platforms.

  • Network Topologies: Study how different network structures work and their impact on security.

  • Standard Ports: Learn the purpose of well-known ports (e.g., HTTP: 80, HTTPS: 443) and how they can be exploited.

  • IPv4 and IPv6: Understand IP addressing schemes and their relevance to modern networks. While both should be understood, IPv4 is still used in most organisations; learn it.

  • Subnetting Basics: Learn how subnets are used for network segmentation and identify key components (hosts, network, broadcast, etc.).

  • Cyberattacks and Cybercrimes: Study real-world examples to understand attack methods and motives. The is a good place to start.

  • Cryptography: Learn basic encryption methods and their application in securing data, especially Transport Layer Security (TLS), as this will impact your ability to analyse web-related content.

  • Security Standards: Familiarise yourself with frameworks like ISO, NIST, and CSF for structured security practices. If you are in the European Union (EU) or work for organisations in the EU, understanding NIS2 is essential.

  • DFIR Distros: Explore Linux distributions like SIFT Workstation, REMnux, CAINE, on the Windows side, Flare-VM, which are widely used in DFIR.

Note: Gain a solid understanding of the basis. Perseverance is crucial at this point, even though not everything will initially resonate.


Step 2: Develop Technical Skills

Note: Threats come in many forms. Therefore, SOC analysts must have the technical expertise to analyse and mitigate threats effectively.

Programming Skills:

  • Gain an understanding of languages like Python for scripting, Powershell, JavaScript, or a similar language for understanding web application vulnerabilities.

Operating Systems Expertise:

  • Gain deep knowledge of Linux and Windows. Linux provides excellent tools that are used on a day-to-day basis, and Windows is still the most popular OS used in organisations.

Cloud and Application Security:

  • Understand cloud security principles, such as securing AWS and Azure environments.

  • Learn application security concepts to identify and mitigate software vulnerabilities.

Tools

  • SIEM Solutions: Learn the basis of (Splunk, Sentinel, QRadar, LogRhythm, and The ELK Stack)

  • Endpoint Detection and Response (EDR) Solutions: Gain experience on any of the following or their open-source equivalent ( Microsoft Defender, CrowdStrikе and SentinelOne)

  • Network Forensics: (Wireshark, Tcpdump, Tshark, Ngrep, Zeek, Snort, NetworkMiner)


Step 3: Obtain Certifications

Certifications validate your skills and demonstrate your expertise to potential employers. Rightly or wrongly, without certifications, you might not even get to the interview stage; however, it's your knowledge and understanding of the foundational and core subjects that will land you the job. Certs get you the call from recruiters but don't necessarily get you the job, but improve your chances.

Choose certifications wisely for the stage you're at or want to reach in your career. Certs and their requirement are often challenging to maintain.

Beginner-Level Certifications:

  • CompTIA Network+: Covers networking concepts and practices.

  • CyberOps: Cisco Certified CyberOps Associate certification

  • CompTIA Security+: An essential credential for understanding general security practices.

  • SC-200: Microsoft Security Operations Analyst

  • CEH (Certified Ethical Hacker): For those interested in ethical hacking.

  • SOC-200: Foundational Security Operations and Defensive Analysis.

Intermediate to Advanced Certifications:

Note: These are certifications you'll likely target once you are employed. Hopefully, your employer will provide the training and certification budget.

  • TH-200: Foundational Threat Hunting

  • IR-200: Foundational Incident Response

  • CISSP (Certified Information Systems Security Professional): Covers comprehensive cybersecurity knowledge.

  • CCSP (Certified Cloud Security Professional): Focuses on cloud security expertise.

  • CHFI: Computer Hacking Forensic Investigator

  • ECIH: EC-Council Certified Incident Handler

  • CSIH: Certified Computer Security Incident Handler

  • GCIH: GIAC Certified Incident Handler

  • CySA+: CompTIA Cybersecurity Analyst


Step 4: Gain Practical Experience

Practical experience helps solidify theoretical knowledge and improves your employability.

Hands-On Practice:

  • Online Learning Platform:

    • Participate in Capture The Flag (CTF) challenges and other real-world security exercises.

  • Home Lab:

    • Below is a list of tools and distros I have in my home lab.

    • Tools to Supplement Your Learn:

Internships and Entry-Level Roles:

  • Apply for internships or junior roles in security analysis, IT support, or SOC operations. Anything that will get you some real-world experience.

Project Work:

  • Seek opportunities to work on security-related projects, such as new technology deployments or any security-related activities beneficial to your development.


Step 5: Stay Updated

Monitor what is happening in cybersecurity, such as emerging trends, data breaches, and tools and technologies. Cybersecurity is a dynamic field that is often a way of life rather than just a job.

Continuous Education:

  • Attend webinars and participate in workshops. Many free resources are available online; use them to your advantage.

  • Subscribe to threat feeds and podcasts to stay informed about emerging threats. Keep up-to-date on AI-driven attacks, quantum threats, and supply chain security issues. The given roles will sometimes help you strategise on areas to focus on.

Community Involvement:

  • Join cybersecurity forums, local meetups, or online communities to learn from peers and industry professionals.


Step 6: Specialise and Plan Your Career Path

Decide on a path that aligns with your interests and career goals. You are now looking to take that next step in your career development/progression.

Choose a Specialisation:

  • Options include network security, cloud security, incident response, threat hunting, compliance, and governance. While this is not a must, becoming a subject matter expert in any of these areas will set you apart and get you a bigger paycheck.

Career Progression:

  • Career progression will be different for each, as goals are often personal ambitions driven by different things. However, based on experience, people generally move into the managerial or specialist role, sometimes a combination of both, consultancy.

  • Otherwise, advance from SOC Analyst positions to Security Architect, Incident Response Lead, or Threat Intelligence Analyst.


While you'll have to create something suitable for your goals and objectives, following the suggested steps can build a strong foundation, gain valuable experience, and progress towards a successful career as a SOC analyst or similar. Stay curious, keep learning, and remain committed to your professional growth.

Digital Forensic and Incident Response (DFIR) Solutions: (Velociraptor, EZ Tools, Cyber Triage, Autopsy, SIFT Workstation, REMnux, Flare-vm, Volatility and Tsurugi Linux) Check out the list at .

Practice on platforms like: (, , or . Focus on the Blue Team tracks and subjects that provide lab activities to enhance your learning.

(Several installed)

(Several installed)

(Several installed)

(Several installed)

(Sample PCAP files available )

– A curated list of malware analysis tools and resources.

– A curated list of tools for incident response.

– A curated list of forensic analysis tools and resources.

- Resources targetted at Individuals looking to get into DFIR

site
YouTube
DFIR Report
DFIR Tools
Hack The Box
TryHackMe
Blue Team Labs
Oracle VirtualBox
Flare VM
DFIR/Malware Analysis tools
CSI Linux
OSINT/DFIR/Malware Analysis tools
Remnux
malware analysis tools
Tsurugi Linux
OSINT/DFIR/Malware Analysis tools
Autopsy
FTK Imager
Volatility
MemProcFS
Wireshark
here
Awesome Malware Analysis
Awesome Incident Response
Awesome Forensics
RootGuard
Page cover image