What is a SOC analyst? Job description, salary, and certification (2024)

CSO spotlight: SOC analyst

Working as an analyst in a security operations center is a first infosec job for many, and can be a career path stepping stone.

By Josh Fruhlinger

Contributing writer, CSO |

What is a SOC analyst? Job description, salary, and certification (2)
Table of Contents
  • SOC analyst job description
  • SOC analyst career path
  • SOC analyst skills
  • SOC analyst certification and training
  • SOC analyst interview questions
  • SOC analyst jobs and SOC analyst salary

Show More

What is a SOC analyst?

A SOC analyst is a cybersecurity professional who works as part of a team to monitor and fight threats to an organization's IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements. The SOC in the job title stands for security operations center; this is the name for the team, which consists of multiple analysts and other security pros, and often works together in a single physical location. A SOC may be an internal team serving a single enterprise or an outsourced service providing security for one or more external clients.

SOC analyst is a job title held by infosec newbies and more experienced pros alike. The job can be a great stepping stone into a cybersecurity career, but it's also a demanding and somewhat repetitive job that can cause burnout. Let's take a close look at what the job entails and the skills you need to succeed.

SOC analyst job description

Perhaps the best way to understand what a SOC analyst does is to ask one! SOC analyst Molly Webber recently gave an interview to the Center for Internet Security in which she describes her day:

I assist state, local, tribal, and territorial (SLTT) governments in monitoring their networks for malicious activity. The job requires great attention to detail and a general awareness for all things cyber. We look at IDS (Intrusion Detection System) alerts, suspicious emails, network logs, and any other resource that provide insight into an entity’s network activity. Analysts are expected to be able to read, understand, and notify on cyber trends. It's critical that we have basic knowledge in areas like networking, malware analysis, incident response, and cyber etiquette.

The Prelude Institute describes SOC analysts as "watchdogs and security advisors," which is a good way to capture their dual roles: they both keep an eye out for attacks in progress and try to figure out ways to beef up defenses to prevent or mitigate future attacks. To that end, they need to install security tools, investigate the suspicious activities those tools detect, support audit and compliance initiatives, and participate in developing security strategies.

That said, the task that can dominate the job, particularly at the entry level, is dealing with alerts thrown up by users and various security software, which in practice can mean wading through a lot of false positives. Kelly Jackson Higgins, writing in Dark Reading, describes the job as "one of the least glamorous and most tedious information security gigs: sitting all day in front of a computer screen, manually clicking through the thousands of raw alerts generated by firewalls, IDS/IPS, SIEM, and endpoint protection tools, and either ignoring or escalating them," while enduring the "constant, gnawing fear of mistakenly dismissing that one alert tied to an actual attack." That sounds like a grind, but there's good news: she's describing the life of a Tier 1 SOC Analyst, and you probably won't stay at that level forever.

SOC analyst career path

The first step on this career path comes before you even get a job as a SOC analyst. The prerequisites aren't that different from any of the many other beginning security jobs that have "analyst" in the title. The key thing to remember is that, as Jonathan Gonzalez, Lead Member of Technical Staff at AT&T says in this interview, "There's no such thing as an entry-level job in cybersecurity." Most people work for at least a year or two in networking or some similar IT discipline before moving over to a security job.

That said, it's not unusual for a Tier 1 SOC Analyst gig to be your first stop in the journey of your cybersecurity career. While every employer will attach a slightly different set of duties to any given job title, in general there are three tiers of SOC analyst jobs. The EC-Council's blog has a detailed breakdown of the differences among those tiers, but to sum up:

  • Tier 1 SOC analysts are triage specialists who monitor, manage, and configure security tools, review incidents to assess their urgency, and escalate incidents if necessary.
  • Tier 2 SOC analysts are incident responders, remediating serious attacks escalated from Tier 1, assessing the scope of the attack and affected systems, and collecting data for further analysis.
  • Tier 3 SOC analysts are threat hunters, working proactively to seek out weaknesses and stealthy attackers, conducting penetration tests, and reviewing vulnerability assessments. Some Tier 3 analysts focus more on doing deep dives into datasets to understand what's happening during and after attacks.

And these tiers aren't the only jobs within a SOC. There are also SOC engineers, who are responsible for building and maintaining the systems that the analysts use, and at the top of the heap are SOC managers, who oversee the entire operation. Either of these roles are a potential place where SOC analysts might "graduate" to.

Beyond that, once you've honed your skills within a SOC, there are a number of other career possibilities for you. A post on the Microsoft Security blog discusses these issues in some depth, explaining that an analyst's post-SOC career could end up in "incident response, program management, security product engineering, or leadership tracks."

SOC analyst skills

The EC-Council describes the top-level skills a SOC analyst needs as follows:

  • Network defense
  • Ethical hacking
  • Incident response
  • Computer forensics
  • Reverse engineering

But what are the specific technical skills required? The EC-Council's breakdown of different analyst tiers we referenced above has some details: SOC analysts need to have an understanding of common security tools like intrusion detection systems and SIEM software. They'll need to have sysadmin skills on Windows, Macs, and Linux/Unix platforms. Upper-tier analysts will also need to know how to use penetration testing tools.

Much of the job of a SOC analyst revolves around digging into system logs to try to trace attacks and determine when and how systems were compromised. Since manually scrolling through logs is slow and will quickly drive an analyst mad, SOC analysts need skills to automate these kinds of tasks and extract useful data from logs. Tier 1 analysts will need to know how to write scripts that can find key patterns in large text files like system logs, whereas upper-level analysts will need to understand how data visualization tools can provide insights. Some programming knowledge is therefore a must.

SOC analyst certification and training

We've established that on-the-job experience from within IT is what you most need to get a SOC analyst job. But there are certifications out there that can signal your knowledge base to potential employers, and plenty of online education and training resources you can use to study up for them. In IDG Insider's Guide To Top Security Certifications, Neal Weinberg recommends Cisco Certified CyberOps Associate, a cert "designed for people who work as analysts in SOCs in large companies and organizations"; he says it "provides practical, relevant, and job-ready certification curricula aligned closely with specific, real-world tasks needed as an associate-level SOC professional." (The certification was formerly known as "Cisco CCNA Cyber Ops.") You can get training for the certification from the Cisco Learning Network.

The EC-Council has as cert of its own in this field — Certified SOC Analyst (CSA) — and also offers an iClass to help prepare you for it. A variety of other boot camps and training programs from third parties are also available, including from Training Camp and InfoSecTrain.

But SOC-specific certs aren't the only way to prove your worth: after all, SOC analysts mainly need to demonstrate the standard set of security skills, and there are plenty of certs to help you do so. In a Reddit thread where SOC pros chimed in on what certs were most helpful, CompTIA Security+ was one of the most frequently cited, as was the EC-Council's Certified Ethical Hacker.

SOC analyst interview questions

You can find endless lists of interview questions online for cybersecurity jobs, most of which rehash the basic factual areas of which you'll have to command mastery in order to impress an interviewer. This article on Cybrary has a decent explanation of what you should expect in a SOC analyst interview in particular, and, even better, some background on why certain questions will be asked and how you should respond beyond just regurgitating content. Our favorite piece of advice: "Competent analysts don’t use buzzwords. They demonstrate an in-depth understanding of each step, each mechanism and object as well as the authentication framework."

There are also two great Reddit threads (here and here) in which several hiring managers at SOCs chime in to talk about what sort of things they ask in an interview, and what the answers tell them about the job candidate.

SOC analyst jobs and SOC analyst salary

Has all this piqued your interest in working as a SOC analyst? Jobs are out there, and salaries are decent, though they do reflect the fact that SOC analysts are often in an entry-level position. It can be difficult to parse out SOC analyst salaries from the aggregated data on security analysts generally, but as of March 2020 Glassdoor estimated the average base pay at around $71,000 a year, with a range between $50,000 and $97,000. Good luck getting ready for that job, and we wish you the best in your fight against cyberfoes on the front lines!

Related:

  • Careers
  • Security
  • Network Security

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

Follow

Copyright © 2020 IDG Communications, Inc.

7 hot cybersecurity trends (and 2 going cold)

CSO spotlight: SOC analyst

Currently reading

SOC analyst job description, salary, and certification

Top 5 skills a SOC analyst needs

How can SOC analysts hunt more efficiently? By not hunting

What is a SOC analyst? Job description, salary, and certification (2024)

FAQs

What certifications do you need to be a SOC analyst? ›

Tier 2 SOC analyst

Most job announcements list desirable requirements, including a college degree or a combination of job experience and security and network certifications, including CySA+, CISSP, CISM, CISA, CEH and CCNA.

What are the responsibilities of SOC analyst? ›

Job duties of SOC analysts include: Threat and vulnerability analysis. Investigating, documenting, and reporting on any information security (InfoSec) issues as well as emerging trends. Analysis and response to previously unknown hardware and software vulnerabilities.

What is a Level 1 SOC analyst? ›

Level 1 SOC Analyst is an operational role, focusing on real time security event monitoring and security incident investigation. As a Level 1 SOC Analyst you will actively monitor security threats and risks involving customers' infrastructure.

What is a Level 3 SOC analyst? ›

Tier 3 SOC analysts are at the top of the analyst hierarchy. These highly experienced professionals employ their advanced skill sets to support Tier 2 analyst responses to complex security issues. Additionally, a Tier 3 analyst is a threat hunter.

How long does IT take to become a SOC analyst? ›

Cyber security analyst and Security Operations Center (SOC) analyst positions are entry-level cybersecurity jobs. These entry-level positions require 1-2 years of experience.

Can you be a SOC analyst without a degree? ›

University education and having a degree are of course important in the career path. But it is not a basic requirement to become a SOC analyst.

What does SOC mean in security? ›

The function of the security operations center (SOC) is to monitor, prevent, detect, investigate, and respond to cyber threats around the clock. SOC teams are charged with monitoring and protecting the organization's assets including intellectual property, personnel data, business systems, and brand integrity.

Who works in a SOC? ›

There are five key technical roles in a well-run SOC: incident responder, security investigator, advanced security analyst, SOC manager and security engineer/architect.

What does a junior SOC analyst do? ›

A junior SOC analyst is one of the primary entry-level roles within cybersecurity. SOC analysts are responsible for monitoring, investigating and reporting incidents from security information and event management (SIEM) systems.

Is SOC a good career? ›

The position of a SOC analyst is a beginner position designed for recruits in the field of information security. While this position is not one of prestige in the field, it still holds significance in the overall field of cybersecurity with some fairly significant responsibilities.

How do I start a SOC analyst? ›

Education Qualification to Be a SOC Analyst

To start your career in this domain, you should have a bachelor's degree in the field of computer science or other similar sectors. Further, you must also go through proper training from a well-reputed institute, gain certification, and become a Certified SOC Analyst (CSA).

Is being a SOC Analyst hard? ›

SOC analyst is a job title held by infosec newbies and more experienced pros alike. The job can be a great stepping stone into a cybersecurity career, but it's also a demanding and somewhat repetitive job that can cause burnout.

How is life of SOC analyst? ›

SOC analysts typically face an onslaught of security alerts every day. This can be security information and event management (SIEM) tools flagging alerts due to anomalies, correlation rules, or just regular alert configurations. The SOC analyst looks into each incident and ascertains the cause.

Do SOC analysts work from home? ›

Security Operations Center (SOC) Analyst I

Work location may be at the client site, headquarters, or may work from home.

What is a SOC position? ›

What is a Security Operations Center (SOC) Analyst? Similar to cybersecurity analysts, SOC analysts are the first responders to cyber incidents. They report cyber threats and then implement changes to protect an organization. Job duties include: Providing threat and vulnerability analysis.

What is the difference between SOC analyst and cyber security analyst? ›

Cyber Analyst and SOC Analyst are two different roles. As the Cyber Analyst works more along the risk and compliance side (more preventative) whereas the SOC Analyst works from more along the incident response side (more responsive).

What does a Tier 2 SOC analyst do? ›

The Tier 2 SOC analyst is responsible for the detailed investigation of the systems that raise alerts and those that are escalated by the Tier 1 SOC analyst.

Which certification is best for cyber security beginners? ›

Cybersecurity certifications for beginners include: Security+ GIAC Information Security Fundamentals (GISF) Systems Security Certified Practitioner (SSCP)

Does cyber security require math? ›

Does cybersecurity involve math? The short answer is yes. Cybersecurity is a technical field in computer science, and potential job seekers will need strong analytical skills. It isn't a math-intensive field—not like astrophysics or engineering—but it requires comfort using certain math types.

What qualifications do I need for cyber security? ›

In general, a cybersecurity engineer must have the following qualifications: Degree in Computer Science, IT, Systems Engineering, or a similar field. Two years of work experience in cyber security-related duties such as incident detection and response, and forensics.

Why is SOC needed? ›

Having a dedicated SOC provides an organization with multiple benefits, including continuous network monitoring, centralized visibility, reduced cybersecurity costs, and better collaboration. Cybercriminals will never take a break.

What services do a SOC provide? ›

SOCs provide critical support related to identifying, protecting, and remediating such dangers as malware, ransomware, breaches, insider threats/privilege misuse, supply chain attacks, phishing, denial of service attacks, cyber-espionage, etc.

How do you make a SOC? ›

Security Operations Center Success: MITRE's Advice
  1. Know what you are protecting and why.
  2. Give the SOC the authority to do its job.
  3. Build a SOC structure to match your organizational needs.
  4. Hire and grow quality staff.
  5. Prioritize incident response.
  6. Illuminate adversaries with cyber threat intelligence.
Mar 30, 2022

What is IT like working in a SOC? ›

Even without manufactured drama, working in a SOC can be quite exciting. Days are frequently whiled away with incident response and management. If you like being at the helm when difficult problems arise, then a SOC career may be awaiting you.

What is an SOC person? ›

A Definition of Security Operations Center

Security operations centers are typically staffed with security analysts and engineers as well as managers who oversee security operations. SOC staff work close with organizational incident response teams to ensure security issues are addressed quickly upon discovery.

How many types of SOCs are available? ›

There are four main types: SOC 1, SOC 2, SOC 3, and SOC for Cybersecurity, with subsets of each.

What skills do cyber security analysts need? ›

Cybersecurity analysts use a combination of technical and workplace skills to assess vulnerabilities and respond to security incidents.
...
10 cybersecurity technical skills
  • Scripting. ...
  • Controls and frameworks. ...
  • Intrusion detection. ...
  • Network security control. ...
  • Operating systems. ...
  • Incident response. ...
  • Cloud. ...
  • DevOps.
Jul 13, 2022

Who gets soc2 certification? ›

SOC 2 certification is issued by outside auditors. They assess the extent to which a vendor complies with one or more of the five trust principles based on the systems and processes in place. The security principle refers to protection of system resources against unauthorized access.

What CERT should I get after Security+? ›

After CompTIA Security+, cybersecurity professionals can go on to intermediate-level certifications like CompTIA Cybersecurity Analyst (CySA+) or CompTIA PenTest+. The CompTIA Cybersecurity Analyst (CySA+) certification tests your ability to use behavioral analytics in networks in order to improve overall IT security.

What is CompTIA Security+ salary? ›

Average pay after CompTIA Security+ certification

According to the Certification Magazine 2022 Salary Survey, the average salary of a Security+ certified professional is $115,170 in the U.S. and 106,910 worldwide.

Is the CySA+ worth IT? ›

The CySA+ Exam Is Not Overly Expensive

In actuality, the cost of the exam, in the long run, will be more than worth it if you decide to pursue a job in the Cybersecurity career field, considering the benefits that the certification can apply to your career.

How do I get my SOC certification? ›

To get a SOC 2, companies must create a compliant cybersecurity program and complete an audit with an AICPA-affiliated CPA. The auditor reviews and tests the cybersecurity controls to the SOC 2 standard, and writes a report documenting their findings.

How do I get my SOC 2 Type 2 certificate? ›

A 5 Step Guide to Getting SOC 2 Certified
  1. Step 1: Bring in Credible Outside Auditors. ...
  2. Step 2: Select Security Criteria for Auditing. ...
  3. Step 3: Building a Roadmap to SOC 2 Compliance. ...
  4. Step 4: The Formal Audit. ...
  5. Step 5: The Road Ahead — Certification and Re-Certification.
Oct 3, 2018

What are the two types of SOC 2? ›

SOC 2 Type 1 is different from Type 2 in that a Type 1 assesses the design of security processes at a specific point in time, while a Type 2 report (also commonly written as “Type ii”) assesses how effective those controls are over time by observing operations for six months.

What certification pays the most? ›

#1 AWS Certified Solutions Architect – Professional

This year, the AWS Certified Solutions Architect – Professional (not Associate) is the highest paying IT certification in 2022, according to the 2,500+ survey respondents.

What is the easiest security certification to get? ›

Answer: The easiest Security Certifications include:

CompTIA Security+ Microsoft Technology Associate (MTA) Security Fundamentals. CSX Cybersecurity Fundamentals Certificate. Systems Security Certified Practitioner (SSCP)

Which certification is best for Cyber security beginners? ›

Cybersecurity certifications for beginners include: Security+ GIAC Information Security Fundamentals (GISF) Systems Security Certified Practitioner (SSCP)

Is Security+ enough to get a job? ›

The CompTIA Security+ certification will help you break into the industry, but for most, it will only be the first step. This certification will get you in the door at companies, but higher-paying jobs will only be available as you add to your resume.

Is Security+ an entry-level? ›

The CompTIA Security+ certification validates that you have the core skills necessary for a career in IT security. For many aspiring cybersecurity professionals, earning this popular entry-level certification can be a first step toward a rewarding, in-demand career.

Is the CompTIA Security+ exam hard? ›

The Security+ exam is used to assess candidates' knowledge of basic security concepts and best practices. This is considered an entry-level exam but is not an easy test to pass.

Is CySA higher than Security+? ›

I Need to Renew My CompTIA Security+ Certification. If I Pass CompTIA CySA+ Will That Renew It? Yes, CompTIA CySA+ will renew CompTIA Security+, since it's considered a higher-level certification. Learn more about renewing with a higher-level certification in the CE section of our website.

Which is Better Security+ or CySA+? ›

If you already have a few years of cybersecurity experience under your belt but need to validate your hands-on skills, then the CySA+ could be a better choice for you. If you have no certifications in cybersecurity then the Sec+ should be your first port of call, followed by the CySA+.

What's next after CySA+? ›

CySA+ is an intermediate level certification; CASP+ is advanced-level. Both the CySA+ certification and the CASP+ are good for three years from the exam date.

Top Articles
Latest Posts
Article information

Author: Horacio Brakus JD

Last Updated:

Views: 5697

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Horacio Brakus JD

Birthday: 1999-08-21

Address: Apt. 524 43384 Minnie Prairie, South Edda, MA 62804

Phone: +5931039998219

Job: Sales Strategist

Hobby: Sculling, Kitesurfing, Orienteering, Painting, Computer programming, Creative writing, Scuba diving

Introduction: My name is Horacio Brakus JD, I am a lively, splendid, jolly, vivacious, vast, cheerful, agreeable person who loves writing and wants to share my knowledge and understanding with you.