Categories
Cyber Security SOC Analyst

SOC Analyst vs Penetration Tester: Which career path is the best?

Candidates who want to pursue a career in cyber security should have knowledge of the sub-branch of cyber security that they want to specialize in. In this article, we discuss penetration tester and SOC analyst, two important professions in the industry and explain what employees in both professions do, their daily work routines, what skillsRead More

Categories
Cyber Security SOC Analyst

The Best Tools for SOC Analysts

During the investigation, SOC analysts do a few things at the same time. For instance: checking IP reputation, malware analysis, looking log management etc. And for saving time, they use some security tools. We listed the best tools/services for security analysts can use during the job. Investigation Process Hacker Great tool for monitoring the systemRead More

Categories
Attacking Cyber Security News

How to Build Home Lab for Spring4Shell Exploit

Recently we heard an exploit about Spring4Shell like everyone else. We quickly built an incident on LetsDefend about it. Now, we are explaining how you can setup up a home lab yourself. Requirements: Vulnerable app Spring4Shell exploit Docker Stages: Build a vulnerable app Preparation for attack Exploitation By the way, we have already built anRead More

Categories
Cyber Security Detection SOC Analyst

Network Forensics: Log Sources

The network is a path to target systems for attackers. This path is divided into 2 sections: Paths inside the organization and the interface that faces outside the organization. Network connections between the devices facing the external interface of the institution and network connections of the devices within the institution are critical for attack detectionRead More

Categories
Cyber Security Detection SOC Analyst

Log Sources for Digital Forensics: Windows and Linux

SOC analysts obtain information on operating systems and analyze these logs in order to detect an attack and reveal the details about the attack. In this article, we will discuss which operating systems are encountered by SOC analysts and the logs that can be examined through these systems. Operating System Fundamentals for the Analyst WhenRead More

Categories
Cyber Security SOC Analyst

SOC Analyst Levels: Description, Requirements, Career

Who is a SOC Analyst? The security operations center (SOC) analyst is a cybersecurity expert responsible for monitoring and responding to threats to an organization’s IT infrastructure. Tier 1 SOC Analyst Core Task The main task of the Tier 1 SOC analyst is monitoring. He/she performs daily monitoring routines during working hours and examines alarmsRead More

Categories
SOC Analyst

SOC Analyst Career Without a Degree

In this article, we will talk about what SOC analyst is in general and what skills analyst candidates who want to improve themselves should have. Generally, there is a perception that being a university graduate has to get a degree. University education and having a degree are of course important in the career path. ButRead More

Categories
Cyber Security SOC Analyst

How to Prepare SOC Analyst Resume

University students may have difficulties in choosing which parts to highlight while preparing their resumes. In this article, we will talk about how a SOC analyst candidate should prepare his/her first resume. I have been working as a SOC analyst, SIEM engineer, and Incident Responder in an enterprise SOC structure environment. So, I have anRead More

Categories
Cyber Security

Red Team vs Blue Team: Learn the Difference

The concepts of Red Team and Blue Team are actually used in military training, and later on, cyber security has adopted these concepts. Red Team tries to take over the system by using the techniques and tactics of the adversaries. Blue Team, on the other hand, provides defense by taking the necessary actions against theseRead More

Categories
Detection Malware

How to Analyze RTF Template Injection Attacks

Proofpoint security researchers state that cyber attack groups have adopted a new technique called “RTF Template Injection” and reported that this technique has a low detection rate. It is also included in the report that phishing attacks were carried out on many institutions with the help of RTF Template Injection technique in 2021 by cyberRead More