In this post, I would like to share the CyberSecurity Experiences that I gained while exploring those fields such as SOC analyst, Forensic analyst, and Penetration Tester Resource.
SOC Analyst
I have experience working in one organization as a SOC analyst which surely a lot of people will think the job as monitoring traffic on website and system.
This type of job scope is depending on the organization itself but their operation is a shift between day and night. A qualification that requires a SOC Analyst or known as Security Analyst would be a Certified Ethical Hacker (CEH), and Certified SOC Analyst (CSA). Besides the certification, the most important in SOC Analyst resources would be the desire of learning cybersecurity.
It sounds easy and a nice job to start after graduation, right? But, the resource might be working in a rotate shift which will lead to some unexpected lifestyle.
For those are interested in how SOC analyst daily life will look like, the reader can see the video below:
Source: What does a Cyber Security Analyst do?
Another similar to SOC Analyst job would be Cyber ThreatIntelligence Analyst which you can see the daily life as follows:
Source: Day in the Life: cyber threat intelligence analyst
Cyber Forensic Analyst
Afterward, I have gain experience in another organization as a forensic analyst which opens my eye in a different aspect. While working as a forensic analyst, I do learn how to analyze the evidence of hard disk or any sensitive data.
The tools that been used while analyzing data in the forensic areas would be Autopsy, SleuthKit, FTK, and some more forensic tools. In this forensic area, the analyst will need to be careful of the data where the data can be corrupted from one minor mistake.
Source: Overview of Digital Forensics
Source: Cyber Forensics and Cyber Security: A Growing Industry
Penetration Tester
I have been working as Penetration Tester for a while and the experience I gain from that would be thinking from an attacker point of view. For this type of job, the resource will need to have knowledge of the cyberattack method and how to use the tools for the Penetration Testing Activity.
The tools that will be used for Penetration Testing activity would be something such as:
- Burpsuite
- Nessus
- Acunetix
- Kali Linux
- Nmap
- mobSF (Mobile Penetration Testing for Android and iPhone)
- Some knowledge and skills!!
Source: What is Penetration Testing and Ethical Hacking?
As I have shared my working experience on those types of jobs, everything will depend on what you guys want to focus on a career path. Perhaps, it will differ from what I have gone through for my career path.
I just hope that all my experience will help you in finding the career paths in cybersecurity resources.
No responses yet