As more organizations invest in improving their security operations—either by building their own security operations centers (SOCs) or by engaging managed security services—the demand for security-related roles is higher than ever.
This report will first explore what makes a security analyst successful. This critical step is often overlooked, leading to the wrong expectations for both analysts and employers, thus resulting in higher attrition and burnout. After that, we will examine the top skills security analysts need to master to be effective at defending organizations across endpoints, networks, and the cloud, as well as aligning to the models presented in the report.
This paper will cover:
Security models and frameworks to develop and improve analysts skills
The distinction between investigative tasks and investigative thinking
An introduction to incorporating the OODA Loop concept to investigations