Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Right Stuff: Staffing Your Corporate SOC
Newest First  |  Oldest First  |  Threaded View
RaceBannon99
50%
50%
RaceBannon99,
User Rank: Apprentice
4/3/2014 | 9:21:56 PM
Re: Outside the Box
Oh yes - they are great first steps. But he has to demonstrate his ability to learn on his own. It is like I said in the essay, if he is not running Llinus at home, he is probably not curious enough to be a good SOC analyst.
RaceBannon99
50%
50%
RaceBannon99,
User Rank: Apprentice
4/3/2014 | 9:20:02 PM
Re: Outside the Box
That is really well said. I agree with you. Don't get me wrong. I was not trying to de-value the college or certificate experience (OK - I did take a jab at them I admit), but I do stand by my point that they are not sifficient. You need more.
KevinK-
50%
50%
KevinK-,
User Rank: Apprentice
4/3/2014 | 4:49:16 PM
Re: Outside the Box
Rick, thanks for clarifying your posting. We all could probably debate this topic until the 'cows come home.' I have a few certifications that I'm looking into. Such as from CompTIA, ISC2, Cisco and EC-Council. I will add SANS to my list to review and consider. I'm currently taking the IT Security Certification course from VillanovaU....not sure how valuable this will be on my resume. Right now, it's all about time and money!
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/3/2014 | 4:21:28 PM
Re: Outside the Box
@Kevin, I think you make some very valid points.

@Rick, An experienced professional should have experience intertwined with education and certification. However, I think everything is what you make of it. So to say that college and certification people are just good test takers, I guarantee that if thats what the individual is trying to accomplish, then that person will show the same get through attitude in a work environment. So I would say experience, certifications, education, is all well and good but I think in the end of the day the most important trait you are trying to delineate is good character. You want someone who will get the most out of all those situations. Cause experience does not guarantee efficiency and capability. Thoughts?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/3/2014 | 8:45:55 AM
Re: Outside the Box
Rick, What advice would you give someone like Kevin in how to present himself to an SOC hiring manager in order to build a foundation in security. Would the CISSP certification or a course in the SANS Curriculum that you mention be a good first step? Or is there another path to get him in the door. 
RaceBannon99
50%
50%
RaceBannon99,
User Rank: Apprentice
4/3/2014 | 8:34:08 AM
Re: Outside the Box
Hey Kevin,

You make some good points. Let me clarify a bit. I am not saying that you should not hire inexperienced folks to work in your security organization and train them to be better employees. I am saying that these new people should probably not be key players in your SOC right out of the gate. I also agree that having IT experience and passion, as you describe yourself, go a long way towards making a very good SOC analyst. Having worked in the IT trenches, you already have a basic understanding of how everything fits together. Your willingness to imporve yourselve on your own time go aloong way too. This are the qualities I would be looking for in my SOC analyst.

 

Rick
KevinK-
50%
50%
KevinK-,
User Rank: Apprentice
4/2/2014 | 9:46:22 PM
Outside the Box
Hi Rick,

You write a very compelling article for bringing on qualified people into a SOC. I agree that folks who have very little IT experience, but a couple of security related certifications, may not be ideal. But, with the so-called 'shortage' of skilled security candidates, hiring manager should really be thinking outside the box. Not everyone is going to have the solid IT experience, but some will have the passion and desire....so they just need a bit of hand-holding to get going, and they will flourish. 

In my case, I have been in IT for 16 years, but on the fringes of IT security and networking. I have the desire, interest and passion to move into the IT security world. I have been a software developer, tester, systems analyst and business analyst. As far as I'm concerned, I just need some solid training and some certifications, which I'm working on. I'm taking an 'unconventional' route, based on your guidelines in your post. But, sometimes you would be surprised by the unconventional.

Cheers
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/2/2014 | 4:34:41 PM
Re: odes are malicious!
My odes would be malicious. But thanks for catching the typo -- and making me smile at the end of a long day. :-)
GonzSTL
50%
50%
GonzSTL,
User Rank: Ninja
4/2/2014 | 3:42:19 PM
Re: odes are malicious!
Shakespeare was particularly adept at writing malicious odes, although they were purported to come out of the mouths of the characters in his works, and not from himself.
adriendb
50%
50%
adriendb,
User Rank: Apprentice
4/2/2014 | 1:42:46 PM
odes are malicious!
'malicious ode'? typo in the story.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6342
PUBLISHED: 2020-05-28
An access bypass vulnerability exists when the experimental Workspaces module in Drupal 8 core is enabled. This can be mitigated by disabling the Workspaces module. It does not affect any release other than Drupal 8.7.4.
CVE-2020-11082
PUBLISHED: 2020-05-28
In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.
CVE-2020-5357
PUBLISHED: 2020-05-28
Dell Dock Firmware Update Utilities for Dell Client Consumer and Commercial docking stations contain an Arbitrary File Overwrite vulnerability. The vulnerability is limited to the Dell Dock Firmware Update Utilities during the time window while being executed by an administrator. During this time wi...
CVE-2020-13660
PUBLISHED: 2020-05-28
CMS Made Simple through 2.2.14 allows XSS via a crafted File Picker profile name.
CVE-2020-11079
PUBLISHED: 2020-05-28
node-dns-sync (npm module dns-sync) through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This has been fixed in 0.2.1.