Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Right Stuff: Staffing Your Corporate SOC
Newest First  |  Oldest First  |  Threaded View
RaceBannon99
50%
50%
RaceBannon99,
User Rank: Apprentice
4/3/2014 | 9:21:56 PM
Re: Outside the Box
Oh yes - they are great first steps. But he has to demonstrate his ability to learn on his own. It is like I said in the essay, if he is not running Llinus at home, he is probably not curious enough to be a good SOC analyst.
RaceBannon99
50%
50%
RaceBannon99,
User Rank: Apprentice
4/3/2014 | 9:20:02 PM
Re: Outside the Box
That is really well said. I agree with you. Don't get me wrong. I was not trying to de-value the college or certificate experience (OK - I did take a jab at them I admit), but I do stand by my point that they are not sifficient. You need more.
KevinK-
50%
50%
KevinK-,
User Rank: Apprentice
4/3/2014 | 4:49:16 PM
Re: Outside the Box
Rick, thanks for clarifying your posting. We all could probably debate this topic until the 'cows come home.' I have a few certifications that I'm looking into. Such as from CompTIA, ISC2, Cisco and EC-Council. I will add SANS to my list to review and consider. I'm currently taking the IT Security Certification course from VillanovaU....not sure how valuable this will be on my resume. Right now, it's all about time and money!
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/3/2014 | 4:21:28 PM
Re: Outside the Box
@Kevin, I think you make some very valid points.

@Rick, An experienced professional should have experience intertwined with education and certification. However, I think everything is what you make of it. So to say that college and certification people are just good test takers, I guarantee that if thats what the individual is trying to accomplish, then that person will show the same get through attitude in a work environment. So I would say experience, certifications, education, is all well and good but I think in the end of the day the most important trait you are trying to delineate is good character. You want someone who will get the most out of all those situations. Cause experience does not guarantee efficiency and capability. Thoughts?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/3/2014 | 8:45:55 AM
Re: Outside the Box
Rick, What advice would you give someone like Kevin in how to present himself to an SOC hiring manager in order to build a foundation in security. Would the CISSP certification or a course in the SANS Curriculum that you mention be a good first step? Or is there another path to get him in the door. 
RaceBannon99
50%
50%
RaceBannon99,
User Rank: Apprentice
4/3/2014 | 8:34:08 AM
Re: Outside the Box
Hey Kevin,

You make some good points. Let me clarify a bit. I am not saying that you should not hire inexperienced folks to work in your security organization and train them to be better employees. I am saying that these new people should probably not be key players in your SOC right out of the gate. I also agree that having IT experience and passion, as you describe yourself, go a long way towards making a very good SOC analyst. Having worked in the IT trenches, you already have a basic understanding of how everything fits together. Your willingness to imporve yourselve on your own time go aloong way too. This are the qualities I would be looking for in my SOC analyst.

 

Rick
KevinK-
50%
50%
KevinK-,
User Rank: Apprentice
4/2/2014 | 9:46:22 PM
Outside the Box
Hi Rick,

You write a very compelling article for bringing on qualified people into a SOC. I agree that folks who have very little IT experience, but a couple of security related certifications, may not be ideal. But, with the so-called 'shortage' of skilled security candidates, hiring manager should really be thinking outside the box. Not everyone is going to have the solid IT experience, but some will have the passion and desire....so they just need a bit of hand-holding to get going, and they will flourish. 

In my case, I have been in IT for 16 years, but on the fringes of IT security and networking. I have the desire, interest and passion to move into the IT security world. I have been a software developer, tester, systems analyst and business analyst. As far as I'm concerned, I just need some solid training and some certifications, which I'm working on. I'm taking an 'unconventional' route, based on your guidelines in your post. But, sometimes you would be surprised by the unconventional.

Cheers
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/2/2014 | 4:34:41 PM
Re: odes are malicious!
My odes would be malicious. But thanks for catching the typo -- and making me smile at the end of a long day. :-)
GonzSTL
50%
50%
GonzSTL,
User Rank: Ninja
4/2/2014 | 3:42:19 PM
Re: odes are malicious!
Shakespeare was particularly adept at writing malicious odes, although they were purported to come out of the mouths of the characters in his works, and not from himself.
adriendb
50%
50%
adriendb,
User Rank: Apprentice
4/2/2014 | 1:42:46 PM
odes are malicious!
'malicious ode'? typo in the story.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5641
PUBLISHED: 2020-11-24
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
CVE-2020-5674
PUBLISHED: 2020-11-24
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-29002
PUBLISHED: 2020-11-24
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
CVE-2020-29003
PUBLISHED: 2020-11-24
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
CVE-2020-26890
PUBLISHED: 2020-11-24
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the r...