Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Right Stuff: Staffing Your Corporate SOC
Threaded  |  Newest First  |  Oldest First
adriendb
adriendb,
User Rank: Apprentice
4/2/2014 | 1:42:46 PM
odes are malicious!
'malicious ode'? typo in the story.
GonzSTL
GonzSTL,
User Rank: Ninja
4/2/2014 | 3:42:19 PM
Re: odes are malicious!
Shakespeare was particularly adept at writing malicious odes, although they were purported to come out of the mouths of the characters in his works, and not from himself.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
4/2/2014 | 4:34:41 PM
Re: odes are malicious!
My odes would be malicious. But thanks for catching the typo -- and making me smile at the end of a long day. :-)
KevinK-
KevinK-,
User Rank: Apprentice
4/2/2014 | 9:46:22 PM
Outside the Box
Hi Rick,

You write a very compelling article for bringing on qualified people into a SOC. I agree that folks who have very little IT experience, but a couple of security related certifications, may not be ideal. But, with the so-called 'shortage' of skilled security candidates, hiring manager should really be thinking outside the box. Not everyone is going to have the solid IT experience, but some will have the passion and desire....so they just need a bit of hand-holding to get going, and they will flourish. 

In my case, I have been in IT for 16 years, but on the fringes of IT security and networking. I have the desire, interest and passion to move into the IT security world. I have been a software developer, tester, systems analyst and business analyst. As far as I'm concerned, I just need some solid training and some certifications, which I'm working on. I'm taking an 'unconventional' route, based on your guidelines in your post. But, sometimes you would be surprised by the unconventional.

Cheers
RaceBannon99
RaceBannon99,
User Rank: Apprentice
4/3/2014 | 8:34:08 AM
Re: Outside the Box
Hey Kevin,

You make some good points. Let me clarify a bit. I am not saying that you should not hire inexperienced folks to work in your security organization and train them to be better employees. I am saying that these new people should probably not be key players in your SOC right out of the gate. I also agree that having IT experience and passion, as you describe yourself, go a long way towards making a very good SOC analyst. Having worked in the IT trenches, you already have a basic understanding of how everything fits together. Your willingness to imporve yourselve on your own time go aloong way too. This are the qualities I would be looking for in my SOC analyst.

 

Rick
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
4/3/2014 | 8:45:55 AM
Re: Outside the Box
Rick, What advice would you give someone like Kevin in how to present himself to an SOC hiring manager in order to build a foundation in security. Would the CISSP certification or a course in the SANS Curriculum that you mention be a good first step? Or is there another path to get him in the door. 
RaceBannon99
RaceBannon99,
User Rank: Apprentice
4/3/2014 | 9:21:56 PM
Re: Outside the Box
Oh yes - they are great first steps. But he has to demonstrate his ability to learn on his own. It is like I said in the essay, if he is not running Llinus at home, he is probably not curious enough to be a good SOC analyst.
KevinK-
KevinK-,
User Rank: Apprentice
4/3/2014 | 4:49:16 PM
Re: Outside the Box
Rick, thanks for clarifying your posting. We all could probably debate this topic until the 'cows come home.' I have a few certifications that I'm looking into. Such as from CompTIA, ISC2, Cisco and EC-Council. I will add SANS to my list to review and consider. I'm currently taking the IT Security Certification course from VillanovaU....not sure how valuable this will be on my resume. Right now, it's all about time and money!
RyanSepe
RyanSepe,
User Rank: Ninja
4/3/2014 | 4:21:28 PM
Re: Outside the Box
@Kevin, I think you make some very valid points.

@Rick, An experienced professional should have experience intertwined with education and certification. However, I think everything is what you make of it. So to say that college and certification people are just good test takers, I guarantee that if thats what the individual is trying to accomplish, then that person will show the same get through attitude in a work environment. So I would say experience, certifications, education, is all well and good but I think in the end of the day the most important trait you are trying to delineate is good character. You want someone who will get the most out of all those situations. Cause experience does not guarantee efficiency and capability. Thoughts?
RaceBannon99
RaceBannon99,
User Rank: Apprentice
4/3/2014 | 9:20:02 PM
Re: Outside the Box
That is really well said. I agree with you. Don't get me wrong. I was not trying to de-value the college or certificate experience (OK - I did take a jab at them I admit), but I do stand by my point that they are not sifficient. You need more.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file