Security analysts are the backbone of every organization's defense strategy. Whether you are starting your first SOC role or transitioning from IT operations, this guide covers the skills, tools, certifications, and career progression that matter most in 2026.
What Does a Security Analyst Actually Do?
A security analyst monitors, detects, investigates, and responds to security threats across an organization's infrastructure. The role spans multiple tiers:
- SOC L1 (Triage Analyst) - Monitor SIEM dashboards, triage alerts, escalate confirmed incidents, document findings in ticketing systems
- SOC L2 (Incident Responder) - Deep-dive investigation, log correlation, containment actions, malware triage, forensic evidence collection
- SOC L3 (Threat Hunter) - Proactive hunting using MITRE ATT&CK, write detection rules (Sigma/YARA), threat intelligence analysis, purple team exercises
- Senior Analyst / Detection Engineer - Build and tune detection pipelines, reduce false positives, architect security monitoring strategy
Explore structured security career roadmaps with role-specific skill trees and salary benchmarks at HADESS Career Platform.
Core Technical Skills Every Security Analyst Needs
1. SIEM Operations (Splunk, Elastic, Microsoft Sentinel)
You will spend most of your day inside a SIEM. The ability to write efficient queries separates good analysts from great ones.
Splunk SPL basics:
index=windows sourcetype=WinEventLog:Security EventCode=4625
| stats count by src_ip, Account_Name
| where count > 10
| sort -count
Elastic KQL for failed logins:
event.code: "4625" and winlog.event_data.TargetUserName: *admin*
Key SIEM skills to master:
- Writing correlation rules that reduce noise
- Building dashboards for shift handover
- Log source onboarding (syslog, Windows Event Forwarding, API ingestion)
- Alert tuning to cut false positive rates below 20%
Practice these skills hands-on with 490+ security modules covering SIEM, EDR, and threat hunting at HADESS.
2. Endpoint Detection and Response (EDR)
Modern SOCs rely heavily on EDR telemetry. You need to understand:
- Process creation chains - Parent-child relationships (cmd.exe spawned by Word is suspicious)
- Sysmon Event IDs - Event 1 (Process Create), Event 3 (Network Connect), Event 7 (Image Load), Event 10 (Process Access), Event 11 (File Create)
- Response actions - Network isolation, process termination, file quarantine
Example Sysmon config for detecting credential dumping:
<RuleGroup groupRelation="or">
<ProcessAccess onmatch="include">
<TargetImage condition="is">C:\\Windows\\system32\\lsass.exe</TargetImage>
</ProcessAccess>
</RuleGroup>
Popular EDR platforms: CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, Carbon Black, Cortex XDR.
Explore the full EDR knowledge model to understand how endpoint telemetry, behavioral detection, and response actions connect.
3. Network Traffic Analysis
Understanding network protocols is non-negotiable:
-
Wireshark filters -
tcp.flags.syn==1 && tcp.flags.ack==0for SYN scans - Zeek (Bro) logs - conn.log, dns.log, http.log, ssl.log for network metadata analysis
- Suricata rules - Write custom rules for detecting beaconing, data exfiltration, and lateral movement
Check out the Network Defense knowledge model for a deep visual map of IDS/IPS, firewalls, packet analysis, and honeypots.
4. Log Analysis and Forensics
Critical log sources every analyst must know:
| Log Source | What It Tells You | Key Events |
|---|---|---|
| Windows Security Log | Authentication, privilege use | 4624, 4625, 4672, 4688, 4720 |
| Linux auth.log | SSH logins, sudo usage | Failed/successful auth |
| Firewall logs | Allowed/denied connections | Source/dest IP, ports |
| DNS logs | Domain lookups | DGA detection, tunneling |
| Proxy/WAF logs | Web traffic, attacks | SQL injection, XSS attempts |
| CloudTrail (AWS) | API calls, IAM changes | AssumeRole, CreateUser |
Dive deeper into each skill area with interactive knowledge models that map relationships between security concepts visually. Browse the full knowledge base for technical guides and framework breakdowns.
The MITRE ATT&CK Framework: Your Detection Blueprint
MITRE ATT&CK is the industry standard for mapping adversary behavior. As a security analyst, you should be able to:
- Map alerts to ATT&CK techniques - When you see PowerShell downloading a file, that maps to T1059.001 (Command and Scripting Interpreter: PowerShell)
- Identify coverage gaps - Use ATT&CK Navigator to visualize which tactics your detections cover
- Write detection rules - Create Sigma rules mapped to specific techniques
Example Sigma rule for detecting suspicious PowerShell:
title: Suspicious PowerShell Download Cradle
status: stable
logsource:
product: windows
category: process_creation
detection:
selection:
CommandLine|contains|all:
- 'powershell'
- 'downloadstring'
condition: selection
level: high
tags:
- attack.execution
- attack.t1059.001
The 14 ATT&CK Enterprise Tactics to know:
Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration, Impact.
Explore the complete MITRE ATT&CK knowledge model with interactive technique mapping and detection coverage analysis. Also available: SIEM, Incident Response, and Threat Hunting models.
Incident Response: The IR Lifecycle
Following NIST SP 800-61, every incident follows this process:
Phase 1: Preparation
- Maintain IR playbooks for common scenarios (phishing, ransomware, insider threat)
- Keep jump bags ready (forensic tools, write blockers, clean laptops)
- Document escalation contacts and communication channels
Phase 2: Detection and Analysis
- Correlate alerts across SIEM, EDR, and network telemetry
- Determine scope: How many systems are affected?
- Classify severity (P1/P2/P3/P4) based on business impact
- Collect volatile evidence first (memory dumps, running processes, network connections)
Phase 3: Containment
- Short-term: Network isolation of affected hosts via EDR
- Long-term: Block C2 domains at DNS/proxy, disable compromised accounts, apply emergency patches
Phase 4: Eradication and Recovery
- Remove malware, rebuild compromised systems from known-good images
- Reset credentials for all affected accounts
- Verify clean state with full scans before reconnecting to network
Phase 5: Post-Incident Activity
- Write incident report with timeline, root cause, and remediation steps
- Update detection rules based on lessons learned
- Conduct tabletop exercise to improve response
Quick forensic triage commands (Linux):
# Check running processes
ps auxf
# View network connections
ss -tulnp
# Recent login activity
last -a | head -20
# Find recently modified files
find / -mtime -1 -type f -ls 2>/dev/null | head -50
# Check cron jobs for persistence
for user in $(cut -f1 -d: /etc/passwd); do
crontab -l -u "$user" 2>/dev/null
done
Build your incident response skills with hands-on security labs covering real-world attack scenarios and forensic analysis. Prefer guided learning? Try the AI career coach for personalized study plans.
Threat Hunting: Proactive Defense
Threat hunting goes beyond alert-driven response. It involves forming hypotheses and searching for evidence of compromise that automated tools missed.
Hunting Methodologies
Hypothesis-Driven Hunting:
- Form a hypothesis: "An attacker may be using living-off-the-land binaries (LOLBins) to move laterally"
- Define data sources: Process creation logs, Sysmon, EDR telemetry
- Build queries to test the hypothesis
- Analyze results for anomalies
- Document findings and create new detections
Example hunt - Detecting LOLBin abuse in Splunk:
index=sysmon EventCode=1
(Image="*\\certutil.exe" OR OriginalFileName="CertUtil.exe")
(CommandLine="*-urlcache*" OR CommandLine="*-decode*" OR CommandLine="*-encode*")
| table _time, Computer, User, CommandLine, ParentImage
YARA rule for detecting encoded PowerShell:
rule Encoded_PowerShell_Command
{
strings:
$s1 = "-enc" ascii nocase
$s2 = "-encodedcommand" ascii nocase
$s3 = "FromBase64String" ascii nocase
$ps = "powershell" ascii nocase
condition:
$ps and any of ($s1, $s2, $s3)
}
Access comprehensive threat hunting knowledge paths with real detection scenarios and ATT&CK-mapped exercises. Explore all available cybersecurity skills to find your focus area.
Essential Tools for Security Analysts
Investigation Tools
| Tool | Purpose | Key Skill |
|---|---|---|
| Splunk/Elastic | SIEM - log search and correlation | SPL/KQL query writing |
| CrowdStrike/SentinelOne | EDR - endpoint visibility | Process tree analysis |
| Wireshark | Packet capture analysis | Display filters, stream following |
| Volatility 3 | Memory forensics | Process listing, DLL analysis |
| Autopsy/FTK | Disk forensics | Timeline analysis, artifact recovery |
| Velociraptor | Endpoint survey and collection | VQL queries |
Automation and Response
| Tool | Purpose | Key Skill |
|---|---|---|
| SOAR (Cortex XSOAR, Tines) | Playbook automation | Python scripting |
| TheHive | Case management | Incident tracking |
| MISP | Threat intelligence sharing | IOC management |
| OSQuery | Endpoint querying at scale | SQL-like queries |
| Sigma | Detection rule format | Cross-SIEM rules |
See which tools are in highest demand and what they pay with the market intelligence dashboard and salary growth explorer on HADESS.
Certifications That Actually Matter
Here is a practical ranking based on employer demand and real-world value:
Entry Level (0-2 years)
- CompTIA Security+ - Industry baseline, covers fundamentals
- CompTIA CySA+ - Analyst-focused, covers SIEM and threat detection
- SC-200 (Microsoft Security Operations Analyst) - Strong if your SOC runs Microsoft stack
Mid Level (2-5 years)
- GIAC GSEC - Broad security knowledge, respected in enterprise
- GIAC GCIH - Incident handling, practical focus
- BTL1 (Blue Team Level 1) - Hands-on, lab-based, directly relevant to SOC work
- CCD (Certified CyberDefender) - Practical blue team cert
Senior Level (5+ years)
- GIAC GCFA - Advanced forensics and incident response
- GIAC GNFA - Network forensic analysis
- OSDA (OffSec Defense Analyst) - Hands-on detection engineering
- BTL2 - Advanced blue team operations
Plan your certification path with the Certification Roadmap Builder that maps certs to your target role and experience level. Not sure which cert to start with? The career coach can help you decide.
Career Progression and Salary Benchmarks (2026)
| Role | Experience | US Salary Range | Key Skills |
|---|---|---|---|
| SOC Analyst L1 | 0-2 years | $60K - $85K | SIEM monitoring, alert triage |
| SOC Analyst L2 | 2-4 years | $85K - $115K | Investigation, IR, forensics |
| SOC Analyst L3 / Threat Hunter | 4-7 years | $115K - $155K | Hunting, detection engineering |
| Detection Engineer | 3-6 years | $125K - $165K | Sigma/YARA, SIEM content dev |
| Incident Response Lead | 5-8 years | $135K - $175K | IR management, forensics |
| Security Engineer | 4-7 years | $125K - $170K | Tool deployment, automation |
| Security Architect | 8+ years | $165K - $230K | Security design, strategy |
Get personalized salary insights for your region and experience level with the Salary Calculator on HADESS. Track compensation trends across roles with the salary growth explorer.
Building Your Home Lab
Practical experience beats theory every time. Here is a minimal home lab setup:
Home Lab Architecture:
[Attacker VM] [Victim VMs] [Monitoring Stack]
Kali Linux Windows 10/11 Security Onion
Commando VM Ubuntu Server OR
Metasploitable3 Elastic + Kibana
DVWA Wazuh (free EDR)
Velociraptor
[Network: VirtualBox/VMware internal network with pfSense firewall]
Quick setup with Docker:
# Run Wazuh SIEM+EDR stack
git clone https://github.com/wazuh/wazuh-docker.git
cd wazuh-docker/single-node
docker compose up -d
# Access dashboard at https://localhost:443
Want structured lab exercises instead of building from scratch? Check out the hands-on security labs with guided scenarios for SOC analysts.
Daily Workflow of a SOC Analyst
Here is what a typical shift looks like:
Start of Shift (first 30 minutes):
- Read shift handover notes from previous team
- Check critical/open incidents in ticketing system
- Review overnight alert queue - sort by severity
- Check threat intel feeds for new IOCs relevant to your org
Core Hours:
- Triage incoming alerts - verify or close as false positive
- Investigate escalated incidents - correlate across log sources
- Document findings in tickets with evidence screenshots
- Write or update detection rules based on new threat intel
- Tune noisy alerts that waste analyst time
End of Shift:
- Update ticket statuses and add investigation notes
- Write handover document for next shift
- Flag any ongoing incidents that need continued monitoring
Common Interview Questions for Security Analyst Roles
Prepare for these questions that come up in almost every SOC interview:
-
Walk me through how you investigate a phishing alert.
- Check sender domain (SPF/DKIM/DMARC), analyze URLs in sandbox (urlscan.io), check attachment hashes on VirusTotal, search SIEM for other recipients, check if anyone clicked, contain if needed.
-
What is the difference between an IDS and an IPS?
- IDS monitors and alerts, IPS actively blocks. IDS is passive (out of band), IPS is inline.
-
How do you distinguish a true positive from a false positive?
- Correlate across multiple data sources. Check if the source IP/user has legitimate business need. Verify IOCs against threat intel. Look at context - time of day, baseline behavior.
-
Explain the CIA triad with real examples.
- Confidentiality: encryption at rest, access controls. Integrity: file hashing, digital signatures. Availability: DDoS protection, redundancy.
-
A user reports their machine is slow and you see beaconing traffic to an unknown domain every 60 seconds. What do you do?
- Isolate the endpoint via EDR, capture memory dump, analyze the beaconing process (parent chain, loaded DLLs), check domain reputation, block the domain at proxy/DNS, search for the same IOC across all endpoints.
Practice with AI-powered mock interviews that adapt to your experience level and give real-time feedback on your answers. Browse security job listings to see what employers are looking for right now.
What Sets Apart Top Security Analysts
- Scripting ability - Python and Bash automation for repetitive tasks saves hours daily
- Curiosity - Top analysts dig deeper, pivot to new data sources, and do not stop at the first answer
- Communication - Writing clear incident reports that non-technical stakeholders can understand
- ATT&CK fluency - Thinking in terms of tactics and techniques, not just IOCs
- Continuous learning - The threat landscape changes weekly, analysts who stop learning fall behind fast
See how top professionals structure their growth with real case studies from the HADESS community.
Next Steps: Start Your Security Analyst Journey
Whether you are brand new to cybersecurity or looking to level up from your current SOC role, here is your action plan:
- Assess your current skills - Take a skills assessment to identify gaps
- Choose your career path - Use the Career Path Explorer to map your progression from L1 to architect
- Build hands-on skills - Work through interactive security labs covering SIEM, EDR, forensics, and threat hunting
- Study the knowledge models - Explore interconnected security concepts with visual mapping across 70+ topics
- Plan your certifications - Build a certification roadmap aligned to your target role
- Track the market - Use market intelligence to understand which skills employers want most
- Prepare for interviews - Practice with AI mock interviews tailored to security analyst roles
- Get coaching - Work with the AI career coach for personalized guidance
- Explore jobs - Browse curated security job listings matched to your skill profile
- Check your market value - Use the salary calculator to benchmark your compensation
HADESS Career Platform provides everything you need to launch and grow your cybersecurity career:
- 490+ hands-on skill modules across offensive, defensive, and cloud security
- 70+ interactive knowledge models mapping technical concepts visually
- Career path roadmaps from entry-level to leadership
- AI mock interviews with real-time feedback
- Salary calculator and market intelligence
- Certification planning aligned to your goals
- AI career coach for personalized guidance
Start your free security career assessment at career.hadess.io
What security analyst skills do you find most challenging to learn? Drop a comment below.
Top comments (0)