Skip to content

keraattin/Blue-Team-Roadmap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

5 Commits
Β 
Β 

Repository files navigation

πŸ›‘οΈ Blue Team Roadmap

The most comprehensive, step-by-step roadmap for breaking into defensive cybersecurity.
From absolute zero to your first Blue Team role, every skill, tool, certification, and resource you need.

Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Phase 6 Phase 7 Phase 8 Phase 9 Phase 10

Stars Forks


πŸ“‹ Table of Contents


🎯 Why This Roadmap Exists

The cybersecurity industry has 4.8 million unfilled positions worldwide (ISC2, 2025). Defensive security (Blue Team) is the backbone of every organization's security posture, yet most learning resources are scattered, outdated, or focused on offensive security.

This roadmap changes that. It provides a complete, structured, step-by-step learning path from absolute zero to landing your first Blue Team role, with every resource linked, every tool explained, and every step actionable.

What makes this different from other lists:

  • πŸ“š Structured as a learning path, not just a random list of tools
  • πŸ”’ Ordered by learning sequence, each phase builds on the previous one
  • πŸ†“ Prioritizes free resources, you can follow this entire roadmap without spending a dollar on courses
  • 🎯 Focused on getting hired, includes resume tips, interview prep, and job search strategy
  • πŸ”„ Regularly updated, maintained with the latest tools, certs, and industry trends

πŸ‘€ Who Is This For?

  • 🟒 Complete beginners with zero IT or security experience
  • πŸ”„ Career switchers coming from other fields
  • πŸŽ“ Students studying cybersecurity or related fields
  • πŸ’Ό IT professionals wanting to transition into security
  • πŸ”΅ Junior SOC analysts looking to level up their skills

You do NOT need:

  • A computer science degree
  • Previous IT experience
  • Expensive training courses
  • Any special hardware (a laptop with 8GB+ RAM is enough to start)

πŸ—ΊοΈ The 10-Phase Overview

Phase Topic Timeline Prerequisites
01 Networking Fundamentals Weeks 1-4 None
02 Windows Essentials Weeks 3-6 Basic networking
03 Linux Command Line Weeks 4-7 None
04 Scripting & Automation Weeks 5-8 Basic OS knowledge
05 Security Fundamentals Weeks 6-10 Phases 1-4
06 Blue Team Tools Weeks 8-14 Phase 5
07 Certifications Months 3-6 Phases 1-6
08 Hands-On Practice Months 4-8 Phase 6
09 Build Your Portfolio Months 5-9 Phase 8
10 Get Hired Months 8-12 All phases

⏱️ Total estimated timeline: 6-12 months with 2-3 hours of daily study. Phases overlap. You don't need to finish one completely before starting the next. Consistency is more important than speed.


🌐 Phase 1: Networking Fundamentals

Timeline: Weeks 1-4 Β· Effort: 2-3 hours/day

Every security alert involves network traffic. You cannot investigate threats, write detection rules, or analyze incidents without understanding how data moves across networks.

What to Learn

1.1 OSI Model & TCP/IP Stack

  • The 7-layer OSI model and how it maps to the 4-layer TCP/IP model
  • What happens at each layer (Physical, Data Link, Network, Transport, Session, Presentation, Application)
  • How encapsulation works (data β†’ segment β†’ packet β†’ frame β†’ bits)
  • Why this matters for security: understanding which layer an attack targets helps you choose the right detection method

1.2 IP Addressing & Subnetting

  • IPv4 address structure (32-bit, dotted decimal notation)
  • Private vs public IP ranges (10.x.x.x, 172.16-31.x.x, 192.168.x.x)
  • CIDR notation (/24, /16, /8 and what they mean)
  • Subnet masks and how to calculate network/host portions
  • NAT (Network Address Translation) and why it exists
  • IPv6 basics (128-bit, hexadecimal notation)

1.3 Critical Protocols & Ports

You need to memorize these. They appear in every SOC investigation:

Protocol Port What It Does Security Relevance
DNS 53 Resolves domain names to IPs DNS tunneling, domain hijacking, DGA detection
HTTP 80 Unencrypted web traffic Credential theft, malware delivery
HTTPS 443 Encrypted web traffic C2 communication hiding in TLS
SSH 22 Secure remote access Brute force attacks, unauthorized access
RDP 3389 Windows remote desktop #1 ransomware entry vector
SMTP 25 Email sending Phishing, spam, spoofing
FTP 20/21 File transfer Credential sniffing, data exfiltration
DHCP 67/68 Automatic IP assignment Rogue DHCP servers, MITM
SMB 445 Windows file sharing EternalBlue, lateral movement
LDAP 389/636 Directory services Active Directory attacks
Kerberos 88 Authentication Kerberoasting, Golden Ticket
Syslog 514 Log forwarding Log analysis, SIEM ingestion
SNMP 161/162 Network management Information disclosure

1.4 Network Devices & Architecture

  • Routers: Forward traffic between networks, operate at Layer 3
  • Switches: Forward traffic within networks, operate at Layer 2
  • Firewalls: Filter traffic based on rules (stateful vs stateless)
  • Proxies: Intermediate between clients and servers (forward vs reverse)
  • Load Balancers: Distribute traffic across servers
  • IDS/IPS: Detect (IDS) or prevent (IPS) malicious traffic
  • VLANs: Logically segment networks
  • VPNs: Encrypted tunnels across public networks
  • DMZ: Demilitarized zone for public-facing services

1.5 Wireshark Basics

  • Packet capture fundamentals
  • Display filters vs capture filters
  • Following TCP streams
  • Identifying common protocols visually
  • Recognizing anomalous traffic patterns

πŸ†“ Free Learning Resources

Resource Type Link
Professor Messer, Network+ N10-009 Video (87 episodes) YouTube
TryHackMe, Pre-Security Path Interactive Labs tryhackme.com
Cisco Networking Academy, Intro to Networks Course netacad.com
Practical Networking YouTube Channel YouTube
Subnetting Practice Drill Site subnettingpractice.com
Sunny Classroom, Networking Tutorials YouTube YouTube
Jeremy's IT Lab, CCNA Course YouTube (Free) YouTube

βœ… Phase 1 Checklist

  • Can explain the OSI model and TCP/IP stack
  • Can subnet an IP address and calculate ranges
  • Memorized critical protocols and their port numbers
  • Understand the role of routers, switches, firewalls, and proxies
  • Can capture and read basic traffic in Wireshark
  • Completed TryHackMe Pre-Security networking rooms

πŸ–₯️ Phase 2: Windows Essentials

Timeline: Weeks 3-6 Β· Effort: 2-3 hours/day

Over 90% of enterprise environments run Windows with Active Directory. As a SOC analyst, Windows Event Logs will be your primary data source. Understanding how Windows works internally is not optional, it is the foundation of your daily work.

What to Learn

2.1 Active Directory (AD)

  • Domains, forests, and trusts: hierarchical structure of AD
  • Users, groups, and OUs: how access is organized
  • Group Policy Objects (GPO): how administrators enforce settings across machines
  • Kerberos authentication: TGT, TGS, service tickets, and why attackers love it
  • NTLM authentication: legacy protocol, pass-the-hash attacks
  • Domain Controllers: the most critical servers in any enterprise

2.2 Windows Event Logs (Critical Skill)

This is the #1 skill for SOC analysts. You must be able to read, filter, and correlate Windows events.

Event IDs You Must Memorize:

Event ID Log What It Means Why It Matters
4624 Security Successful logon Track who accessed what
4625 Security Failed logon Brute force detection (multiple = attack)
4634 Security Logoff Session tracking
4648 Security Explicit credential logon Lateral movement indicator
4672 Security Special privileges assigned Admin access granted
4688 Security New process created Malware execution detection
4689 Security Process exited Process lifecycle tracking
4720 Security User account created Persistence technique
4724 Security Password reset attempt Privilege escalation
4728 Security Member added to security group Privilege escalation
4732 Security Member added to local group Local admin escalation
1102 Security Audit log cleared Almost always malicious
7045 System New service installed Malware persistence
4104 PowerShell Script block logging Malicious PowerShell detection
1 Sysmon Process creation Detailed process tracking
3 Sysmon Network connection C2 communication detection
11 Sysmon File creation Dropped files, malware delivery
22 Sysmon DNS query DNS-based C2, DGA detection

How to read Event Log sequences (attack stories):

  • Multiple 4625 β†’ single 4624 = successful brute force
  • 4720 + 4728 (Domain Admins) = account creation + privilege escalation
  • 4688 with suspicious process names (powershell.exe, cmd.exe, certutil.exe) = potential malware execution
  • 1102 = someone cleared logs to cover tracks

2.3 PowerShell for Investigation

Essential commands every SOC analyst uses:

# View recent security events
Get-EventLog -LogName Security -Newest 100

# Find failed logons
Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4625} | Select-Object TimeCreated, Message

# List running processes with details
Get-Process | Sort-Object CPU -Descending | Select-Object -First 20

# Check network connections
Get-NetTCPConnection | Where-Object {$_.State -eq "Established"}

# Find recently modified files
Get-ChildItem -Path C:\ -Recurse -File | Where-Object {$_.LastWriteTime -gt (Get-Date).AddHours(-24)}

# Check scheduled tasks (persistence mechanism)
Get-ScheduledTask | Where-Object {$_.State -ne "Disabled"}

# Check startup programs
Get-CimInstance Win32_StartupCommand | Select-Object Name, Command, Location

2.4 Sysmon

Sysmon is a Windows system service that provides detailed telemetry on process creation, network connections, file creation, and more. It is essential for any SOC.

2.5 Windows Registry & Services

  • Registry run keys (HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run), common persistence location
  • Services (services.msc), malware often installs as a service
  • Scheduled Tasks, another persistence mechanism
  • WMI subscriptions, advanced persistence technique

πŸ†“ Free Learning Resources

Resource Type Link
TryHackMe, Windows Fundamentals 1, 2, 3 Interactive Labs tryhackme.com
TryHackMe, Active Directory Basics Lab tryhackme.com
TryHackMe, Windows Event Logs Lab tryhackme.com
TryHackMe, Sysmon Lab tryhackme.com
Microsoft Learn, Windows Server Free Course learn.microsoft.com
13Cubed, Windows Forensics YouTube YouTube
SANS Windows Forensic Analysis Poster Cheat Sheet (Free) sans.org

βœ… Phase 2 Checklist

  • Understand Active Directory structure (domains, users, groups, GPO)
  • Can explain Kerberos authentication flow
  • Memorized critical Windows Event IDs
  • Can read Event Log sequences and identify attack patterns
  • Know basic PowerShell investigation commands
  • Understand what Sysmon does and its key Event IDs
  • Know common persistence locations (registry, services, scheduled tasks)
  • Completed TryHackMe Windows rooms

🐧 Phase 3: Linux Command Line

Timeline: Weeks 4-7 Β· Effort: 2 hours/day

Most security tools, servers, and appliances run Linux. You need terminal fluency, the ability to navigate, search, process text, and automate tasks from the command line.

What to Learn

3.1 Essential Commands

Navigation & File System:

pwd                    # Print current directory
ls -la                 # List all files with details
cd /var/log            # Change directory
find / -name "*.log"   # Find files by name
locate suspicious.exe  # Fast file search (uses database)
tree -L 2              # Directory tree structure

File Operations:

cat file.txt           # Display file contents
head -n 20 file.txt    # First 20 lines
tail -f /var/log/syslog # Follow log file in real-time (critical for monitoring)
less large_file.log    # Page through large files
cp file.txt backup/    # Copy files
mv file.txt newname.txt # Move/rename files
chmod 755 script.sh    # Change permissions
chown user:group file  # Change ownership

Text Processing (used daily in log analysis):

grep "error" logfile.txt              # Search for pattern
grep -i "failed" auth.log            # Case-insensitive search
grep -r "password" /etc/             # Recursive search
grep -c "404" access.log             # Count matches
awk '{print $1, $4}' access.log      # Extract specific fields
sed 's/old/new/g' file.txt           # Find and replace
sort access.log | uniq -c | sort -rn # Count unique lines, sort by frequency
wc -l logfile.txt                    # Count lines
cut -d',' -f1,3 data.csv             # Extract CSV fields

System Information:

ps aux                  # List all running processes
ps aux | grep suspicious # Find specific process
top / htop              # Real-time process monitoring
netstat -tulnp          # Show listening ports and connections
ss -tulnp               # Modern replacement for netstat
ifconfig / ip addr      # Network interface information
who / w                 # Who is logged in
last                    # Login history
df -h                   # Disk usage
free -h                 # Memory usage
uname -a                # System information

Piping & Chaining (combine commands):

# Count failed SSH login attempts
cat /var/log/auth.log | grep "Failed" | wc -l

# Find top 10 IP addresses in access log
cat access.log | awk '{print $1}' | sort | uniq -c | sort -rn | head -10

# Find large files (potential data staging)
find / -type f -size +100M 2>/dev/null

# Monitor specific log entries in real-time
tail -f /var/log/syslog | grep --color "error\|warning\|critical"

3.2 Important Directories for Blue Team

/var/log/           β€” System and application logs
/var/log/auth.log   β€” Authentication logs (SSH, sudo)
/var/log/syslog     β€” General system messages
/var/log/kern.log   β€” Kernel messages
/etc/               β€” System configuration files
/etc/passwd         β€” User accounts
/etc/shadow         β€” Password hashes
/etc/crontab        β€” Scheduled tasks
/tmp/               β€” Temporary files (malware often lands here)
/home/              β€” User home directories
/proc/              β€” Virtual filesystem with process info
/opt/               β€” Optional/third-party software

3.3 Linux Distros for Blue Team

  • Ubuntu, Start here. Most beginner-friendly, great documentation
  • Kali Linux, Pre-loaded with security tools (pentesting focus)
  • Kali Purple, Specifically designed for Blue Team operations
  • REMnux, Specialized for malware analysis
  • SIFT Workstation, SANS forensics toolkit
  • Security Onion, Network security monitoring (Zeek + Suricata + ELK)

πŸ†“ Free Learning Resources

Resource Type Link
OverTheWire, Bandit Wargame (34 levels) overthewire.org
TryHackMe, Linux Fundamentals (1, 2, 3) Interactive Labs tryhackme.com
LetsDefend, Linux for Blue Team Course (CISA recognized) letsdefend.io
Linux Journey Interactive Tutorial linuxjourney.com
Explainshell Command Explainer explainshell.com
The Linux Command Line (Book) Free PDF linuxcommand.org

βœ… Phase 3 Checklist

  • Can navigate the Linux filesystem comfortably
  • Can use grep, awk, sed for text processing
  • Understand file permissions (rwx, chmod, chown)
  • Can chain commands with pipes (|)
  • Know where to find important log files
  • Can monitor processes and network connections
  • Completed OverTheWire Bandit (at least levels 0-15)
  • Completed TryHackMe Linux Fundamentals rooms

🐍 Phase 4: Scripting & Automation

Timeline: Weeks 5-8 Β· Effort: 2-3 hours/day

You don't need to become a software engineer. You need functional scripting, the ability to parse logs, call APIs, automate repetitive tasks, and build small tools.

What to Learn

4.1 Python (Your #1 Priority)

Core Concepts:

  • Variables, data types, operators
  • Control flow (if/else, for loops, while loops)
  • Functions and modules
  • File I/O (reading/writing text files, CSV, JSON)
  • Error handling (try/except)
  • Lists, dictionaries, sets

Security-Relevant Libraries:

# File handling β€” read and parse log files
with open('auth.log', 'r') as f:
    for line in f:
        if 'Failed' in line:
            print(line.strip())

# Regex β€” pattern matching in logs
import re
ip_pattern = r'\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}'
ips = re.findall(ip_pattern, log_content)

# Requests β€” API calls (VirusTotal, AbuseIPDB, Shodan)
import requests
response = requests.get(f'https://www.virustotal.com/api/v3/ip_addresses/{ip}',
                        headers={'x-apikey': 'YOUR_API_KEY'})

# JSON β€” parse structured data
import json
data = json.loads(response.text)

# CSV β€” parse tabular data
import csv
with open('alerts.csv') as f:
    reader = csv.DictReader(f)
    for row in reader:
        print(row['severity'], row['source_ip'])

# Hashlib β€” hash files for IOC checking
import hashlib
with open('suspicious.exe', 'rb') as f:
    md5_hash = hashlib.md5(f.read()).hexdigest()
    print(f"MD5: {md5_hash}")

Beginner Projects to Build:

  1. Log Parser, Read a log file, extract and count unique IP addresses
  2. IP Reputation Checker, Query AbuseIPDB/VirusTotal API for IP reputation
  3. Hash Lookup Tool, Calculate file hash and check against VirusTotal
  4. Phishing URL Analyzer, Extract URLs from emails and check with URLScan.io
  5. Simple Port Scanner, Connect to common ports to check if they're open

4.2 Bash Scripting

#!/bin/bash
# Example: Monitor failed SSH logins and alert
LOG="/var/log/auth.log"
THRESHOLD=10

count=$(grep "Failed password" $LOG | wc -l)
if [ $count -gt $THRESHOLD ]; then
    echo "ALERT: $count failed SSH login attempts detected!"
    grep "Failed password" $LOG | awk '{print $11}' | sort | uniq -c | sort -rn | head -5
fi

4.3 PowerShell Scripting

# Example: Find and report suspicious processes
$suspiciousNames = @('mimikatz', 'psexec', 'bloodhound', 'sharphound', 'lazagne')
Get-Process | Where-Object {
    $proc = $_.Name.ToLower()
    $suspiciousNames | Where-Object { $proc -like "*$_*" }
} | Select-Object Name, Id, Path, StartTime

4.4 SQL Basics

Many SIEM query languages are SQL-like. Learn:

SELECT source_ip, COUNT(*) as attempts
FROM security_logs
WHERE event_id = 4625
  AND timestamp > NOW() - INTERVAL 1 HOUR
GROUP BY source_ip
HAVING attempts > 50
ORDER BY attempts DESC;

4.5 Regular Expressions (Regex)

Used constantly in detection rules, log analysis, and SIEM queries.

Pattern Matches Use Case
\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3} IP addresses Extract IPs from logs
[a-fA-F0-9]{32} MD5 hashes Identify file hashes
[a-fA-F0-9]{64} SHA256 hashes IOC extraction
https?://[^\s]+ URLs Extract links from emails
[\w.-]+@[\w.-]+\.\w+ Email addresses Phishing analysis
[A-Z0-9]{2}(:[A-Z0-9]{2}){5} MAC addresses Network device tracking

Practice at: regex101.com, paste a log sample and build patterns.

πŸ†“ Free Learning Resources

Resource Type Link
Automate the Boring Stuff with Python Free Book automatetheboringstuff.com
TryHackMe, Python Basics Lab tryhackme.com
Codecademy, Learn Python 3 Interactive Course codecademy.com
Python for Cybersecurity Specialization Coursera (Audit free) coursera.org
Regex101 Practice Tool regex101.com
SQLBolt Interactive SQL Tutorial sqlbolt.com
Bash Scripting Tutorial Guide linuxconfig.org

βœ… Phase 4 Checklist

  • Can write Python scripts to parse log files
  • Can use the requests library to call APIs
  • Comfortable with regex pattern matching
  • Can write basic Bash scripts for automation
  • Know essential PowerShell investigation commands
  • Understand basic SQL (SELECT, WHERE, GROUP BY, JOIN)
  • Built at least 2 small security-related Python tools
  • Can use regex101.com to build and test patterns

πŸ”’ Phase 5: Security Fundamentals

Timeline: Weeks 6-10 Β· Effort: 2-3 hours/day

This phase covers the core security concepts that underpin everything a Blue Team professional does. These concepts appear in every certification exam, every job interview, and every day on the SOC floor.

What to Learn

5.1 Core Security Principles

The CIA Triad:

Principle Definition Protection Method Attack Example
Confidentiality Only authorized users can access data Encryption, access controls, DLP Data breach, unauthorized access
Integrity Data hasn't been tampered with Hashing, digital signatures, checksums Man-in-the-middle, data modification
Availability Systems are accessible when needed Redundancy, backups, DDoS protection DoS/DDoS attacks, ransomware

Additional Principles:

  • Authentication (AuthN): Proving who you are (passwords, MFA, biometrics)
  • Authorization (AuthZ): What you're allowed to do (RBAC, ACLs)
  • Accounting: Logging what you did (audit trails, SIEM)
  • Non-repudiation: Cannot deny an action (digital signatures)
  • Least Privilege: Minimum access needed for each role
  • Defense in Depth: Multiple layers of security controls
  • Zero Trust: Never trust, always verify, regardless of network location

5.2 Common Attack Types

Every SOC analyst must understand these attack categories:

Attack How It Works Detection Method
Phishing Fraudulent emails trick users into clicking links or downloading files Email gateway logs, user reports, header analysis
Brute Force Automated password guessing Multiple 4625 events, account lockouts
Credential Stuffing Using leaked credentials from other breaches Multiple 4625 from many accounts, single source
Malware Malicious software (virus, trojan, worm, RAT) EDR alerts, unusual process behavior, network anomalies
Ransomware Encrypts files, demands payment Mass file modifications, suspicious process execution
SQL Injection Injecting SQL commands into web forms WAF alerts, unusual database queries
Cross-Site Scripting (XSS) Injecting scripts into web pages WAF alerts, unusual JavaScript in requests
Man-in-the-Middle Intercepting communications Certificate warnings, ARP anomalies
Lateral Movement Moving between systems after initial access Unusual logon patterns, PsExec artifacts, remote services
Privilege Escalation Gaining higher-level access 4672 on unexpected accounts, 4728 to admin groups
Data Exfiltration Stealing data from the network Unusual outbound traffic, large transfers, DNS tunneling
Supply Chain Attack Compromising trusted software/vendors Unusual update behavior, unexpected network connections

5.3 The Cyber Kill Chain & MITRE ATT&CK

Cyber Kill Chain (Lockheed Martin):

Reconnaissance β†’ Weaponization β†’ Delivery β†’ Exploitation β†’ Installation β†’ Command & Control β†’ Actions on Objectives

MITRE ATT&CK Framework: The industry standard for categorizing adversary behavior. Contains 14 tactics with 200+ techniques.

Tactic What the Attacker Does
Reconnaissance Gathering information about the target
Resource Development Building infrastructure for the attack
Initial Access Getting into the network (phishing, exploits)
Execution Running malicious code
Persistence Maintaining access after reboot
Privilege Escalation Getting higher permissions
Defense Evasion Avoiding detection
Credential Access Stealing passwords and tokens
Discovery Learning about the environment
Lateral Movement Moving to other systems
Collection Gathering target data
Command and Control Communicating with implants
Exfiltration Stealing data out
Impact Destroying or manipulating systems

Start exploring: attack.mitre.org

5.4 Security Frameworks

Framework Purpose Key Points Link
NIST CSF 2.0 Big-picture security strategy 5 functions: Identify, Protect, Detect, Respond, Recover nist.gov
NIST SP 800-61 Incident Response 4 phases: Preparation, Detection & Analysis, Containment/Eradication/Recovery, Post-Incident Activity nist.gov
CIS Controls v8.1 Prioritized security actions 18 controls ordered by priority, organized into 3 implementation groups cisecurity.org
ISO 27001 Information Security Management System International standard for security programs, important for GRC roles iso.org
NIST SP 800-53 Security & Privacy Controls Comprehensive catalog of security controls for federal systems nist.gov

5.5 Incident Response Process (NIST SP 800-61)

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ Preparation β”‚ ──► β”‚ Detection &      β”‚ ──► β”‚ Containment, Eradication     β”‚ ──► β”‚ Post-Incident   β”‚
β”‚             β”‚     β”‚ Analysis         β”‚     β”‚ & Recovery                   β”‚     β”‚ Activity        β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
       β–²                                                                                  β”‚
       β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                    (Continuous Improvement Loop)

Phase 1, Preparation: Build IR plans, deploy tools, train the team, establish communication channels, document escalation procedures.

Phase 2, Detection & Analysis: Monitor SIEM alerts, validate incidents (true positive vs false positive), classify severity, determine scope, collect initial evidence.

Phase 3, Containment, Eradication & Recovery:

  • Containment: Isolate affected systems to prevent spread
  • Eradication: Remove the threat completely (malware, backdoors, compromised accounts)
  • Recovery: Restore systems from clean backups, verify integrity, monitor for reinfection

Phase 4, Post-Incident Activity: Write incident report, conduct lessons-learned meeting, update detection rules, improve procedures.

πŸ†“ Free Learning Resources

Resource Type Link
TryHackMe, SOC Level 1 Path Learning Path tryhackme.com
Professor Messer, Security+ SY0-701 Video (177 episodes) YouTube
MITRE ATT&CK Framework attack.mitre.org
NIST Cybersecurity Framework Framework nist.gov
CIS Controls Framework cisecurity.org
Cybrary, SOC Analyst Path Free Course cybrary.it

βœ… Phase 5 Checklist

  • Can explain CIA Triad with real-world examples
  • Understand common attack types and their detection methods
  • Know the Cyber Kill Chain stages
  • Can navigate MITRE ATT&CK and map techniques to detections
  • Understand the NIST IR framework phases
  • Know the NIST CSF 2.0 five functions
  • Familiar with CIS Controls and their prioritization
  • Completed TryHackMe SOC Level 1 Path (at least 50%)

πŸ”§ Phase 6: Blue Team Tools

Timeline: Weeks 8-14 Β· Effort: 2-3 hours/day

These are the tools you'll use every day in a SOC role. Focus on SIEM first, then expand to EDR, network detection, and forensics.

6.1 SIEM (Security Information and Event Management)

SIEM is your primary workspace as a SOC analyst. It collects logs from every system, correlates events, and generates alerts.

SIEM Market Position Query Language Free Option Learn At
Splunk Market leader, 78% of job postings SPL Free tier (500MB/day) splunk.com
Microsoft Sentinel Fastest growing, best AI integration KQL Free for M365 data Microsoft Learn
Elastic SIEM (ELK) Open source, highly flexible Lucene / KQL 100% free elastic.co
Wazuh Open source, unlimited Own syntax 100% free wazuh.com
IBM QRadar CE Enterprise, regulated industries AQL Community Edition ibm.com

Start with Splunk, it's in the most job postings. Then learn KQL for Sentinel.

Splunk SPL Examples:

# Find failed logins in the last 24 hours
index=windows EventCode=4625 earliest=-24h
| stats count by src_ip, user
| where count > 10
| sort -count

# Detect potential brute force
index=windows EventCode=4625
| bin _time span=5m
| stats count by _time, src_ip
| where count > 20

# Hunt for PowerShell execution
index=windows EventCode=4688 New_Process_Name="*powershell*"
| table _time, Computer, Account_Name, Process_Command_Line

KQL (Microsoft Sentinel) Examples:

// Find failed sign-ins
SigninLogs
| where ResultType != 0
| summarize FailedAttempts = count() by UserPrincipalName, IPAddress
| where FailedAttempts > 10
| order by FailedAttempts desc

// Detect suspicious process creation
DeviceProcessEvents
| where FileName in ("mimikatz.exe", "psexec.exe", "procdump.exe")
| project Timestamp, DeviceName, FileName, ProcessCommandLine

6.2 EDR / XDR (Endpoint Detection & Response)

Tool Key Features Market Position
CrowdStrike Falcon Cloud-native, threat intelligence, 1T+ daily events Market leader (#1 Gartner MQ)
Microsoft Defender for Endpoint Deep M365 integration, converging with Sentinel Most deployed (Windows ecosystem)
SentinelOne AI-driven autonomous response, Storyline visual narratives Fastest-growing
Carbon Black (VMware) Behavioral analysis, application control Enterprise-focused
Cortex XDR (Palo Alto) Network + endpoint correlation Best for Palo Alto shops

6.3 Network Detection

Tool Purpose Type Link
Wireshark Packet capture and deep protocol analysis Packet Analyzer wireshark.org
Suricata High-performance IDS/IPS, multi-threaded IDS/IPS suricata.io
Snort Signature-based IDS/IPS (Cisco) IDS/IPS snort.org
Zeek (Bro) Network metadata extraction, rich logs Network Monitor zeek.org
NetworkMiner Network forensic analysis, PCAP parser NFAT netresec.com
tcpdump Command-line packet capture CLI Tool Built into Linux
Arkime (Moloch) Large scale PCAP capture and search PCAP Search arkime.com

6.4 Forensics & Incident Response

Tool Purpose Link
Volatility 3 Memory forensics (RAM analysis) github.com/volatilityfoundation
Autopsy Disk forensics (open-source) autopsy.com
FTK Imager Disk imaging and evidence collection exterro.com
KAPE Rapid evidence collection kroll.com
Velociraptor Endpoint investigation at scale github.com/Velocidex
Eric Zimmerman's Tools Windows artifact parsing (MFT, ShellBags, etc.) ericzimmerman.github.io
Chainsaw Windows event log hunting github.com/WithSecureLabs

6.5 Detection & Threat Intelligence

Tool/Standard Purpose Link
SIGMA Rules Vendor-agnostic detection rules (3,000+) github.com/SigmaHQ
YARA Rules Malware pattern matching github.com/VirusTotal/yara
TheHive Open-source incident case management thehive-project.org
Cortex Observable analysis automation thehive-project.org
MISP Threat intelligence sharing platform misp-project.org
OpenCTI Cyber threat intelligence platform opencti.io
VirusTotal File/URL/IP analysis virustotal.com
AbuseIPDB IP reputation database abuseipdb.com
URLScan.io URL analysis and scanning urlscan.io
ANY.RUN Interactive malware sandbox any.run
Hybrid Analysis Free malware analysis hybrid-analysis.com

6.6 SOAR (Security Orchestration, Automation & Response)

Tool Type Link
Splunk SOAR Enterprise SOAR splunk.com
Microsoft Sentinel Logic Apps Cloud-native automation azure.microsoft.com
Shuffle Open-source SOAR github.com/Shuffle
Tines No-code SOAR tines.com
n8n Open-source workflow automation n8n.io

βœ… Phase 6 Checklist

  • Can write basic Splunk SPL queries
  • Understand what KQL is and can write basic queries
  • Can use Wireshark to analyze packet captures
  • Understand IDS/IPS concepts (Suricata/Snort)
  • Know what EDR does and the major players
  • Can explain what SIGMA and YARA rules do
  • Familiar with forensic tools (Volatility, Autopsy)
  • Know common threat intelligence platforms (VT, AbuseIPDB)
  • Installed Splunk Free or Wazuh in a VM

πŸ“œ Phase 7: Certifications

Timeline: Months 3-6

Certifications serve two purposes: passing HR filters and proving technical competence. The optimal path addresses both.

7.1 Recommended Certification Path

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  Security+   β”‚ ──► β”‚    BTL1      β”‚ ──► β”‚   SC-200     β”‚
β”‚  (HR Filter) β”‚     β”‚  (Hands-On)  β”‚     β”‚ (Sentinel)   β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                            β”‚
                            β–Ό
               β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
               β”‚ CySA+ / CDSA / CCD     β”‚
               β”‚ (Mid-Level Validation) β”‚
               β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                            β”‚
                            β–Ό
               β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
               β”‚ BTL2 / OSDA / GIAC     β”‚
               β”‚ (Advanced / Senior)    β”‚
               β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

7.2 Entry-Level Certifications

Cert Cost Format Study Time Why Get It Free Study Resources
CompTIA Security+ (SY0-701) $425 90 MCQ + PBQ, 750/900 pass 4-8 weeks In nearly every job posting. Globally recognized. Required for U.S. DoD roles. Professor Messer (177 free videos)
BTL1 (Blue Team Level 1) ~$495 24-hour hands-on lab exam 8-12 weeks Proves practical ability. Called "the OSCP of Blue Team." Training + exam included. Security Blue Team BTJA (free pathway)
Microsoft SC-200 $165 MCQ + case studies 4-6 weeks Validates Sentinel/KQL skills. Free training. Free annual renewal. Best value cert. Microsoft Learn (100% free)

7.3 Mid-Level Certifications

Cert Cost Format When to Get Details
CompTIA CySA+ (CS0-003) $404 MCQ + PBQ After Security+ Globally recognized. Covers security ops, vuln management, IR. DoD 8140 approved.
HTB CDSA $210-490 7-day practical After 6+ months learning Investigate 2 incidents, submit professional IR reports. HTB Academy: $8/mo with .edu email.
CCD (Certified CyberDefender) ~$800 48-hour practical After 6+ months learning Network + disk + memory forensics + threat hunting. Deeply respected in DFIR community.

7.4 Advanced Certifications

Cert Cost Format Notes
BTL2 ~$2,500 72-hour practical Senior Blue Team validation. Very challenging.
OSDA (OffSec Defense Analyst) $999+ Practical exam OffSec brand recognition (same company as OSCP).
GIAC GCIH $8,000-$9,000 MCQ + practical Gold standard. Incident handling. Avg holder salary: $132K.
GIAC GCIA $8,000-$9,000 MCQ + practical Intrusion analysis. Network forensics focused.
GIAC GCFA $8,000-$9,000 MCQ + practical Forensic analyst. Disk and memory forensics.
GIAC GCFE $8,000-$9,000 MCQ + practical Forensic examiner. Windows forensics focused.

πŸ’‘ Tip: GIAC certifications are extremely valuable but expensive. Get your employer to sponsor them after landing your first role.

βœ… Phase 7 Checklist

  • Passed CompTIA Security+ (or equivalent)
  • Enrolled in BTL1 training
  • Started Microsoft Learn SC-200 path
  • Created a certification study schedule
  • Joined study groups (Discord, Reddit)

πŸ‹οΈ Phase 8: Hands-On Practice

Timeline: Months 4-8 Β· Effort: Ongoing practice

Reading about security is not the same as doing it. These platforms provide simulated environments where theory becomes muscle memory.

8.1 Practice Platforms (Ranked by Learning Order)

# Platform What It Offers Cost Best For Link
1 TryHackMe Browser-based labs, SOC L1/L2 paths, 40+ defensive rooms Free + $14/mo Absolute beginners tryhackme.com
2 Blue Team Labs Online 254+ investigations, free BTJA pathway (6-7 hrs) Free tier Quick Blue Team intro blueteamlabs.online
3 LetsDefend Simulated SOC dashboard, alert queue, Elastic SIEM, 3000+ logs Free tier SOC workflow practice letsdefend.io
4 CyberDefenders Blue Team CTF challenges, 15+ categories, weekly new labs Free tier Intermediate challenges cyberdefenders.org
5 Hack The Box 100+ Sherlock defensive labs, Academy SOC path $8/mo student Advanced practice, CDSA path hackthebox.com

8.2 Recommended Learning Path (Step-by-Step)

Step 1: TryHackMe Pre-Security Path ──────────────── (Free, foundational)
   β”‚
Step 2: BTLO Free BTJA Pathway ───────────────────── (Free, 6-7 hours)
   β”‚
Step 3: TryHackMe SOC Level 1 Path ──────────────── (50-80 hours, core training)
   β”‚
Step 4: LetsDefend SOC Analyst Path ─────────────── (Real alert triage practice)
   β”‚
Step 5: CyberDefenders + HTB Sherlocks ──────────── (Intermediate challenges)
   β”‚
Step 6: TryHackMe SOC Level 2 Path ──────────────── (Advanced investigation)

8.3 Additional Practice Resources

Resource What It Is Link
Splunk BOTS Free Boss of the SOC CTF for SPL practice splunk.com
KC7 Free game-based KQL training kc7.dev
OpenSOC Free Blue Team competitions at DEF CON/BSides opensoc.io
Malware Traffic Analysis PCAP exercises with real malware traffic malware-traffic-analysis.net
SANS Holiday Hack Challenge Annual free security challenge holidayhackchallenge.com
RangeForce Enterprise security simulations rangeforce.com

βœ… Phase 8 Checklist

  • Completed TryHackMe Pre-Security and SOC Level 1 paths
  • Completed BTLO BTJA free pathway
  • Practiced alert triage on LetsDefend
  • Completed 5+ CyberDefenders challenges
  • Completed 5+ HTB Sherlocks
  • Practiced Splunk SPL on BOTS CTF
  • Written detailed writeups for completed challenges

πŸ“ Phase 9: Build Your Portfolio

Timeline: Months 5-9

Certifications prove knowledge. Projects prove you can do the work. Hiring managers consistently rank demonstrated practical skills above certification counts.

9.1 Home Lab Setup

Build a home lab that mirrors real enterprise environments:

Component Recommended Cost Purpose
Hardware 16GB+ RAM, SSD (32GB ideal) Your existing PC Run virtual machines
Hypervisor Proxmox or VirtualBox Free Virtualization platform
Firewall pfSense Free Network segmentation with VLANs
Domain Windows Server 2022 + AD Free trial / edu license Active Directory environment
Workstations Windows 10/11 VMs joined to domain Free trial Endpoints to monitor
SIEM Wazuh (unlimited) or Splunk Free (500MB/day) Free Log collection and alerting
Network Monitor Security Onion (includes Zeek + Suricata) Free Network security monitoring
Logging Sysmon on all Windows VMs Free Enhanced endpoint visibility
Malware Lab FlareVM or REMnux (isolated network) Free Safe malware analysis
Threat Emulation Atomic Red Team Free Simulate attacks for detection testing

Architecture Diagram:

                    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                    β”‚   pfSense   β”‚
                    β”‚  (Firewall) β”‚
                    β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”˜
                           β”‚
              β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
              β”‚            β”‚            β”‚
        β”Œβ”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”΄β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”
        β”‚  VLAN 10  β”‚ β”‚ VLAN 20β”‚ β”‚  VLAN 30 β”‚
        β”‚ Corporate β”‚ β”‚  SOC   β”‚ β”‚ Malware  β”‚
        β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€ β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€ β”‚  Lab     β”‚
        β”‚ Win Serverβ”‚ β”‚ Wazuh/ β”‚ β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
        β”‚ (DC + AD) β”‚ β”‚ Splunk β”‚ β”‚ FlareVM  β”‚
        β”‚ Win 10 x2 β”‚ β”‚ SecOn  β”‚ β”‚ REMnux   β”‚
        β”‚ Ubuntu    β”‚ β”‚ TheHiveβ”‚ β”‚(Isolated)β”‚
        β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

9.2 Six Projects That Get Interviews

  1. SIEM Deployment + Custom Dashboards

    • Deploy Wazuh or Splunk, ingest Windows event logs and Sysmon
    • Build dashboards showing failed logins, suspicious processes, network anomalies
    • Document the entire setup with architecture diagrams
  2. Adversary Emulation with Atomic Red Team

    • Install Atomic Red Team on a test machine
    • Execute techniques mapped to MITRE ATT&CK (e.g., T1003.001 credential dumping)
    • Verify whether your SIEM detects each attack
    • Write custom detection rules to close gaps
    • Document: technique tested β†’ expected alert β†’ actual result β†’ rule created
  3. Phishing Analysis Pipeline

    • Build a workflow: receive phishing email β†’ analyze headers β†’ decode URLs β†’ sandbox attachments β†’ extract IOCs
    • Tools: PhishTool, URLScan.io, ANY.RUN
    • Write Python scripts to automate IOC extraction
  4. Incident Response Reports from CTF Challenges

    • Complete HTB Sherlocks or CyberDefenders challenges
    • Write professional IR reports with: executive summary, timeline, IOC table, ATT&CK mapping, remediation recommendations
    • Publish on GitHub or Medium
  5. Threat Intelligence Brief on an APT Group

    • Choose an APT group (e.g., APT29, Lazarus Group, FIN7)
    • Research using MITRE ATT&CK, threat reports, OSINT
    • Produce a brief with: group overview, TTPs, IOCs, detection recommendations
    • Map their techniques to your SIEM rules
  6. Open-Source Detection Rule Contributions

    • Write SIGMA rules for specific attack techniques
    • Contribute to SigmaHQ/sigma
    • Write YARA rules for malware detection
    • Even 1 accepted PR demonstrates real skill

9.3 Where to Publish

Platform Audience Why
GitHub Technical recruiters, hiring managers Shows code, projects, and contributions
Medium Broad cybersecurity community CTF writeups drive interview callbacks
LinkedIn Articles Recruiters, network connections Direct recruiter visibility
Personal Blog (Hugo/Jekyll on GitHub Pages) Everyone Most professional, demonstrates technical skill

πŸ’‘ Blog about everything you build. Multiple sources confirm that Medium writeups of TryHackMe rooms and CTF challenges have directly led to interview callbacks for beginners.

βœ… Phase 9 Checklist

  • Home lab built and documented
  • SIEM deployed with log ingestion from multiple sources
  • At least 3 portfolio projects completed
  • Projects documented with screenshots and architecture diagrams
  • Blog posts published (at least 5)
  • GitHub profile updated with projects
  • SIGMA or YARA rule contributed to open-source (bonus)

πŸš€ Phase 10: Get Hired

Timeline: Months 8-12

The cybersecurity talent gap is real, 4.8 million positions unfilled globally. But competition for entry-level roles is fierce because many applicants lack practical demonstration of skills. Here's how to stand out.

10.1 Resume Optimization

Format: One page, ATS-optimized (no fancy formatting, standard sections).

Structure:

Professional Summary (3 lines)
Technical Skills (keywords from job postings)
Certifications (most relevant first)
Experience (quantify everything)
Projects / Home Lab
Education

Key Tips:

  • Mirror exact keywords from job postings (SIEM, Splunk, incident response, threat detection, MITRE ATT&CK)
  • Quantify everything: "Monitored 500+ daily alerts, reducing false positives by 30%"
  • Include a Projects section, home lab details, CTF achievements, platform completions
  • Bold your most important qualifications
  • Hiring managers spend ~30 seconds per resume

10.2 LinkedIn Optimization

  • Headline: SOC Analyst | SIEM | Incident Response | Threat Detection | Security+
  • About section: Key skills, career goals, link to GitHub/blog
  • Post regularly: CTF writeups, lab build guides, breach analysis, tool tips
  • Engage: Comment on posts by security leaders, join groups
  • Complete profiles receive 40% more recruiter outreach

10.3 Where to Apply

Source What It Offers Link
LinkedIn Largest job board, recruiter messaging linkedin.com/jobs
Indeed Broad job aggregator indeed.com
CyberSeek Maps cybersecurity positions worldwide cyberseek.org
Hack The Box Jobs Built for cybersecurity candidates hackthebox.com/jobs
SANS CyberTalent Hiring events and apprenticeships sans.org/cybertalent
Company career pages Apply directly at MSSPs Secureworks, Rapid7, CrowdStrike, Arctic Wolf

Entry Strategies:

  • MSSPs (Managed Security Service Providers): Lower entry barrier, rapid experience gain, excellent training ground
  • SOC Apprenticeships: Programs like Level Effect, SANS CyberTalent
  • Large enterprises: Formal SOC training programs (banks, healthcare, tech)
  • Apply broadly: Successful hires often apply 300-500 times

10.4 Interview Preparation

SOC analyst interviews typically have three parts: behavioral/cultural fit, foundational concepts, and scenario-based investigations. Scenario questions carry the most weight because they reveal how you actually think and work under pressure. Lab and CTF experiences absolutely count as real experience.

Foundational Concept Questions

These test whether you understand the basics. Expect them early in the interview.

Question What They're Testing
"Explain the CIA Triad with examples" Can you connect theory to real-world security
"What is the difference between IDS and IPS?" IDS monitors and alerts, IPS monitors and blocks
"Describe the TCP three-way handshake" SYN, SYN-ACK, ACK and why it matters for detection
"What is the difference between encryption and hashing?" Encryption is reversible (AES, RSA), hashing is one-way (SHA256, MD5)
"Explain authentication vs authorization" AuthN = who you are, AuthZ = what you can access
"What is the difference between a vulnerability, a threat, and a risk?" Weakness vs potential danger vs likelihood x impact
"What does the Zero Trust model mean?" Never trust, always verify, regardless of network location
"Name 5 common ports and their services" Tests memorization: 22/SSH, 53/DNS, 80/HTTP, 443/HTTPS, 3389/RDP
"What is DNS and how does resolution work?" Recursive query, root servers, TLD, authoritative, caching
"What is the difference between TCP and UDP?" Connection-oriented vs connectionless, reliability vs speed
"Explain what a VLAN is and why it matters for security" Logical network segmentation, reduces attack surface
"What is NAT and why is it used?" Translates private IPs to public, hides internal network structure

Framework & Methodology Questions

These test your understanding of how security operations are structured.

Question What They're Testing
"Walk me through the NIST Incident Response phases" Preparation, Detection & Analysis, Containment/Eradication/Recovery, Post-Incident
"How do you use MITRE ATT&CK in your daily work?" Map alerts to techniques, identify detection gaps, guide threat hunting
"What is the Cyber Kill Chain and how would you use it?" Understanding attack progression, detecting at each stage
"Explain the difference between NIST CSF and CIS Controls" CSF = strategic framework (5 functions), CIS = tactical controls (18 prioritized actions)
"What is the difference between a true positive, false positive, true negative, and false negative?" Critical for alert triage: TP = real alert, FP = false alarm, FN = missed attack (most dangerous)
"How would you reduce false positives in a SIEM?" Tune rules, add context/whitelists, correlate with threat intel, adjust thresholds
"What are IOCs and how do you use them?" Indicators of Compromise: IPs, domains, hashes, file names used to detect known threats
"What is the difference between IOCs and TTPs?" IOCs are specific artifacts (change often), TTPs are behavioral patterns (harder to change)

Tools & Technical Questions

These test your hands-on skills with the tools you will use daily.

Question What They're Testing
"Have you used any SIEM tools? Write a basic query" Practical Splunk SPL or KQL ability
"What is Sysmon and which Event IDs are most useful?" Event ID 1 (process creation), 3 (network), 11 (file create), 22 (DNS)
"Explain what SIGMA rules are and why they matter" Vendor-agnostic detection rules, convertible to any SIEM query format
"What Windows Event ID indicates a successful logon? A failed one?" 4624 = success, 4625 = failed
"How would you detect someone clearing Windows Event Logs?" Event ID 1102 in Security log
"What tools would you use for memory forensics?" Volatility (standard), also Rekall
"What is the purpose of Wireshark display filters vs capture filters?" Display filters = filter what you see, capture filters = filter what is collected
"You see Event ID 7045 in a Windows system log. What does it mean?" New service installed, potential persistence mechanism
"What is the difference between EDR and antivirus?" AV = signature-based file scanning, EDR = behavioral monitoring, detection, and response
"How does Kerberos authentication work?" TGT from KDC, TGS for services, why attackers target it (Kerberoasting, Golden Ticket)

Scenario-Based Questions (Most Important)

These carry the most weight. Interviewers want to see your thought process, not a perfect answer.

Scenario 1: Phishing Investigation

"A user reports a suspicious email. Walk me through your investigation."

1. Collect the email (full headers, not just forwarded body)
2. Analyze headers: check sender address vs display name, Return-Path, SPF/DKIM/DMARC results
3. Examine URLs: extract without clicking, check with URLScan.io, look for typosquatting
4. Sandbox attachments: submit to ANY.RUN or Hybrid Analysis
5. Query SIEM: find all recipients of the same email (Subject, sender, attachment hash)
6. Check if anyone clicked: proxy logs, DNS logs for the malicious domain
7. Check for credential submission: authentication logs for impossible travel or new locations
8. Extract IOCs: sender IP, domain, URLs, file hashes
9. If confirmed malicious: block sender/domain, quarantine from all mailboxes, reset credentials if needed
10. Document: create ticket, write findings, update block lists and detection rules

Scenario 2: Brute Force Detection

"You see 500 failed login attempts from a single IP in 10 minutes followed by a successful login. What do you do?"

1. Verify the alert: check Event IDs 4625 (failed) and 4624 (success) in SIEM
2. Identify the target account and source IP
3. Check IP reputation: AbuseIPDB, VirusTotal, geo-location
4. Assess the successful login: is it legitimate or did the attacker succeed?
5. If compromised: disable account, force password reset, check for lateral movement
6. Check for post-login activity: any new processes (4688), services (7045), group changes (4728)
7. Block the source IP at firewall level
8. Search for same IP targeting other accounts
9. Notify the account owner through a verified channel (not email, in case email is compromised)
10. Document and recommend: MFA enforcement, account lockout policies, geo-blocking

Scenario 3: Suspicious Process Execution

"Your EDR alerts on powershell.exe spawning from winword.exe. What does this mean and what do you do?"

1. This is a classic malicious macro behavior: Word document opens, runs PowerShell
2. Check the user: who opened the document? Was it from email?
3. Examine the PowerShell command line (Event ID 4688 or Sysmon Event 1):
   - Is it encoded/obfuscated? (Base64 encoded commands are suspicious)
   - Does it reach out to external IPs? (C2 communication)
   - Does it download additional payloads? (certutil, wget, Invoke-WebRequest)
4. Check network connections from that endpoint (Sysmon Event 3)
5. Isolate the endpoint via EDR if confirmed malicious
6. Trace back to the source: find the original email and document
7. Check for other endpoints with the same document hash
8. Collect forensic artifacts: memory dump, prefetch files, recent file activity
9. Map to MITRE ATT&CK: Initial Access (T1566.001 Spearphishing Attachment), Execution (T1059.001 PowerShell)
10. Escalate to Tier 2/IR team with all findings

Scenario 4: Lateral Movement Detection

"You notice a service account authenticating to 15 different servers within 3 minutes. Is this normal?"

1. Check baseline: does this service account normally authenticate to many servers? (some do for backups, monitoring)
2. If abnormal: check the authentication type (Kerberos, NTLM, RDP, PsExec)
3. Look for Event ID 4648 (explicit credentials) which indicates pass-the-hash or credential reuse
4. Check if PsExec or remote service artifacts exist (Event ID 7045 on target machines)
5. Review the source machine: was it recently compromised?
6. Check for data access patterns: did the account access file shares or databases?
7. If confirmed suspicious: disable the service account, isolate the source machine
8. Reset the service account credentials and any other accounts that used the same password
9. Check all 15 servers for signs of compromise (new services, scheduled tasks, new accounts)
10. Map to ATT&CK: Lateral Movement (T1021 Remote Services), Credential Access (T1003 Credential Dumping)

Scenario 5: Ransomware Response

"Multiple users report they cannot open their files and see a ransom note on their desktops. What are your first steps?"

1. DO NOT shut down affected machines (you may lose volatile memory evidence)
2. Isolate affected systems from the network immediately (disconnect, not power off)
3. Identify patient zero: which system was first affected? (check file modification timestamps)
4. Determine the ransomware strain: ransom note text, file extension, check ID Ransomware (id-ransomware.malwarehunterteam.com)
5. Assess scope: how many systems affected? Check SIEM for the ransomware file hash across all endpoints
6. Preserve evidence: memory dump of affected systems, copy of ransom note, sample of encrypted files
7. Check backup integrity: are backups clean and available for recovery?
8. Identify entry vector: phishing email, exposed RDP, vulnerable VPN, supply chain
9. Engage incident response team, management, and potentially legal/law enforcement
10. Begin containment: block C2 domains/IPs, patch the exploited vulnerability, reset all credentials

Scenario 6: Insider Threat

"DLP alerts show a user downloading 2GB of customer data to a USB drive at 11 PM. How do you handle this?"

1. Verify the alert: confirm the DLP event in logs, check what data was accessed
2. Check the user's normal behavior: do they usually access this data? Do they work late?
3. Review recent HR activity: is the user on a PIP, submitted resignation, or under investigation?
4. Check for other suspicious activity: personal email forwards, cloud storage uploads, print jobs
5. Do NOT alert the user yet, coordinate with HR and legal first
6. Preserve evidence: DLP logs, file access logs, badge entry/exit times, CCTV if applicable
7. Assess the sensitivity of the data: PII, financial records, intellectual property?
8. Follow your organization's insider threat policy for escalation
9. If data contains PII: assess data breach notification requirements (GDPR, CCPA, etc.)
10. Document everything with timestamps for potential legal proceedings

Scenario 7: SIEM Down During an Incident

"Your SIEM goes down while you're investigating an active incident. What do you do?"

1. Don't panic: switch to alternative data sources
2. Use EDR console directly for endpoint telemetry
3. Check firewall and proxy logs through their native interfaces
4. Use PowerShell/CLI to query Windows Event Logs directly on affected systems
5. Check network monitoring tools (Zeek, Suricata) for network-level visibility
6. Document everything manually with timestamps
7. Coordinate with the SIEM/IT team for restoration while continuing investigation
8. Once SIEM is back, backfill your investigation with log data from the downtime period

Behavioral Questions

Don't underestimate these. They assess culture fit and how you handle real-world SOC pressures.

Question What They Want to Hear
"How do you stay current with cybersecurity news?" Specific sources: DFIR Report, Krebs, Darknet Diaries, Twitter/X infosec community, RSS feeds
"Describe a time you had to learn something quickly" Show adaptability, mention a specific tool or concept from labs/CTFs
"How do you handle working rotating shifts?" Honest answer about work-life balance, show you understand SOC reality
"What do you do when you disagree with a senior analyst's assessment?" Respectful pushback with evidence, escalation path, willingness to learn
"How do you prioritize when multiple alerts fire at once?" Severity-based triage, critical assets first, follow the playbook, communicate with team
"Tell me about a mistake you made and what you learned" Shows self-awareness, growth mindset, process improvement
"Why Blue Team instead of Red Team?" Genuine answer about defending, protecting people, the challenge of detection
"What's a recent security breach you found interesting?" Demonstrates you follow the industry, can analyze from a defender's perspective

Investigation Methodologies to Practice

DNS Tunneling Detection:

1. Monitor for high volume of DNS queries to a single domain
2. Look for unusually long subdomain names (data encoded in subdomain)
3. Check for TXT record queries (often used for data exfiltration)
4. Identify DNS traffic to non-standard ports
5. Compare against baseline DNS patterns for the organization

Malicious Binary Analysis (Basic):

1. NEVER execute the file on a production machine
2. Calculate file hash (MD5, SHA256) and check VirusTotal
3. Check file properties: size, compile date, digital signature
4. Run strings analysis: look for URLs, IPs, suspicious function calls
5. Submit to a sandbox (ANY.RUN, Hybrid Analysis) for dynamic analysis
6. Check for known malware family matches
7. Extract IOCs and update detection rules

Compromised Account Investigation:

1. Review authentication logs: impossible travel, new device, unusual hours
2. Check MFA status: was MFA bypassed or not configured?
3. Review email activity: forwarding rules, sent items, deleted items
4. Check for inbox rules created to hide attacker emails
5. Review file access: SharePoint, OneDrive, internal file servers
6. Check for OAuth app consents (common persistence in cloud environments)
7. Reset credentials, revoke sessions, review and remove suspicious OAuth apps

10.5 Interview Resources

Resource Link
LetsDefend, SOC Interview Questions letsdefend.io
GitHub, SOC-Interview-Questions github.com/LetsDefend
TryHackMe, SOC Analyst Interview Prep tryhackme.com
Cybersecurity Interview Bible (YouTube) Search "SOC analyst interview questions"

βœ… Phase 10 Checklist

  • Resume written, ATS-optimized, one page
  • LinkedIn profile complete and active
  • Applying to 5-10 positions per week
  • Practiced the phishing investigation methodology
  • Can answer all common interview questions
  • Have 2-3 incident stories from labs/CTFs ready
  • Networking through Discord, Reddit, LinkedIn
  • Attending BSides or other security events

🎯 Defensive Security Career Paths

Role Salary Range What You Do Entry Point
SOC Analyst (Tier 1) $50K–$80K Monitor alerts, triage, escalate This roadmap
SOC Analyst (Tier 2) $70K–$110K Deep investigation, correlation, root cause 1-2 years as T1
SOC Analyst (Tier 3) $100K–$140K+ Threat hunting, detection development 2-4 years
Incident Responder $85K–$135K Containment, forensics, recovery 2-3 years
Threat Hunter $90K–$152K Proactive search for hidden threats 3-5 years
Detection Engineer $119K–$215K Write detection rules, SIGMA, automation 2-4 years
Security Engineer $110K–$170K+ Build and maintain security infrastructure 3-5 years
Digital Forensics Analyst $65K–$132K Evidence preservation, disk/memory analysis 2-3 years
Malware Analyst $77K–$141K Reverse engineer malicious code 3-5 years
GRC Analyst $70K–$155K Compliance, risk assessment, policy Accessible from non-technical backgrounds

Typical Career Progression:

IT Support β†’ SOC Analyst T1 β†’ T2 β†’ T3/Threat Hunter β†’ Senior Lead β†’ Security Engineer β†’ Architect β†’ CISO

πŸ“‘ 2026 Industry Trends

Stay ahead by understanding where the industry is heading:

  • πŸ€– AI in the SOC: 55% of security teams deploy AI copilots. Investigations complete 45-61% faster. Learn to work WITH AI, not against it.
  • ☁️ Cloud Security: 88% of organizations run hybrid/multi-cloud. Learn AWS CloudTrail, Azure Sentinel, GCP Security Command Center.
  • πŸ” Zero Trust: U.S. DoD allocated $977M for zero trust. NIST released SP 1800-35. 63% of organizations implementing.
  • πŸ” Detection Engineering: Hottest Blue Team specialty ($119K-$215K). Detection-as-code, SIGMA rules, CI/CD pipelines.
  • πŸ€– SOAR & Automation: 50+ agentic SOC vendors. AI handling 60% of SOC workloads within 3 years.
  • πŸ†” Identity Security: ITDR (Identity Threat Detection and Response) is the fastest-growing security category.

πŸ“š Free Resources Directory

YouTube Channels

Channel Focus Link
Professor Messer Security+ & Network+ full courses YouTube
John Hammond CTFs, DFIR, malware analysis YouTube
13Cubed Windows forensics, memory analysis YouTube
Simply Cyber Daily news and career guidance YouTube
Day Cyberwox Cloud security and home labs YouTube
NetworkChuck Fun networking fundamentals YouTube
The Cyber Mentor Ethical hacking and security career YouTube
SANS Institute Conference talks and training previews YouTube
David Bombal Networking, Python, expert interviews YouTube
LiveOverflow Binary exploitation, CTF deep dives YouTube
IppSec Hack The Box walkthroughs, methodology YouTube
Hak5 Security tools, hardware hacking YouTube
Black Hills InfoSec Threat hunting, SOC webcasts, free training YouTube
Active Countermeasures Threat hunting techniques and tools YouTube
Malware Analysis for Hedgehogs Reverse engineering, malware deep dives YouTube
PC Security Channel Malware testing, antivirus comparisons YouTube
Cyberspatial Certification study guides (CySA+, CASP+) YouTube
Infosec Institute Enterprise security, GRC, awareness training YouTube
Security Onion Network security monitoring tutorials YouTube
Gerald Auger SOC career strategy, resume reviews YouTube

Blogs

Blog Focus Link
The DFIR Report Real intrusion analyses with ATT&CK thedfirreport.com
Red Canary Blog Threat detection report, detection engineering redcanary.com/blog
SANS Internet Storm Center Daily security diaries isc.sans.edu
Krebs on Security Investigative cybersecurity journalism krebsonsecurity.com
Elastic Security Labs Threat research and detection rules elastic.co/security-labs

Podcasts

Podcast Focus Link
Darknet Diaries True cybercrime stories darknetdiaries.com
SANS Blueprint SOC operations and Blue Team leadership sans.org
CyberWire Daily Concise 15-min daily news thecyberwire.com
Defensive Security Podcast Weekly breach reviews with defensive lessons defensivesecurity.org
Microsoft Threat Intelligence APT insights from Microsoft researchers Microsoft

GitHub Repositories

Repo Description Link
SigmaHQ/sigma 3,000+ vendor-agnostic detection rules github.com
sbousseaden/EVTX-ATTACK-SAMPLES Windows event log samples mapped to ATT&CK github.com
fabacab/awesome-cybersecurity-blueteam Curated Blue Team tool list github.com
InQuest/awesome-yara YARA rules collection github.com
aboutsecurity/blueteam_homelabs Home lab build resources github.com
A-poc/BlueTeam-Tools 65+ Blue Team tools list github.com
SwiftOnSecurity/sysmon-config Sysmon configuration template github.com
redcanaryco/atomic-red-team Adversary emulation for detection testing github.com
LetsDefend/SOC-Interview-Questions Interview preparation github.com

Communities

Community Platform Link
Blue Team Village Discord blueteamvillage.org
Security Blue Team Discord (21K+ members) discord.gg/securityblueteam
Black Hills InfoSec Discord discord.gg/bhis
r/blueteamsec Reddit reddit.com/r/blueteamsec
r/cybersecurity Reddit reddit.com/r/cybersecurity
r/netsec Reddit reddit.com/r/netsec
r/SecurityCareerAdvice Reddit reddit.com/r/SecurityCareerAdvice

🀝 Contributing

Contributions are welcome! If you have suggestions for resources, tools, or improvements:

  1. Fork this repository
  2. Create a feature branch (git checkout -b add-new-resource)
  3. Commit your changes (git commit -m 'Add: new DFIR tool')
  4. Push to the branch (git push origin add-new-resource)
  5. Open a Pull Request

Contribution Guidelines:

  • Resources must be free or have a free tier
  • Include a brief description of why the resource is valuable
  • Follow the existing format
  • Verify all links are working
  • No promotional content

Made by Kerem
If this roadmap helped you, give it a ⭐ and share it with someone who needs it!

Instagram GitHub

About

The most comprehensive, step-by-step roadmap for breaking into defensive cybersecurity. From absolute zero to your first Blue Team role. Every skill, tool, certification, and resource you need. No experience required.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors