Skip to content

Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, podcasts, Twitter/X accounts and a set of tools relevant to the role of SOC analyst.

License

Notifications You must be signed in to change notification settings

st0pp3r/awesome-soc-analyst

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

74 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Awesome SOC Analyst Awesome

URL Check Create Bookmarks FileSpell Check

Online resources for SOC Analysts. Resources related to incident investigation, blogs, newsletters, good reads, books, trainings, podcasts, Twitter/X accounts and a set of online tools for day-to-day investigations. The repo generates a bookmark file for easy import to your browser.

I will mostly include resources that are tailored as much as possible to the role of the SOC Analyst and not the field of cyber security in general.

Contributions are welcome!

Contents

  • Resources and Reference Material - Various reference materials, frameworks, and guidelines for cyber defense.
  • Attack Reference Material - Attack-specific reference materials for understanding tactics, techniques, and procedures.
  • Event Log References - Vendor documentation and references for event logs.
  • Blogs - Blogs that offer valuable insights and updates in security and incident handling.
  • Good Reads - Recommended reading materials for expanding knowledge in cyber defense.
  • Newsletters - Newsletters that provide curated content and updates in the cyber security space.
  • Podcasts - Podcasts related to cyber defense, incident response, and security topics.
  • Books - Books focused on improving knowledge and skills in cyber defense and security.
  • Training and Certifications - Training programs and certifications relevant to security operations and incident response.
  • Twitter/X - Notable Twitter/X accounts to follow for security updates and news.
  • Interview Questions - Sample interview questions for cybersecurity roles, particularly for SOC analysts.
  • Tools - A collection of essential tools for security operations, categorized for easy reference:
    • Sandboxes - Sandboxes for safe malware analysis and testing.
    • IOC Lookups - Tools for looking up Indicators of Compromise (IOCs).
    • Emails - Tools for analyzing and investigating email headers and email-related data.
    • Multifunctional LookUp Services - Tools for searching multiple data points (IP, URL, Domain, etc.).
    • Fingerprinting - Tools for identifying and fingerprinting devices and services.
    • Network Scanning - Tools for scanning and analyzing network traffic.
    • SSL/TLS - Tools for scanning and analyzing SSL/TLS configurations.
    • Website Scan - Tools for scanning websites for security vulnerabilities.
    • CMS Scan - Tools for scanning Content Management Systems (CMS) for vulnerabilities.
    • URL - Tools for analyzing and investigating URLs.
    • DNS - Tools for analyzing and querying DNS records.
    • MAC - Tools for looking up and identifying MAC addresses.
    • ASN - Tools for querying ASN information.
    • Browser Extension - Browser extensions for security professionals.
    • User Agent - Tools for investigating and analyzing User Agent data.
    • USB and PCI - Tools related to USB and PCI devices for security analysis.
    • EXE Lookup - Tools for analyzing executable files.
    • Certificate - Tools for analyzing certificates.
    • Hash - Tools for hashing and investigating file hashes.
    • Misc Tools - Miscellaneous tools useful for various security tasks.
    • Data Manipulation Online Tools - Online tools for data manipulation and analysis.

Resources and Reference Material

Attack Reference Material

Event Log References

Blogs

Good Reads

Newsletters

Podcasts

Books

Training and Certifications

Twitter/X

Interview Questions

Tools

Sandboxes

IOC Lookups

Emails

Multifunctional LookUp Services

Fingerprinting

Network Scanning

SSL/TLS

Website Scan

CMS Scan

URL

DNS

MAC

ASN

Browser Extension

User Agent

USB and PCI

  • DeviceHunt - Find your device & driver from a massive database of PCI and USB devices.

EXE Lookup

  • EchoTrail - Look up information about known files using hash or process name.
  • XCyclopedia - Look up information about known exe files - hashes, known paths, metadata, other.\

Certificate

Hash

Misc Tools

Data Manipulation Online Tools

About

Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, podcasts, Twitter/X accounts and a set of tools relevant to the role of SOC analyst.

Topics

Resources

License

Code of conduct

Contributing

Stars

Watchers

Forks

Languages