letsdefend.io Open in urlscan Pro
2606:4700:20::681a:f3d  Public Scan

URL: https://letsdefend.io/blog/?s=skills
Submission: On February 26 via manual from BG — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://letsdefend.io/blog/

<form role="search" aria-label="Search for:" method="get" class="search-form" action="https://letsdefend.io/blog/">
  <label for="search-form-1">
    <span class="screen-reader-text"> Search for: </span>
    <input type="search" id="search-form-1" class="search-field" placeholder="Search …" value="skills" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

GET https://letsdefend.io/blog/

<form role="search" method="get" class="search-form" action="https://letsdefend.io/blog/">
  <label for="search-form-2">
    <span class="screen-reader-text"> Search for: </span>
    <input type="search" id="search-form-2" class="search-field" placeholder="Search …" value="skills" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Name: mc-embedded-subscribe-formPOST https://letsdefend.us14.list-manage.com/subscribe/post?u=74bda5edf824cea8aad36e707&id=b5b70df1e0

<form action="https://letsdefend.us14.list-manage.com/subscribe/post?u=74bda5edf824cea8aad36e707&amp;id=b5b70df1e0" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="validate" target="_blank" novalidate="">
  <div id="mc_embed_signup_scroll">
    <h2>Subscribe</h2>
    <div class="mc-field-group">
      <label for="mce-EMAIL">Email Address <span class="asterisk">*</span>
      </label>
      <input type="email" value="" name="EMAIL" class="required email" id="mce-EMAIL">
    </div>
    <div hidden="true"><input type="hidden" name="tags" value="7162497"></div>
    <div id="mce-responses" class="clear">
      <div class="response" id="mce-error-response" style="display:none"></div>
      <div class="response" id="mce-success-response" style="display:none"></div>
    </div> <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->
    <div style="position: absolute; left: -5000px;" aria-hidden="true"><input type="text" name="b_74bda5edf824cea8aad36e707_b5b70df1e0" tabindex="-1" value=""></div>
    <div class="clear"><input type="submit" value="Subscribe" name="subscribe" id="mc-embedded-subscribe" class="button"></div>
  </div>
</form>

Text Content

Skip to the content
LetsDefend Blue Team Blog
.cls-1{fill:%23313335}

Search for:
Close search



SEARCH: “SKILLS”

We found 16 results for your search.

Categories
Cyber Security Success Story


A JOURNEY FROM ELECTRICAL & ELECTRONICS ENGINEERING (EEE) TO CYBERSECURITY

 * Post author .cls-1{fill:%23313335} By Omer Gunal
 * Post date .cls-1{fill:%23313335} February 19, 2024

We interviewed Jitendra, exploring his journey. He commenced his career as an
Electrical & Electronics Engineer and seamlessly transitioned into the
cybersecurity industry, showcasing a dynamic and evolving professional
trajectory. Can you share your journey into the field of cybersecurity and how
you initially got started as an intern? My journey began with a strongRead More

 * Tags .cls-1{fill:%23313335} eee-to-cybersecurity, letsdefend learner

Categories
Attacking Cyber Security Detection Incident Response SIEM


EXPLOITATION & ANALYSIS OF APACHE OFBIZ ZERO-DAY VULNERABILITIES: CVE-2023-49070
& CVE-2023-51467

 * Post author .cls-1{fill:%23313335} By Admin
 * Post date .cls-1{fill:%23313335} January 19, 2024

A Red & Blue Team Perspective on Remote Code Execution (RCE) Analysis In this
blog article, we discuss CVE-2023-51467, a zero-day SSRF vulnerability in Apache
OFBiz. This vulnerability arises from an incomplete patch for CVE-2023-49070, a
pre-authenticated RCE flaw. As you read you will also learn: Vulnerability:    
        CVE-2023-49070 &Read More

 * Tags .cls-1{fill:%23313335} Apache OFBiz Zero-Day, CVE-2023-49070,
   CVE-2023-51467

Categories
Cyber Security SOC Analyst Success Story


GETTING STARTED IN CYBERSECURITY: JEREMIAH’S STORY

 * Post author .cls-1{fill:%23313335} By Admin
 * Post date .cls-1{fill:%23313335} January 8, 2024

Can you tell us about your background? Thank you for the opportunity to be put
out on this platform. My name is Jeremiah Olubunmi, a 20 year old male boy. Born
and bred in the city of Jos, Plateau State, Nigeria. I hail from Oyo State, so I
am proudly Yoruba by tribe. I graduatedRead More

 * Tags .cls-1{fill:%23313335} getting started in cybersecurity, letsdefend
   learner story

Categories
Cyber Security SOC Analyst Success Story


IT STUDENT TO CYSA+ OWNER: MICAH’S SUCCESS STORY

 * Post author .cls-1{fill:%23313335} By Admin
 * Post date .cls-1{fill:%23313335} May 15, 2023

Can you introduce yourself? Hi! My name is Micah. I’m an IT student about to
graduate with my Bachelors degree in Networking & Information Systems. My
associates is in Networking & Cybersecurity. My dream job is SOC Analyst Tier 1.
The job is about doing the most fascinating stuff I’ve ever learned, but
EVERYDAY. TheRead More

 * Tags .cls-1{fill:%23313335} CySA exam, CySA LetsDefend, CySA Success story

Categories
Cyber Security Detection Incident Response SOC Analyst


CYBERSECURITY BOOTCAMP: A QUICK PATH TO A CAREER IN CYBERSECURITY

 * Post author .cls-1{fill:%23313335} By Admin
 * Post date .cls-1{fill:%23313335} February 20, 2023

Cybersecurity is a rapidly growing field, as the amount of data and technology
being used in the world continues to increase. One way to break into the field
is through a cybersecurity bootcamp. These bootcamps are short-term, intensive
training programs that aim to teach the essential skills needed to start a
career in cybersecurity. ThereRead More


Categories
Cyber Security SOC Analyst


SOC ANALYST VS SOFTWARE DEVELOPER

 * Post author .cls-1{fill:%23313335} By Admin
 * Post date .cls-1{fill:%23313335} January 11, 2023

In this blog post, information about SOC Analyst and Software Developer has been
discussed. SOC Analyst What Does a SOC Analyst Do? SOC Analysts try to detect
anomalous behavior by monitoring the activities of the digital assets within
their institutions. After detecting an abnormal security event suitable for the
attacker’s behavior, it quickly performs theRead More

 * Tags .cls-1{fill:%23313335} cybersecurity vs software, SOC Analyst vs
   Software developer

Categories
Cyber Security Detection Incident Response SOC Analyst


HOW TO TRAIN YOUR SOC TEAM AS A MANAGER?

 * Post author .cls-1{fill:%23313335} By Admin
 * Post date .cls-1{fill:%23313335} November 10, 2022
 * No Comments on How to Train Your SOC Team as a Manager?

Everyone agrees that there are difficulties in finding qualified people for the
SOC environment. As a result of our research, there are some reports published
on this subject, and according to these reports, the important causes of the
problem are burnout, overwork, and a stressful working environment. When the
remote working model, which has becomeRead More

 * Tags .cls-1{fill:%23313335} how to train SOC team, SOC for managers, SOC
   training

Categories
Cyber Security SOC Analyst


BOOK RECOMMENDATIONS FOR SOC ANALYST CANDIDATES

 * Post author .cls-1{fill:%23313335} By Admin
 * Post date .cls-1{fill:%23313335} August 4, 2022
 * No Comments on Book Recommendations for SOC Analyst Candidates

SOC Analyst candidates and students who would like to sharpen their Blue Team
skills can benefit from the books in order to improve themselves and have
information on this subject. In this article, we will talk about 3 different
books that cover basic topics to introduce to the blue team subject. Title: Blue
Team Handbook:Read More

 * Tags .cls-1{fill:%23313335} books for soc analyst candidates, cybersecurity
   book recommendations, soc analyst books

Categories
Cyber Security SOC Analyst


SOC ANALYST VS PENETRATION TESTER: WHICH CAREER PATH IS THE BEST?

 * Post author .cls-1{fill:%23313335} By Admin
 * Post date .cls-1{fill:%23313335} April 18, 2022
 * No Comments on SOC Analyst vs Penetration Tester: Which career path is the
   best?

Candidates who want to pursue a career in cyber security should have knowledge
of the sub-branch of cyber security that they want to specialize in. In this
article, we discuss penetration tester and SOC analyst, two important
professions in the industry and explain what employees in both professions do,
their daily work routines, what skillsRead More

 * Tags .cls-1{fill:%23313335} pentest vs soc analyst, soc analyst salary, soc
   analyst vs penetration tester

Categories
Cyber Security SOC Analyst


SOC ANALYST LEVELS: DESCRIPTION, REQUIREMENTS, CAREER

 * Post author .cls-1{fill:%23313335} By Admin
 * Post date .cls-1{fill:%23313335} March 16, 2022
 * No Comments on SOC Analyst Levels: Description, Requirements, Career

Who is a SOC Analyst? The security operations center (SOC) analyst is a
cybersecurity expert responsible for monitoring and responding to threats to an
organization’s IT infrastructure. Tier 1 SOC Analyst Core Task The main task of
the Tier 1 SOC analyst is monitoring. He/she performs daily monitoring routines
during working hours and examines alarmsRead More

 * Tags .cls-1{fill:%23313335} security analyst levels, soc analyst levels, tier
   1 soc analyst


POSTS NAVIGATION

← Newer Posts1 2 Older Posts →
Search for:


SUBSCRIBE

Email Address *






CATEGORIES

 * Attacking
 * Cyber Security
 * Detection
 * Incident Response
 * Malware
 * News
 * Phishing
 * Python
 * SIEM
 * SOC Analyst
 * Success Story
 * Writeup

 * 

Credence Powered by WordPress
↑ ↑