letsdefend.io
Open in
urlscan Pro
2606:4700:20::681a:f3d
Public Scan
URL:
https://letsdefend.io/blog/?s=skills
Submission: On February 26 via manual from BG — Scanned from DE
Submission: On February 26 via manual from BG — Scanned from DE
Form analysis
3 forms found in the DOMGET https://letsdefend.io/blog/
<form role="search" aria-label="Search for:" method="get" class="search-form" action="https://letsdefend.io/blog/">
<label for="search-form-1">
<span class="screen-reader-text"> Search for: </span>
<input type="search" id="search-form-1" class="search-field" placeholder="Search …" value="skills" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
GET https://letsdefend.io/blog/
<form role="search" method="get" class="search-form" action="https://letsdefend.io/blog/">
<label for="search-form-2">
<span class="screen-reader-text"> Search for: </span>
<input type="search" id="search-form-2" class="search-field" placeholder="Search …" value="skills" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
Name: mc-embedded-subscribe-form — POST https://letsdefend.us14.list-manage.com/subscribe/post?u=74bda5edf824cea8aad36e707&id=b5b70df1e0
<form action="https://letsdefend.us14.list-manage.com/subscribe/post?u=74bda5edf824cea8aad36e707&id=b5b70df1e0" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="validate" target="_blank" novalidate="">
<div id="mc_embed_signup_scroll">
<h2>Subscribe</h2>
<div class="mc-field-group">
<label for="mce-EMAIL">Email Address <span class="asterisk">*</span>
</label>
<input type="email" value="" name="EMAIL" class="required email" id="mce-EMAIL">
</div>
<div hidden="true"><input type="hidden" name="tags" value="7162497"></div>
<div id="mce-responses" class="clear">
<div class="response" id="mce-error-response" style="display:none"></div>
<div class="response" id="mce-success-response" style="display:none"></div>
</div> <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->
<div style="position: absolute; left: -5000px;" aria-hidden="true"><input type="text" name="b_74bda5edf824cea8aad36e707_b5b70df1e0" tabindex="-1" value=""></div>
<div class="clear"><input type="submit" value="Subscribe" name="subscribe" id="mc-embedded-subscribe" class="button"></div>
</div>
</form>
Text Content
Skip to the content LetsDefend Blue Team Blog .cls-1{fill:%23313335} Search for: Close search SEARCH: “SKILLS” We found 16 results for your search. Categories Cyber Security Success Story A JOURNEY FROM ELECTRICAL & ELECTRONICS ENGINEERING (EEE) TO CYBERSECURITY * Post author .cls-1{fill:%23313335} By Omer Gunal * Post date .cls-1{fill:%23313335} February 19, 2024 We interviewed Jitendra, exploring his journey. He commenced his career as an Electrical & Electronics Engineer and seamlessly transitioned into the cybersecurity industry, showcasing a dynamic and evolving professional trajectory. Can you share your journey into the field of cybersecurity and how you initially got started as an intern? My journey began with a strongRead More * Tags .cls-1{fill:%23313335} eee-to-cybersecurity, letsdefend learner Categories Attacking Cyber Security Detection Incident Response SIEM EXPLOITATION & ANALYSIS OF APACHE OFBIZ ZERO-DAY VULNERABILITIES: CVE-2023-49070 & CVE-2023-51467 * Post author .cls-1{fill:%23313335} By Admin * Post date .cls-1{fill:%23313335} January 19, 2024 A Red & Blue Team Perspective on Remote Code Execution (RCE) Analysis In this blog article, we discuss CVE-2023-51467, a zero-day SSRF vulnerability in Apache OFBiz. This vulnerability arises from an incomplete patch for CVE-2023-49070, a pre-authenticated RCE flaw. As you read you will also learn: Vulnerability: CVE-2023-49070 &Read More * Tags .cls-1{fill:%23313335} Apache OFBiz Zero-Day, CVE-2023-49070, CVE-2023-51467 Categories Cyber Security SOC Analyst Success Story GETTING STARTED IN CYBERSECURITY: JEREMIAH’S STORY * Post author .cls-1{fill:%23313335} By Admin * Post date .cls-1{fill:%23313335} January 8, 2024 Can you tell us about your background? Thank you for the opportunity to be put out on this platform. My name is Jeremiah Olubunmi, a 20 year old male boy. Born and bred in the city of Jos, Plateau State, Nigeria. I hail from Oyo State, so I am proudly Yoruba by tribe. I graduatedRead More * Tags .cls-1{fill:%23313335} getting started in cybersecurity, letsdefend learner story Categories Cyber Security SOC Analyst Success Story IT STUDENT TO CYSA+ OWNER: MICAH’S SUCCESS STORY * Post author .cls-1{fill:%23313335} By Admin * Post date .cls-1{fill:%23313335} May 15, 2023 Can you introduce yourself? Hi! My name is Micah. I’m an IT student about to graduate with my Bachelors degree in Networking & Information Systems. My associates is in Networking & Cybersecurity. My dream job is SOC Analyst Tier 1. The job is about doing the most fascinating stuff I’ve ever learned, but EVERYDAY. TheRead More * Tags .cls-1{fill:%23313335} CySA exam, CySA LetsDefend, CySA Success story Categories Cyber Security Detection Incident Response SOC Analyst CYBERSECURITY BOOTCAMP: A QUICK PATH TO A CAREER IN CYBERSECURITY * Post author .cls-1{fill:%23313335} By Admin * Post date .cls-1{fill:%23313335} February 20, 2023 Cybersecurity is a rapidly growing field, as the amount of data and technology being used in the world continues to increase. One way to break into the field is through a cybersecurity bootcamp. These bootcamps are short-term, intensive training programs that aim to teach the essential skills needed to start a career in cybersecurity. ThereRead More Categories Cyber Security SOC Analyst SOC ANALYST VS SOFTWARE DEVELOPER * Post author .cls-1{fill:%23313335} By Admin * Post date .cls-1{fill:%23313335} January 11, 2023 In this blog post, information about SOC Analyst and Software Developer has been discussed. SOC Analyst What Does a SOC Analyst Do? SOC Analysts try to detect anomalous behavior by monitoring the activities of the digital assets within their institutions. After detecting an abnormal security event suitable for the attacker’s behavior, it quickly performs theRead More * Tags .cls-1{fill:%23313335} cybersecurity vs software, SOC Analyst vs Software developer Categories Cyber Security Detection Incident Response SOC Analyst HOW TO TRAIN YOUR SOC TEAM AS A MANAGER? * Post author .cls-1{fill:%23313335} By Admin * Post date .cls-1{fill:%23313335} November 10, 2022 * No Comments on How to Train Your SOC Team as a Manager? Everyone agrees that there are difficulties in finding qualified people for the SOC environment. As a result of our research, there are some reports published on this subject, and according to these reports, the important causes of the problem are burnout, overwork, and a stressful working environment. When the remote working model, which has becomeRead More * Tags .cls-1{fill:%23313335} how to train SOC team, SOC for managers, SOC training Categories Cyber Security SOC Analyst BOOK RECOMMENDATIONS FOR SOC ANALYST CANDIDATES * Post author .cls-1{fill:%23313335} By Admin * Post date .cls-1{fill:%23313335} August 4, 2022 * No Comments on Book Recommendations for SOC Analyst Candidates SOC Analyst candidates and students who would like to sharpen their Blue Team skills can benefit from the books in order to improve themselves and have information on this subject. In this article, we will talk about 3 different books that cover basic topics to introduce to the blue team subject. Title: Blue Team Handbook:Read More * Tags .cls-1{fill:%23313335} books for soc analyst candidates, cybersecurity book recommendations, soc analyst books Categories Cyber Security SOC Analyst SOC ANALYST VS PENETRATION TESTER: WHICH CAREER PATH IS THE BEST? * Post author .cls-1{fill:%23313335} By Admin * Post date .cls-1{fill:%23313335} April 18, 2022 * No Comments on SOC Analyst vs Penetration Tester: Which career path is the best? Candidates who want to pursue a career in cyber security should have knowledge of the sub-branch of cyber security that they want to specialize in. In this article, we discuss penetration tester and SOC analyst, two important professions in the industry and explain what employees in both professions do, their daily work routines, what skillsRead More * Tags .cls-1{fill:%23313335} pentest vs soc analyst, soc analyst salary, soc analyst vs penetration tester Categories Cyber Security SOC Analyst SOC ANALYST LEVELS: DESCRIPTION, REQUIREMENTS, CAREER * Post author .cls-1{fill:%23313335} By Admin * Post date .cls-1{fill:%23313335} March 16, 2022 * No Comments on SOC Analyst Levels: Description, Requirements, Career Who is a SOC Analyst? The security operations center (SOC) analyst is a cybersecurity expert responsible for monitoring and responding to threats to an organization’s IT infrastructure. Tier 1 SOC Analyst Core Task The main task of the Tier 1 SOC analyst is monitoring. He/she performs daily monitoring routines during working hours and examines alarmsRead More * Tags .cls-1{fill:%23313335} security analyst levels, soc analyst levels, tier 1 soc analyst POSTS NAVIGATION ← Newer Posts1 2 Older Posts → Search for: SUBSCRIBE Email Address * CATEGORIES * Attacking * Cyber Security * Detection * Incident Response * Malware * News * Phishing * Python * SIEM * SOC Analyst * Success Story * Writeup * Credence Powered by WordPress ↑ ↑