by Josh Daniels | Sep 24, 2025 | Career Advice, SOC
On paper, or YouTube feeds, the cyber security job market looks like there’s endless demand for talent. In reality, the “entry-level” postings for SOC (Security Operations Center) analyst roles often expect experience that looks more like mid-level. The result:...
by Josh Daniels | Sep 10, 2025 | Learning, SOC
Having the technical skills to monitor a network and investigate an alert is important, but methodology is how those skills are efficiently and consistently applied to keep an organization secure. If you are a junior cyber security analyst just getting started (or...
by Josh Daniels | May 14, 2025 | Learning, SOC
While TCM has traditionally offered training and certification for offensive security roles, we have expanded our offerings to include practical blue team security analyst training and certification. In cyber security, adopting the mindset of your adversary is a...
by TCMS Staff | Mar 19, 2025 | Security, SOC
In 2025, phishing is still one of the most ubiquitous and effective attack vectors cybercriminals use to steal credentials, distribute malware, and compromise organizations. Oftentimes, these phishing campaigns stem from deceptive URLs which are crafted to appear...
by TCMS Staff | Jan 15, 2025 | SOC
While each SOC may have its own unique structure and technology stack, there remains a core set of tools and methodologies that analysts should be familiar with to effectively handle a variety of investigations and evidence sources in the field. Rather than focusing...
by TCMS Staff | Dec 25, 2024 | SOC
Honeypots: Detection, Recon, and Misdirection A honeypot in cyber security is basically a trap that lures in attackers and can slow down the pace of an attack, gather actionable intelligence, and even alert an organization that an attack is occurring. In this blog,...