A cybersecurity analyst is the person in the SOC who sees something is off first: a suspicious log, a phishing wave, weird traffic. The work mixes monotony (triaging 200+ alerts a shift) with sudden urgency (incident response). This template helps you show recruiters concrete numbers (incident volume, MTTR, playbooks built) instead of the generic 'worked in a SOC' line.
Copy these as starting points and swap in your own numbers.
2024–2025 estimates. Wide ranges by experience and seniority.
Yes, but plan time to close the basics: networking, Linux, basic scripting. Good path: start with Security+, run Hack The Box or TryHackMe labs in parallel. About a year to year and a half of focused prep gets most people to a junior SOC role.
For your first SOC role, a cert helps: Security+ or CySA+ tells the recruiter you are not random. For senior roles after 4-5 years of hands-on, certs become secondary, what counts is real incident response experience.
Describe the projects concretely, not the tools. 'Stood up Splunk in a home lab, wrote 12 detection rules covering 5 ATT&CK techniques, validated against Atomic Red Team' lands much better than 'know Splunk'.
If you are genuinely open to them, mention it in the summary. Many hiring managers specifically look for analysts willing to staff 24/7 SOCs because most candidates dodge it.