June 13, 2024, 11:57 a.m. | /u/doomsayer08

cybersecurity www.reddit.com

Hi people,

I work as a SOC analyst and my primary job function has been triaging alerts, incident response and I spend small amounts of time on purple teaming, threat hunting and developing correlation rules.

I am good at all of the above and I enjoying doing all of it EXCEPT triaging alerts. It takes a lot of my time but doesn't teach me anything new and isn't intellectually challenging. I brought this up to the leadership recently and they …

above alerts analyst automation correlation cybersecurity doing engineer function good hunting incident incident response job people purple response role rules security security automation soc soc analyst switch threat threat hunting work

Principal QA Engineer - Data Storage and Ingestion pipelines (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Principal Software Engineer - .NET / API

@ Commonwealth Bank | Sydney, NSW - CBP South, 11 Harbour Street

AVP | Governance

@ MUFG | Watermark - 410 North Scottsdale Road

Tech Lead - Full Stack - Défense & Sécurité - Lille

@ Sopra Steria | Villeneuve-d'Ascq, France

Windows / Linux Systems Administrator

@ General Dynamics Information Technology | USA FL MacDill AFB - MacDill AFB (FLC007)

Graduate Software Engineer (C, C++)- HP Wolf Security

@ HP | UKC01 - Cambridge, United Kingdom (UKC01)