Security Analyst II

As a Security Analyst II, you will begin to apply common external datasets and tools to enhance your investigations. You will start running investigations with less guidance, connecting evidence across systems and making your own calls about when to dig deeper versus when to move on.

Path Overview

📚
7
Modules
⏱️
~46
Hours
Sign in to track your progress
What employers look for
  • Conduct end-to-end incident investigations from initial alert through to report
  • Correlate evidence across endpoint, network, authentication, and email logs
  • Identify lateral movement, persistence mechanisms, and C2 activity
  • Analyse phishing campaigns and malicious email attachments or links
  • Pivot on indicators (IPs, hashes, domains, usernames) across multiple data sources

About This Path

📚

Curriculum Coming Soon

We're carefully curating modules and content for this career path.

Loading...