Loading W Code...
SOC Analyst: Monitor security alerts, triage incidents, investigate threats in real-time
Penetration Tester: Simulate attacks on systems to identify and report vulnerabilities
Blue Team: Implement defensive controls, harden systems, respond to incidents
Threat Hunter: Proactively search for undetected threats in logs and network traffic
Vulnerability management: scan, prioritize, track, and remediate CVEs across infrastructure
Write incident reports, compliance documentation, and security runbooks
Build and tune detection rules in SIEM tools (Splunk, Elastic SIEM, Sentinel)
Networking: TCP/IP, DNS, HTTP/S, TLS โ deep understanding is non-negotiable
Linux + Windows administration: file systems, registry, processes, event logs
SIEM: Splunk, Elastic SIEM, or Microsoft Sentinel โ query languages (SPL, KQL)
Offensive tools: Metasploit, Burp Suite, Nmap, Nessus, SQLmap
Scripting: Python for automation; Bash for Linux-based tasks
OWASP Top 10: all 10 web vulnerabilities in depth
Malware analysis basics: static analysis and dynamic analysis
Penetration testing OS
Exploitation framework
Web application security testing
Log analysis and threat detection
Network and vulnerability scanning
Network packet analysis
Memory forensics
Data encoding/decoding/analysis
CIA Triad: Confidentiality, Integrity, Availability โ must appear in every security explanation
MITRE ATT&CK framework: essential vocabulary for all SOC and blue team roles
PKI: certificates, certificate authorities, chain of trust, TLS handshake mechanics
OWASP vulnerabilities: SQLi, XSS, CSRF, SSRF, path traversal, IDOR, broken auth
Incident response phases: Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
Set up Kali Linux in VirtualBox; complete TryHackMe Pre-Security Path (free)
Networking deep-dive: CCNA or Professor Messer N+ video series
OWASP Juice Shop in Docker: solve all 10 vulnerability categories hands-on
CompTIA Security+ study: broad security fundamentals coverage
TryHackMe: complete SOC Level 1 Path + Junior Pentester Path
Hack The Box: solve 10 Easy-rated machines; document solutions as write-ups
Splunk Free: ingest logs from your home lab, build 5 working detection rules
Python: write a port scanner, log parser, and file hash checker from scratch
Bug Bounty: register on HackerOne and Bugcrowd; attempt real programs (fully legal)
CEH exam preparation OR start OSCP study (OSCP = gold standard for pentest)
Build a detection lab: Active Directory + Windows Event Logs + Splunk SIEM
Apply for SOC Tier 1 or Junior Pentester roles at MSSP companies
OSCP: obtain this certification โ most respected offensive security credential globally
Specialize: Cloud Security, Red Team, DFIR, or Application Security
CTF competitions: top rankings on HTB or CTFtime.org are direct portfolio proof
Government track: CERT-In, NIC, Indian defense sector value certifications
| Level | India | Global | Note |
|---|---|---|---|
| Entry SOC / 0โ1 yr | โน3.5L โ โน7L | $40K โ $65K | SOC Tier 1 or junior pentester |
| Mid-level / 2โ4 yr | โน7L โ โน18L | $65K โ $110K | CEH/OSCP certified + experience |
| Senior / OSCP+ | โน18L โ โน25L | $110K โ $150K | Red team lead or security architect |
Full attack chain + SIEM detection
Professional vulnerability write-up
20 MITRE ATT&CK technique detections
Static + dynamic analysis of a sample
CompTIA ยท Paid (~$380)
Globally recognized baseline credential
EC-Council ยท Paid (~$1,199)
Good recognition in India market
OffSec ยท Paid (~โน85,000)
Gold standard for pentesting globally
Splunk ยท Free study
Industry-valued SIEM skill proof
Moderate-High remote potential. SOC roles often hybrid; red team and application security can be fully remote. Bug bounty programs are entirely remote and location-independent.
High if certified. Bug bounty is the best freelance path. Top Indian bug hunters earn significantly from public programs. Freelance pentesting requires proper legal agreements.
Skipping networking and jumping straight to exploitation tools โ script kiddie with no depth
Attempting OSCP without solid Linux and networking preparation (expensive failure)
No public portfolio โ cybersecurity is trust-based; proof of skills must be visible
Chronic global shortage of security professionals. India has growing CERT-In compliance mandates driving demand. AI-powered attacks exponentially increasing the threat surface. 5-year outlook: excellent.
Design, configure, and maintain server infrastructure โ physical and virtual โ keeping organizations running.
View RoadmapDesign, deploy, and manage scalable cloud infrastructure on AWS, GCP, or Azure.
View RoadmapDesign and build APIs, architect databases, and implement business logic powering production systems.
View Roadmap