Cybersecurity Analyst (SOC Tier-1)

Cybersecurity Analyst (SOC Tier-1)

Cybersecurity Analyst (SOC Tier-1)

Diploma-level program covering security fundamentals, threat detection, SIEM monitoring, and incident response. Train for a real SOC environment using industry tools like Splunk, Wireshark, and Microsoft Sentinel.

Diploma Program Hands-on Labs SOC Simulation Mentor Support
Cybersecurity Analyst (SOC Tier-1)

ICCT in Numbers

Since 2019, we’ve helped students around the world grow their IT careers through hands-on, mentor-led programs.

2019→
Operating since
1000+
Student success stories
35 yrs
Instructor IT experience
97%
Learner satisfaction rate

ICCT USA provides diploma and modular IT training focused on real-world, practical learning — not just theory.

Why this program & who it’s for

Clear outcomes, flexible formats, and global availability.

Who you become

Start as a SOC Tier-1 Analyst, grow into Incident Responder or Blue-Team Engineer, mastering SIEM, detection rules, and playbooks.

What you’ll do

Investigate alerts, triage phishing & malware, write detection queries, escalate incidents, and document findings for stakeholders.

Study formats

Full diploma track or stackable modules for upskilling. Live online, 1:1/Group, with mentor feedback and SOC simulations.

What’s in the program?

Complete the full diploma or purchase modules individually with certificates.

Module 1 — Security Fundamentals

  • Networking, OS, identity, cryptography basics
  • Threat landscape & kill chain, MITRE ATT&CK
  • Lab: traffic capture & protocol analysis

Module 2 — SIEM & Detection

  • Splunk/Microsoft Sentinel fundamentals
  • Parsing logs, KQL/SPL detection queries
  • Lab: build correlation rules & dashboards

Module 3 — Threat Hunting & Response

  • Phishing, malware, endpoint triage (EDR)
  • Playbooks, containment & eradication
  • Lab: end-to-end incident workflow

Module 4 — SOC Simulation & Career

  • Blue-team capstone (alert → report)
  • On-call etiquette, escalation, reporting
  • Resume/LinkedIn, mock interviews

Tools you’ll use

SplunkMicrosoft SentinelWireshark KQLSPLZeek EDRMITRE ATT&CKPhishing Triage

U.S. Salary Ranges by Experience

Indicative ranges for SOC roles. Offers vary by location, industry, and shift.

Role Entry / Junior 0–2 yrs Mid-Level 3–5 yrs Senior 5–7+ yrs
SOC Analyst (Tier-1)
$60k–$85k
$85k–$120k
$120k–$150k+
Blue-Team Engineer / IR
$75k–$100k
$110k–$145k
$150k–$190k+

Hands-on projects & skills

Phishing & Malware Triage

Analyze headers, artifacts, and attachments, write a report with recommended controls.

Email ForensicsIndicatorsPlaybooks

SIEM Detection Pack

Create KQL/SPL rules, dashboards, and alert workflows for common ATT&CK tactics.

KQLSPLDashboards

Blue-Team Capstone

Investigate an end-to-end incident and present a CIRT-style report to stakeholders.

Incident ResponseReportingStakeholders

Tuition

Group Format (3+ students)

300 hours (250 lectures + 50 labs)
Tuition: $16,000
  • Group-based learning with a structured schedule
  • Team projects and hands-on lab practice
  • Code reviews and career preparation activities

Individual Format (Available Upon Request)

160 hours
Tuition: $16,000
  • 1-on-1 instruction with an instructor
  • Flexible, personalized learning schedule
  • Capstone project and interview preparation support

    Application Form

    Apply Now

    Fill out the form below so our admissions team can review your information and contact you about the next steps.

    Personal Information



    Contact Information




    Program Interest