Cybersecurity Analyst (SOC Tier-1)

Cybersecurity Analyst (SOC Tier-1)

Cybersecurity Analyst (SOC Tier-1)

Diploma-level program covering security fundamentals, threat detection, SIEM monitoring, and incident response. Train for a real SOC environment using industry tools like Splunk, Wireshark, and Microsoft Sentinel.

Diploma Program Hands-on Labs SOC Simulation Mentor Support
Cybersecurity Analyst (SOC Tier-1)

ICCT in Numbers

Since 2019, we’ve helped students around the world grow their IT careers through hands-on, mentor-led programs.

2019→
Operating since
1000+
Student success stories
35 yrs
Instructor IT experience
97%
Learner satisfaction rate

ICCT USA provides diploma and modular IT training focused on real-world, practical learning — not just theory.

Why this program? Who is it for?

Clear outcomes, flexible formats, and global availability.

Who you become

Start as a SOC Tier-1 Analyst, grow into Incident Responder or Blue-Team Engineer, mastering SIEM, detection rules, and playbooks.

What you’ll do

Investigate alerts, triage phishing & malware, write detection queries, escalate incidents, and document findings for stakeholders.

Study formats

Full diploma track or stackable modules for upskilling. Live online, 1:1/Group, with mentor feedback and SOC simulations.

What’s in the program?

Complete the full diploma or purchase modules individually with certificates.

Module 1 — Security Fundamentals

  • Networking, OS, identity, cryptography basics
  • Threat landscape & kill chain, MITRE ATT&CK
  • Lab: traffic capture & protocol analysis

Module 2 — SIEM & Detection

  • Splunk/Microsoft Sentinel fundamentals
  • Parsing logs, KQL/SPL detection queries
  • Lab: build correlation rules & dashboards

Module 3 — Threat Hunting & Response

  • Phishing, malware, endpoint triage (EDR)
  • Playbooks, containment & eradication
  • Lab: end-to-end incident workflow

Module 4 — SOC Simulation & Career

  • Blue-team capstone (alert → report)
  • On-call etiquette, escalation, reporting
  • Resume/LinkedIn, mock interviews

Tools you’ll use

SplunkMicrosoft SentinelWireshark KQLSPLZeek EDRMITRE ATT&CKPhishing Triage

U.S. Salary Ranges by Experience

Indicative ranges for SOC roles. Offers vary by location, industry, and shift.

Role Entry / Junior 0–2 yrs Mid-Level 3–5 yrs Senior 5–7+ yrs
SOC Analyst (Tier-1)
$60k–$85k
$85k–$120k
$120k–$150k+
Blue-Team Engineer / IR
$75k–$100k
$110k–$145k
$150k–$190k+

Hands-on projects & skills

Phishing & Malware Triage

Analyze headers, artifacts, and attachments, write a report with recommended controls.

Email ForensicsIndicatorsPlaybooks

SIEM Detection Pack

Create KQL/SPL rules, dashboards, and alert workflows for common ATT&CK tactics.

KQLSPLDashboards

Blue-Team Capstone

Investigate an end-to-end incident and present a CIRT-style report to stakeholders.

Incident ResponseReportingStakeholders

Tuition

Group Format (3+ students)

300 hours (250 lectures + 50 labs)
Tuition: $16,000
  • Group-based learning with a structured schedule
  • Team projects and hands-on lab practice
  • Code reviews and career preparation activities

Individual Format (Available Upon Request)

160 hours
Tuition: $16,000
  • 1-on-1 instruction with an instructor
  • Flexible, personalized learning schedule
  • Capstone project and interview preparation support

Apply Now

Fill the form below so we can get to know you and your needs better.

JPG/PNG, up to 5MB.

Contact Information