SOC Analyst CV example
Recruiters look for detections, response speed, and threats stopped.
Sample professional summary
“SOC analyst who cut mean time to detect 40% and tuned SIEM rules to reduce false positives 60%.”
Key skills recruiters look for
- SIEM
- Incident response
- Threat detection
- EDR
- Log analysis
- MITRE ATT&CK
How to write strong bullet points
- Quantify MTTD/MTTR and false-positive reduction.
- Show real incidents triaged and escalated.
- Name tools (Splunk, Sentinel) and frameworks.
SOC Analyst career path & typical salary
How the role typically progresses, with the kind of responsibilities and approximate US base-salary range at each stage.
0–2 yrs
Triages alerts, escalates incidents, and learns the SIEM and playbooks.
2–4 yrs
Investigates incidents, tunes detections, and hunts threats.
4–7 yrs
Leads incident response and detection engineering; mentors.
7+ yrs
Owns detection strategy and SOC processes.
10+ yrs
Owns the SOC team, metrics and program.
Salary figures are approximate US market estimates for general guidance only. Actual pay varies widely by location, industry, employer, education and negotiation.
Common SOC Analyst interview questions
Practice structured answers (situation, action, measurable result) — the same achievements belong on your CV.
- Walk me through triaging an alert you suspect is a real intrusion.
- How do you reduce false positives without missing true threats?
- Describe an incident you investigated end to end.
- How do you use MITRE ATT&CK in detection and response?
- What's your process for containment vs. eradication?
- How do you prioritize when alerts exceed capacity?
Build your SOC Analyst CV now
Use a clean, ATS-friendly template and a live preview that matches your downloaded PDF exactly. It's 100% free — no signup, no watermark, no payment.
Create my SOC Analyst CV — free