What skills make a successful SOC Analyst? Andrew Prince gives you an exclusive peek into the key traits that can set you apart in this must-see reel! Learn why building strong blue team foundations, gaining hands-on training, and creating security operations projects are so essential to your success. ✨ Don’t miss our Live SOC Training with Andrew, happening January 21-24, 2025! Get 32 hours of live instructor-led training, CEU credits, 30+ hours of on-demand training, lifetime access to online labs, and private cohort and instructor support. Seats are limited—secure yours today! https://lnkd.in/g9x5YK3W
TCM Security
IT Services and IT Consulting
Charlotte, North Carolina 226,713 followers
A veteran-owned cybersecurity company focused on penetration testing, security training, and compliance.
About us
A veteran-owned cybersecurity company focused on penetration testing, security training, and compliance.
- Website
-
https://www.tcm.rocks/certifications
External link for TCM Security
- Industry
- IT Services and IT Consulting
- Company size
- 11-50 employees
- Headquarters
- Charlotte, North Carolina
- Type
- Privately Held
- Founded
- 2019
Locations
-
Primary
Charlotte, North Carolina 28227, US
Employees at TCM Security
Updates
-
SOC Analysts are critical to an organization’s ability to detect and respond to security incidents. Their effectiveness relies on understanding a wide array of evidence sources, from network traffic to system logs, disk images, and memory artifacts. Mastering these tools and techniques takes time, but the right experience is key. While each SOC may have its own tech stack, there are core tools that every SOC Analyst should be familiar with. In today’s edition of The Cyber Mentor Newsletter, we highlight these essential tools and methodologies. To gain hands-on experience with these tools, join our SOC Level 1 Live Training from January 21-24, 2025. Spaces are limited, so reserve your spot soon! https://lnkd.in/g9x5YK3W
-
If you’ve been job hunting in cybersecurity this year, you know how tough it can be. But remember— consistency is key! Success might not come immediately, but every application, networking effort, and even rejection is helping you grow. In this blog post, we break down how to approach your job search with conviction, patience, and a smart strategy. Here are a few highlights: 🔑 𝗚𝗲𝘁 𝗬𝗼𝘂𝗿 𝗠𝗶𝗻𝗱 𝗥𝗶𝗴𝗵𝘁 – Your mindset can make all the difference. Stay confident that every step forward, even the small ones, is progress toward your goal. 💡 𝗧𝗿𝗮𝗰𝗸 𝗬𝗼𝘂𝗿 𝗝𝗼𝗯 𝗦𝗲𝗮𝗿𝗰𝗵 𝗗𝗮𝘁𝗮 – Don’t just apply and hope for the best. Track what’s working, what’s not, and refine your strategy based on real data. The more you learn about what works, the easier it gets! 🤝 𝗡𝗲𝘁𝘄𝗼𝗿𝗸𝗶𝗻𝗴 𝗼𝗻 𝗬𝗼𝘂𝗿 𝗧𝗲𝗿𝗺𝘀 – Not everyone loves cold messaging strangers, and that’s okay! The key to successful networking is finding approaches that feel right for you. If you’re introverted, focus on building deeper, more personal connections rather than forcing yourself to be everywhere at once. Ready for more tips on how to make your job search more effective and less stressful? Check out the full blog post and get the insight you need to keep pushing forward! https://lnkd.in/geZakacK
-
Whether you’re an experienced Pen Tester, a Bug Bounty Hunter, or just starting out, mobile security opens up exciting new opportunities. Here’s a roadmap to help you build the skills you need: 1️⃣ 𝗦𝘁𝗮𝗿𝘁 𝘄𝗶𝘁𝗵 𝘁𝗵𝗲 𝗕𝗮𝘀𝗶𝗰𝘀: Get familiar with the OWASP Mobile Top 10 — a comprehensive resource for understanding vulnerabilities in both iOS and Android apps. 2️⃣ 𝗚𝗲𝘁 𝗛𝗮𝗻𝗱𝘀-𝗢𝗻: TryHackMe’s Mobile Malware Analysis room offers a fantastic interactive experience to sharpen your skills in analyzing Android malware. 👾 3️⃣ 𝗠𝗮𝘀𝘁𝗲𝗿 𝗶𝗢𝗦 𝗝𝗮𝗶𝗹𝗯𝗿𝗲𝗮𝗸𝗶𝗻𝗴: Dive into our iOS Jailbreak Guide for detailed insights into iOS exploitation. Essential reading for anyone serious about mobile security. 🔓 Want to take your skills to the next level? Consider the Practical Mobile Pentest Associate (PMPA) certification. This hands-on training is designed to help you master mobile app penetration testing and build real-world skills for mobile security. Start your mobile journey today! https://lnkd.in/gZh4iw7g
-
Looking to stand out in today’s competitive job market? Our FREE course, Soft Skills for the Job Market, is designed to equip you with the essential skills to succeed. In Soft Skills for the Job Market, you’ll learn to: 💬 Communicate effectively and master professional etiquette in both phone and email conversations. ✍️ Write a resume that captures attention and highlights your strengths. 🔍 Navigate the job market with proven strategies for finding the right opportunities. 🤝 Prepare for interviews with expert advice on handling behavioral and technical questions. 🌐 Build a professional online presence through a personal website and strategic networking. Don’t miss out on this valuable free resource — take the next step toward landing your ideal cybersecurity job today! https://tcm.rocks/ss-li
-
We’re thrilled to announce that the Practical Network Penetration Tester (PNPT) is now featured in a Microsoft job posting! This is a major recognition and an exciting validation of the value and skills PNPT holders bring to the cybersecurity industry. 🙌 If you’re looking to level up your penetration testing skills and prove your real-world expertise, the PNPT is the cert you need! Learn more about the PNPT and how it can boost your career: https://lnkd.in/gsPWPnfX
Thank you Microsoft for including the PNPT in your recent job posting <3 https://lnkd.in/gNs6iuDt
AI Penetration Tester - Cybersecurity Team in Redmond, Washington, United States | Software Engineering at Microsoft
jobs.careers.microsoft.com
-
Have you heard of Cookie Jar Overflows? This classic yet under-discussed technique allows attackers to remove cookies from a target user and replace them with their own. Combined with vulnerabilities like session fixation, it can have serious impacts, including account takeovers. In our latest video, we: ✅ Break down the theory behind cookie jar behavior and browser quirks. ✅ Explore how this attack manipulates session cookies. ✅ Demonstrate the technique in action with a lab. Browsers have cookie limits (e.g., ~160-165 cookies in Chrome/Firefox). By flooding the cookie jar, we can push out critical cookies (like session cookies) and set our own. If the app doesn’t validate properly, we’re in. This attack is especially potent when paired with XSS vulnerabilities. Beyond session fixation, this technique has other use cases, like cache poisoning with malicious cache keys and manipulating application state via cookie-stored flags. Have you had success with this technique? Share your stories in the comments! https://lnkd.in/gjjZC7XW
-
Does your business process credit card transactions? 💳 This TCMS blog breaks down what you need to know about PCI DSS compliance, including a checklist to help secure your business & get ready for a QSA audit. https://lnkd.in/gUAnaRkD
-
SOC roles are more crucial than ever before, with companies in need of skilled analysts to detect, respond to, and prevent cyber threats. If you're looking to launch or advance your career in defensive security, our SOC Level 1 Live Training is for you! 🛠️ 𝗛𝗮𝗻𝗱𝘀-𝗼𝗻 𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴: Gain practical experience in real-world security operations scenarios. 📈 𝗖𝗮𝗿𝗲𝗲𝗿 𝗚𝗿𝗼𝘄𝘁𝗵: Build the core blue team skills that will elevate your professional journey. Join us from January 21 to 24th to boost your expertise and make a real impact in cybersecurity. Spots are limited, so sign up today! https://lnkd.in/gfJdNmfM