TCM Security

TCM Security

IT Services and IT Consulting

Charlotte, North Carolina 226,713 followers

A veteran-owned cybersecurity company focused on penetration testing, security training, and compliance.

About us

A veteran-owned cybersecurity company focused on penetration testing, security training, and compliance.

Website
https://www.tcm.rocks/certifications
Industry
IT Services and IT Consulting
Company size
11-50 employees
Headquarters
Charlotte, North Carolina
Type
Privately Held
Founded
2019

Locations

Employees at TCM Security

Updates

  • What skills make a successful SOC Analyst? Andrew Prince gives you an exclusive peek into the key traits that can set you apart in this must-see reel! Learn why building strong blue team foundations, gaining hands-on training, and creating security operations projects are so essential to your success. ✨ Don’t miss our Live SOC Training with Andrew, happening January 21-24, 2025! Get 32 hours of live instructor-led training, CEU credits, 30+ hours of on-demand training, lifetime access to online labs, and private cohort and instructor support. Seats are limited—secure yours today! https://lnkd.in/g9x5YK3W

  • SOC Analysts are critical to an organization’s ability to detect and respond to security incidents. Their effectiveness relies on understanding a wide array of evidence sources, from network traffic to system logs, disk images, and memory artifacts. Mastering these tools and techniques takes time, but the right experience is key. While each SOC may have its own tech stack, there are core tools that every SOC Analyst should be familiar with. In today’s edition of The Cyber Mentor Newsletter, we highlight these essential tools and methodologies. To gain hands-on experience with these tools, join our SOC Level 1 Live Training from January 21-24, 2025. Spaces are limited, so reserve your spot soon! https://lnkd.in/g9x5YK3W 

    Tools Every SOC Analyst Should Know

    Tools Every SOC Analyst Should Know

    TCM Security on LinkedIn

  • View organization page for TCM Security, graphic

    226,713 followers

    If you’ve been job hunting in cybersecurity this year, you know how tough it can be. But remember— consistency is key! Success might not come immediately, but every application, networking effort, and even rejection is helping you grow. In this blog post, we break down how to approach your job search with conviction, patience, and a smart strategy. Here are a few highlights: 🔑 𝗚𝗲𝘁 𝗬𝗼𝘂𝗿 𝗠𝗶𝗻𝗱 𝗥𝗶𝗴𝗵𝘁 – Your mindset can make all the difference. Stay confident that every step forward, even the small ones, is progress toward your goal. 💡 𝗧𝗿𝗮𝗰𝗸 𝗬𝗼𝘂𝗿 𝗝𝗼𝗯 𝗦𝗲𝗮𝗿𝗰𝗵 𝗗𝗮𝘁𝗮 – Don’t just apply and hope for the best. Track what’s working, what’s not, and refine your strategy based on real data. The more you learn about what works, the easier it gets! 🤝 𝗡𝗲𝘁𝘄𝗼𝗿𝗸𝗶𝗻𝗴 𝗼𝗻 𝗬𝗼𝘂𝗿 𝗧𝗲𝗿𝗺𝘀 – Not everyone loves cold messaging strangers, and that’s okay! The key to successful networking is finding approaches that feel right for you. If you’re introverted, focus on building deeper, more personal connections rather than forcing yourself to be everywhere at once. Ready for more tips on how to make your job search more effective and less stressful? Check out the full blog post and get the insight you need to keep pushing forward! https://lnkd.in/geZakacK

    • No alternative text description for this image
  • Whether you’re an experienced Pen Tester, a Bug Bounty Hunter, or just starting out, mobile security opens up exciting new opportunities. Here’s a roadmap to help you build the skills you need: 1️⃣ 𝗦𝘁𝗮𝗿𝘁 𝘄𝗶𝘁𝗵 𝘁𝗵𝗲 𝗕𝗮𝘀𝗶𝗰𝘀: Get familiar with the OWASP Mobile Top 10 — a comprehensive resource for understanding vulnerabilities in both iOS and Android apps. 2️⃣ 𝗚𝗲𝘁 𝗛𝗮𝗻𝗱𝘀-𝗢𝗻: TryHackMe’s Mobile Malware Analysis room offers a fantastic interactive experience to sharpen your skills in analyzing Android malware. 👾 3️⃣ 𝗠𝗮𝘀𝘁𝗲𝗿 𝗶𝗢𝗦 𝗝𝗮𝗶𝗹𝗯𝗿𝗲𝗮𝗸𝗶𝗻𝗴: Dive into our iOS Jailbreak Guide for detailed insights into iOS exploitation. Essential reading for anyone serious about mobile security. 🔓 Want to take your skills to the next level? Consider the Practical Mobile Pentest Associate (PMPA) certification. This hands-on training is designed to help you master mobile app penetration testing and build real-world skills for mobile security. Start your mobile journey today! https://lnkd.in/gZh4iw7g

    • No alternative text description for this image
  • Looking to stand out in today’s competitive job market? Our FREE course, Soft Skills for the Job Market, is designed to equip you with the essential skills to succeed. In Soft Skills for the Job Market, you’ll learn to: 💬 Communicate effectively and master professional etiquette in both phone and email conversations. ✍️ Write a resume that captures attention and highlights your strengths. 🔍 Navigate the job market with proven strategies for finding the right opportunities. 🤝 Prepare for interviews with expert advice on handling behavioral and technical questions. 🌐 Build a professional online presence through a personal website and strategic networking. Don’t miss out on this valuable free resource — take the next step toward landing your ideal cybersecurity job today! https://tcm.rocks/ss-li

    • No alternative text description for this image
  • We’re thrilled to announce that the Practical Network Penetration Tester (PNPT) is now featured in a Microsoft job posting! This is a major recognition and an exciting validation of the value and skills PNPT holders bring to the cybersecurity industry. 🙌 If you’re looking to level up your penetration testing skills and prove your real-world expertise, the PNPT is the cert you need! Learn more about the PNPT and how it can boost your career: https://lnkd.in/gsPWPnfX

  • Have you heard of Cookie Jar Overflows? This classic yet under-discussed technique allows attackers to remove cookies from a target user and replace them with their own. Combined with vulnerabilities like session fixation, it can have serious impacts, including account takeovers. In our latest video, we: ✅ Break down the theory behind cookie jar behavior and browser quirks. ✅ Explore how this attack manipulates session cookies. ✅ Demonstrate the technique in action with a lab. Browsers have cookie limits (e.g., ~160-165 cookies in Chrome/Firefox). By flooding the cookie jar, we can push out critical cookies (like session cookies) and set our own. If the app doesn’t validate properly, we’re in. This attack is especially potent when paired with XSS vulnerabilities. Beyond session fixation, this technique has other use cases, like cache poisoning with malicious cache keys and manipulating application state via cookie-stored flags. Have you had success with this technique? Share your stories in the comments! https://lnkd.in/gjjZC7XW

    • No alternative text description for this image
  • View organization page for TCM Security, graphic

    226,713 followers

    SOC roles are more crucial than ever before, with companies in need of skilled analysts to detect, respond to, and prevent cyber threats. If you're looking to launch or advance your career in defensive security, our SOC Level 1 Live Training is for you! 🛠️ 𝗛𝗮𝗻𝗱𝘀-𝗼𝗻 𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴: Gain practical experience in real-world security operations scenarios. 📈 𝗖𝗮𝗿𝗲𝗲𝗿 𝗚𝗿𝗼𝘄𝘁𝗵: Build the core blue team skills that will elevate your professional journey. Join us from January 21 to 24th to boost your expertise and make a real impact in cybersecurity. Spots are limited, so sign up today! https://lnkd.in/gfJdNmfM

Similar pages

Browse jobs