Overview
Cybersecurity hiring is growing faster than almost any other technology discipline, and SOC analyst roles are the most common entry point. Employers want candidates who understand threat detection, can triage alerts efficiently, and hold at least one recognised certification. Hands-on lab experience and CTF (Capture the Flag) competition results help bridge the gap between academic knowledge and operational readiness.
This resume belongs to Erin Connolly, a Cybersecurity graduate from Royal Holloway, University of London. She completed a summer placement in the SOC at NCC Group, holds CompTIA Security+, and placed in the top 10 at the National Cyber Security Challenge. Her resume works because it translates academic security knowledge into operational, measurable experience.
What Makes This Resume Work
The SOC placement at NCC Group is a powerful credential. NCC Group is one of the UK's most recognised cybersecurity consultancies. Erin describes her role in operational terms: alerts triaged, incidents escalated, and SIEM queries written. This is the language SOC managers use.
CompTIA Security+ is featured prominently. This certification is widely requested in junior security analyst job descriptions. Having it before graduating signals that Erin has validated her knowledge against an industry-recognised standard.
CTF competition results demonstrate practical skill. Placing in the top 10 at a national competition shows that Erin can apply security knowledge under pressure, solving real challenges rather than just answering exam questions.
Incident triage numbers are quantified. Reviewing 120+ alerts per shift, escalating 8 confirmed incidents, and writing 6 SIEM correlation rules are the kind of operational metrics that prove hands-on capability.
Key Takeaways
Junior security analyst resumes should lead with certifications (CompTIA Security+, or equivalent), SOC experience (even a short placement), and any CTF results. Describe your alert triage volume, escalation decisions, and SIEM tool experience. Mention specific tools (Splunk, Sentinel, CrowdStrike) by name. Practical, operational language matters more than theoretical security knowledge at this level.

























































































































































































































































