TL;DR — What to learn first
Start here: SIEM platform skills (Splunk or QRadar), incident response procedures, and basic networking and malware analysis.
Level up: Threat intelligence, Python scripting, vulnerability scanning, and compliance framework knowledge.
What matters most: Analytical thinking under pressure. When an alert fires at 2 AM, you need to quickly determine if it is a real threat or a false positive.
What security analyst job postings actually ask for
Before learning anything, look at the data. Here’s how often key skills appear in security analyst job postings:
Skill frequency in security analyst job postings
Core security skills
Writing queries, building correlation rules, investigating alerts, and reducing false positives. SIEM is the central tool for security analysts.
Show SIEM expertise: "Investigated 200+ security alerts monthly in Splunk, reducing false positive rate by 45% through tuned correlation rules."
Following incident response procedures: detection, containment, eradication, recovery, and post-incident review. Understanding escalation paths and communication protocols.
Understanding network traffic patterns, packet analysis with Wireshark, and identifying anomalous behavior. TCP/IP, DNS, and HTTP protocol knowledge.
Understanding threat actors, TTPs (tactics, techniques, procedures), IOCs (indicators of compromise), and threat feeds. MITRE ATT&CK framework knowledge.
Tools & technical skills
Running vulnerability scans, interpreting results, prioritizing remediation, and tracking fixes.
Automating repetitive security tasks, parsing logs, and building custom detection scripts.
Understanding compliance frameworks, evidence collection, and audit preparation. Many security analyst roles involve compliance monitoring.
How to list security analyst skills on your resume
Don’t dump a wall of keywords. Categorize your skills to mirror how job postings list their requirements:
Example: Security Analyst Resume
Why this works: The Frameworks line shows you understand the industry landscape beyond tools. Query languages (SPL, KQL) signal hands-on SIEM experience.
Three rules for your skills section:
- Only list what you’ve used in a real project. If you can’t answer a technical question about it, don’t list it.
- Match the job posting’s terminology. If they use a specific tool name, use that exact name on your resume.
- Order by relevance, not alphabetically. Put the most important skills first in each category.
What to learn first (and in what order)
If you’re looking to break into security analyst roles, here’s the highest-ROI learning path for 2026:
Learn networking and security fundamentals
Study TCP/IP, common protocols, and security concepts. Get CompTIA Security+ certification.
Master a SIEM platform
Set up Splunk Free and practice log analysis. Write queries, build dashboards, and investigate simulated incidents.
Study incident response and threat intelligence
Learn the IR lifecycle. Study MITRE ATT&CK framework. Practice on CTF platforms (TryHackMe, Blue Team Labs).
Add vulnerability scanning and Python
Learn Nessus or OpenVAS. Write Python scripts for log parsing and automation.
Get certified and build a portfolio
Consider CompTIA CySA+ or BTL1. Document your lab work and analysis findings as portfolio pieces.