Learn how to become a SOC analyst with no experience using free TryHackMe resources. Complete 90-day roadmap, study plan, and job application strategy included.
The Cybersecurity Job Paradox That Almost Broke Me

"You need 2–3 years of experience for this entry-level position."
I must have read that line a hundred times while job hunting. Fresh out of college with a degree that felt increasingly useless, I was stuck in the most frustrating catch-22 of the tech industry: I needed experience to get a job, but needed a job to get experience.
Sound familiar?
The cybersecurity field is booming. The U.S. Bureau of Labor Statistics projects information security analyst positions to grow 33% through 2033 — much faster than average. Companies are desperate for talent. Yet here I was, qualified on paper, rejected in reality.
Traditional education had failed me. My computer science degree taught me theory, but employers wanted practical skills. They wanted someone who could analyze logs, investigate incidents, and operate security tools from day one. They wanted a SOC analyst with experience I didn't have.
I was ready to give up on cybersecurity entirely.
Then I discovered something that changed everything: you don't need expensive certifications or a fancy boot-camp to break into SOC analyst roles. You just need the right free resources and a strategic learning plan.
This is the exact roadmap I used to go from complete beginner to employed SOC analyst in 90 days — spending exactly $0 on training.
Why Most People Fail to Break Into Cybersecurity (And How to Avoid Their Mistakes)
Before I share the roadmap, let me save you from the mistakes I made in my first three months of self-study.
Mistake #1: Tutorial Hell Without Direction
I spent weeks randomly jumping between YouTube videos, Medium articles, and certification guides. I learned bits and pieces of everything but mastered nothing. Random learning creates random results.
Mistake #2: Theory Over Practice
I read books about network security, studied OSI models, and memorized port numbers. Then I sat in front of Wireshark and had no idea what I was looking at. Reading about swimming doesn't teach you to swim.
Mistake #3: Ignoring the Job Market
I focused on learning what interested me (penetration testing, because it seemed cool) instead of what employers actually needed. Spoiler: 80% of entry-level cybersecurity jobs are SOC analyst positions, not pentester roles.
Mistake #4: No Portfolio to Show
Even after months of learning, I had nothing tangible to show employers. No GitHub, no blog, no proof I could do the work. In a field obsessed with "show, don't tell," I had nothing to show.
The moment I fixed these four mistakes, everything changed.
The Framework: Why TryHackMe is Your Secret Weapon

After researching dozens of learning platforms, I chose TryHackMe as my primary training ground for five critical reasons:
1. Hands-On From Day One
TryHackMe provides virtual machines and real security scenarios in your browser. No setup, no installations, no excuses. You're doing actual security work, not watching someone else do it.
2. Structured Learning Paths
Their SOC Level 1 and Pre-Security paths are literally designed to prepare you for entry-level SOC analyst roles. Someone already did the curriculum planning for you.
3. Built-In Portfolio Generation
Every room you complete is documentation material. Every challenge you solve is a story for your resume and interviews. I turned my TryHackMe writeups into Medium articles that directly led to interview callbacks.
4. Free Tier is Genuinely Useful
Unlike platforms that gate everything behind paywalls, TryHackMe's free tier includes hundreds of rooms covering essential SOC skills. You can learn everything you need without paying a cent.
5. Employer Recognition
Hiring managers actually know TryHackMe. Putting "Completed TryHackMe SOC Level 1 Path" on your resume means something. It's not just self-study — it's recognized training.
But here's the truth: TryHackMe alone isn't enough. You need a strategic plan that combines hands-on practice, foundational knowledge, and job preparation. That's where the 90-day roadmap comes in.
The 90-Day SOC Analyst Roadmap: Your Week-by-Week Battle Plan
I'm giving you the exact schedule I followed. This isn't theoretical — this is what actually worked. Budget 2–3 hours per day, more on weekends if possible.
Phase 1: Foundation Building (Days 1–30)
Goal: Understand the fundamentals that every SOC analyst needs to know.

Week 1–2: Networking Essentials
TryHackMe Rooms:
- Introductory Networking (Free)
- What is Networking? (Free)
- Extending Your Network (Free)
- Intro to LAN (Free)
Complementary Free Resources:
- Professor Messer's Network+ videos (YouTube)
- Practical Networking's subnetting guide
- Wireshark 101 on YouTube
Deliverable: Write a Medium article explaining the OSI model with real-world examples. Use packet captures from Wireshark. This becomes your first portfolio piece.
Week 3: Linux Fundamentals
TryHackMe Rooms:
- Linux Fundamentals Part 1 (Free)
- Linux Fundamentals Part 2 (Free)
- Linux Fundamentals Part 3 (Free)
Daily Practice:
- Install Ubuntu on VirtualBox
- Complete 30 minutes of OverTheWire Bandit challenges
- Practice grep, find, and log analysis commands
Deliverable: Create a "Linux Commands Every SOC Analyst Must Know" cheat sheet. Post it on Medium and GitHub.
Week 4: Windows Fundamentals & Active Directory Basics
TryHackMe Rooms:
- Windows Fundamentals 1 (Free)
- Windows Fundamentals 2 (Free)
- Active Directory Basics (Free)
Key Skills to Master:
- Windows Event Logs
- PowerShell basics
- Understanding domain architecture
- Registry fundamentals
Deliverable: Write about "How to Investigate Suspicious Windows Activity Using Event Viewer"
Phase 2: Security Tools & Attack Detection (Days 31–60)

Goal: Learn the tools SOC analysts use daily and understand common attack patterns.
Week 5: Introduction to Security Operations
TryHackMe Rooms:
- Intro to Cyber Threat Intel (Free)
- Pyramid of Pain (Free)
- Cyber Kill Chain (Free)
- Unified Kill Chain (Free)
Focus Areas:
- Understanding attacker methodologies
- Learning threat intelligence frameworks
- Recognizing indicators of compromise (IOCs)
Deliverable: Analyze a real-world breach (SolarWinds, Colonial Pipeline, etc.) through the lens of the cyber kill chain. Write a detailed breakdown.
Week 6–7: Network Security Monitoring
TryHackMe Rooms:
- Wireshark: The Basics (Free)
- Snort (Free)
- Suricata (Free)
- Zeek (Free)
Hands-On Projects:
- Capture and analyze malicious traffic
- Write Snort/Suricata rules
- Investigate suspicious network connections
- Practice PCAP analysis
Deliverable: Complete 5 PCAP analysis challenges and document your methodology.
Week 8: Endpoint Security & Malware Basics
TryHackMe Rooms:
- Intro to Endpoint Security (Free)
- Core Windows Processes (Free)
- Sysinternals (Free)
Tools to Learn:
- Process Hacker
- Autoruns
- TCPView
- Process Monitor
Deliverable: Write "Detecting Malware on Windows: A Practical Guide Using Free Tools"
Phase 3: SIEM, Incident Response & Job Preparation (Days 61–90)

Goal: Master SIEM platforms, understand incident response, and prepare for the job market.
Week 9–10: SIEM & Log Analysis
TryHackMe Rooms:
- Splunk 101 (Free)
- Investigating with Splunk (Free)
- Intro to Log Analysis (Free)
Alternative Free SIEMs:
- Wazuh (open-source SIEM)
- Elastic Stack (ELK)
Real-World Practice:
- Set up Wazuh on a local VM
- Ingest logs from multiple sources
- Create detection rules
- Build basic dashboards
Deliverable: "How to Build Your Own Home SIEM Lab for Free" article with screenshots and configurations.
Week 11: Incident Response Fundamentals
TryHackMe Rooms:
- Intro to Digital Forensics (Free)
- Windows Forensics 1 (Free)
- Windows Forensics 2 (Free)
Study the NIST Incident Response Framework:
- Preparation
- Detection & Analysis
- Containment, Eradication & Recovery
- Post-Incident Activity
Practice Scenario:
- Work through a full incident response scenario
- Document every step like a real IR report
- Practice timeline analysis
Deliverable: Complete incident response report from a TryHackMe room, formatted professionally.
Week 12: Resume, Portfolio & Interview Prep
Resume Optimization:
- Lead with "Security Operations Center Analyst Skills"
- List specific tools: Wireshark, Splunk, Snort, Suricata, Sysinternals, PowerShell
- Include: "Completed TryHackMe SOC Level 1 Path (100+ hours hands-on training)"
- Quantify everything: "Analyzed 500+ pcap files", "Wrote 20+ security analysis articles"
Portfolio Checklist:

- Active Medium blog with 10–15 technical articles
- Detection rules you've written
- Scripts for log analysis
- Documentation from lab work
- LinkedIn profile optimized with keywords
- Personal website (free via GitHub Pages)
Interview Preparation:

- Review common SOC analyst interview questions
- Prepare 5–7 stories using STAR method
- Practice explaining your TryHackMe projects
- Set up mock interviews with cybersecurity Discord communities
Key Interview Stories to Prepare:
- Incident investigation you completed
- False positive you identified and tuned
- Time you used critical thinking to solve a security problem
- How you stay current with security threats
- Challenging log analysis scenario
The Resources That Accelerated My Journey (All Free)
Beyond TryHackMe, these resources were instrumental:
YouTube Channels
- John Hammond — Malware analysis and CTF walkthroughs
- IppSec — Advanced security concepts explained clearly
- NetworkChuck — Motivational and practical cybersecurity content
- Professor Messer — Free Security+ and Network+ training
Communities & Discord Servers
- TryHackMe Official Discord — Study groups and help
- r/cybersecurity & r/ITCareerQuestions — Reddit communities
- InfoSec Prep Discord — Interview preparation and mentorship
Documentation & Reading
- MITRE ATT&CK Framework — Essential threat intelligence resource
- SANS Reading Room — Free white papers on security topics
- Krebs on Security — Stay current with security news
Practice Platforms (Free Tiers)
- OverTheWire — Command line and Linux challenges
- PicoCTF — Beginner-friendly CTF challenges
- CyberDefenders — Blue team focused challenges
The Application Strategy That Got Me Interviews
Having skills isn't enough — you need to position yourself correctly.
LinkedIn Optimization
Profile Headline: "Aspiring SOC Analyst | Completed 150+ TryHackMe Security Labs | Passionate About Threat Detection & Incident Response"
About Section: Tell your story in 3 paragraphs:
- Your transition into cybersecurity
- Your hands-on training and specific skills
- What you're looking for and how to contact you
Featured Section:
- Link to your Medium blog
- Pin your best technical articles
- Include your GitHub repository
Skills Section: Add these specific keywords:
- Security Operations Center (SOC)
- SIEM (Splunk, ELK, Wazuh)
- Log Analysis
- Incident Response
- Threat Intelligence
- Network Security Monitoring
- Wireshark
- Malware Analysis
- Windows Event Logs
- PowerShell
Where to Find Entry-Level SOC Jobs
Job Boards:
- Indeed (filter by "entry level" + "SOC analyst")
- LinkedIn Jobs (set alerts for "Junior SOC Analyst")
- Dice.com
- CyberSecJobs.com
Companies Known for Hiring Entry-Level:
- Managed Security Service Providers (MSSPs)
- Large consulting firms (Deloitte, PwC, etc.)
- Regional banks
- Healthcare organizations
- Government contractors
Application Strategy:
- Apply to 5–10 jobs per day
- Customize resume for each position (match their keywords)
- Follow up 3–5 days after applying
- Leverage LinkedIn connections for referrals
- Target smaller companies and MSSPs (less competitive)
The Cover Letter Template That Worked
"Dear [Hiring Manager],
I'm writing to express my strong interest in the SOC Analyst position at [Company]. While I'm early in my cybersecurity career, I've spent the last 90 days in intensive hands-on security training, completing over 150 security labs focused specifically on SOC analyst skills.
My training included:
- 100+ hours of SIEM analysis using Splunk and Wazuh
- Network security monitoring with Wireshark, Snort, and Suricata
- Incident response scenarios and forensics investigations
- Malware detection and endpoint security analysis
I've documented my learning journey through 15 technical articles on Medium [link], demonstrating my ability to communicate complex security concepts clearly — a critical skill for any SOC analyst.
I'm specifically drawn to [Company] because [specific reason related to their work]. I'd love to discuss how my hands-on training and passion for security operations can contribute to your team's success.
I've attached my resume and portfolio. Thank you for your consideration.
[Your Name]"
What Actually Worked in My Job Interviews
Let me be real with you about the interview process.
Technical Questions You'll Face
Scenario-Based Questions: "You receive an alert about unusual outbound traffic from an internal IP address. Walk me through your investigation process."
My Answer Framework:
- Verify the alert (check SIEM, correlate with other data sources)
- Gather context (who owns the IP, what services, recent changes)
- Analyze the traffic (Wireshark capture, destination IPs, protocols, payload)
- Determine severity (lateral movement? data exfiltration? false positive?)
- Contain if necessary (isolate host, block IPs)
- Document everything
- Escalate to senior analyst or IR team
Tool-Specific Questions: "How would you use Wireshark to identify a potential SQL injection attack?"
The key: Be honest about what you know and don't know. Say "I haven't encountered that specific scenario, but here's how I would approach it…" Employers respect honesty and problem-solving ability over fake expertise.
The Projects That Impressed Interviewers
These three portfolio pieces generated the most interview questions:
- "Building a Home SOC Lab With Wazuh" — Showed initiative and hands-on skills
- "Investigating a Simulated Ransomware Attack" — Demonstrated incident response methodology
- "Custom Splunk Dashboards for Threat Detection" — Proved I could create practical security solutions
Red Flags to Avoid
Don't say:
- "I'm just a beginner, so…" (removes confidence)
- "I don't have real-world experience, but…" (focuses on negative)
- "I'm trying to break into cybersecurity" (sounds uncertain)
Do say:
- "In my training, I worked on…" (emphasizes experience)
- "When analyzing PCAP files, I learned…" (shows specific skills)
- "I'm focused on developing my SOC analyst career" (shows commitment)
The Reality Check: Setting Honest Expectations
I don't want to mislead you. This roadmap works, but let's be clear about what to expect.
Timeline Truth
- Me: Landed my first SOC analyst role after 4 months of job hunting (90 days learning + 30 days intensive applying)
- Typical: 3–6 months from starting training to receiving an offer
- Some take longer: 6–12 months is still completely normal, especially in competitive markets
Salary Reality
Entry-level SOC Analyst salaries:
- Tier 3 cities: $45,000-$55,000
- Tier 2 cities: $55,000-$65,000
- Tier 1 cities: $65,000-$75,000
- High cost of living areas: $75,000-$85,000
Your first SOC job might not be glamorous. You'll work shifts (including nights and weekends), face alert fatigue, and spend time on false positives. But it's the door to the industry.
What Will NOT Get You Hired
- Just completing the TryHackMe rooms without documentation
- Not applying consistently (5–10 applications per day minimum)
- Generic resume and cover letter
- No portfolio or online presence
- Waiting until you "feel ready" (you'll never feel 100% ready)
What WILL Get You Hired
- Persistent, strategic job applications
- Strong portfolio demonstrating hands-on skills
- Clear communication in interviews
- Genuine enthusiasm for security
- Network connections (even weak ones help)
- Willingness to relocate or start at a smaller company
Common Mistakes That Will Sabotage Your Success
After helping dozens of people through this process, here are the failures I see repeatedly:
Mistake #1: Certification Obsession
"Should I get Security+ first?"
My take: Certifications help but aren't mandatory for entry-level SOC roles. Many employers accept equivalent experience. I got hired without a single cert — my TryHackMe portfolio and blog were enough.
If you're going to get one cert, Security+ is the gold standard for entry-level. But don't delay your job search waiting to pass it. Apply for jobs now, study for Security+ while job hunting.
Mistake #2: Imposter Syndrome Paralysis
"I don't know enough yet to apply."
You will never feel 100% ready. I applied for jobs after 60 days of training, not 90. Many requirements are wish lists, not strict requirements. If you meet 60–70% of the job description, apply anyway.
Mistake #3: Lack of Consistency
The roadmap only works if you actually follow it consistently. Studying 10 hours one week and zero hours the next three weeks won't work. Two hours per day beats 10 hours one Saturday.
Mistake #4: Not Documenting Your Learning
Your TryHackMe completions mean nothing if nobody knows about them. Document everything:
- Write Medium articles
- Create GitHub repositories
- Share on LinkedIn
- Build a portfolio website
Mistake #5: Applying Without Networking
Cold applications have a 2–3% response rate. Applications with a referral have a 30–50% response rate. Join cybersecurity Discord servers, attend local BSides conferences, engage on LinkedIn. Even weak connections dramatically improve your odds.
Your Next Steps: The 24-Hour Challenge
Knowledge without action is just entertainment. Here's what you should do in the next 24 hours:
Hour 1: Set Up Your Learning Environment
- Create TryHackMe account
- Set up Medium account
- Create GitHub account
- Install VirtualBox or VMWare
Hour 2: Start Your First TryHackMe Room
- Complete "Introductory Networking" room
- Take detailed notes
- Screenshot your progress
Hour 3: Write Your First Article
- Title: "Starting My Journey to Become a SOC Analyst"
- Share what you're learning and why
- Outline your 90-day plan
- Publish on Medium
This accomplishes three things:
- You've started (hardest part)
- You've created your first portfolio piece
- You've made a public commitment
Download Your Free Resources
To help you succeed, I've created several free resources:
90-Day SOC Analyst Study Tracker (Google Sheets)
- Week-by-week checklist
- Daily study log
- Skill progression tracker
- Job application tracker
SOC Analyst Resume Template (Google Docs)
- Optimized for ATS systems
- Pre-filled with TryHackMe relevant experience
- Action verbs and achievement formatting
Interview Questions & Answers Guide (PDF)
- 50+ common SOC analyst interview questions
- Framework for answering behavioral questions
- Technical scenario walkthroughs
Comment "RESOURCES" below and I'll reply with access links to all three documents.
Final Thoughts: You Can Do This
Six months ago, I was unemployed, frustrated, and doubting whether I could break into cybersecurity. Today, I'm a working SOC analyst, doing the job I dreamed about.
The difference wasn't talent. It wasn't luck. It wasn't connections.
It was having a clear roadmap and the discipline to follow it consistently.
The cybersecurity industry genuinely needs people like you. Organizations are drowning in security alerts and desperate for analysts who can investigate threats, analyze logs, and protect their networks.
But nobody is going to hand you this career. You have to take it.
The 90-day roadmap is in front of you. The free resources are available. The only question is: will you start today, or will you still be "planning to start" six months from now?
Make your choice. Then commit.
About the Author: I'm a SOC analyst who broke into cybersecurity through self-study and free resources. I share practical TryHackMe walkthroughs, security analysis techniques, and career advice for aspiring cybersecurity professionals. Follow me for weekly cybersecurity content and detailed TryHackMe room walkthroughs.
If this article helped you, please:
- 👏 Clap for this article (you can clap up to 50 times!)
- 📝 Follow me for more cybersecurity content
- 💬 Comment with your biggest challenge in breaking into cybersecurity
- 🔗 Share this with someone trying to start their cybersecurity career
Related Articles You'll Love:
Keywords: SOC analyst, TryHackMe, cybersecurity career, free resources, security operations center, cyber security training, entry level cybersecurity jobs, how to become SOC analyst
Tags: #Cybersecurity #SOCAnalyst #TryHackMe #CareerChange #InfoSec #CyberSecurityJobs #TechCareers #LearningToCode #ITJobs #SecurityOperations