Okay, now I'll post the responses I wrote down before I read what everyone else had to say...
https://infosec.exchange/@chrissanders88/109315290472660056
1. SOC Analyst = Family Medicine / General Practitioner. They diagnose afflictions and refer to specialists where needed. They also triage the severity of issues to prioritize various tests, treatments, or referrals.
2. Incident Response = Emergency Medicine. They identify enough information to stabilize the situation and determine the next steps for diagnosis and/or treatment.
3. Malware Analyst = Virology or Pathology. They study the characteristics and symptoms of afflictions by isolating them and performing behavioral and static tests.
4. Threat Hunter = Infection Disease. They're diagnosticians that form hypotheses and try to find evidence that either proves them or rules them out. Likely the weakest of the comparisons in terms of inputs, since most folks they see do have symptoms whereas TH usually doesn't.
5. Threat Intelligence = Epidemiology. They study the characteristics and proliferation of afflictions, as well as the relationships between them.
Chris Sanders π π§ (@[email protected])
Which medical specialties are most comparable to each of these security roles: 1. SOC Analyst 2. Incident Responder 3. Malware Analyst 4. Threat Hunter 5. Threat Intelligence I'm curious about your thoughts... I'll post mine a bit later. π©Ίπ§ββοΈ