Kalabaster wrote: » To get a job in a SOC (what most people mean when they say "Security Analyst" the Sec+ should be sufficient. That and the ability to demonstrate an interest in the subject matter in the interview. GSEC would definitely be nice to have, and if there's an organic way for you to get into any SANS courses they are excellent for your career, but even just the Sec+ should be enough. I wouldn't get the GSEC to get my foot in, get it to learn things. You have 2 general paths/strategies regarding training and certifications these days. First is the objective ROI (return on investment) cert path, aka the fastest path from point A to point B. Second is the "learn how to do the job correctly" path, a comprehensive training path where you focus mainly on learning the functions rather than how HR likes your certifications. The first is Net+ (maybe skippable) > Sec+ > CEH > CISSP The second is less linear, but it's a mashup of SANS courses, cheaper but very good options such as eLearnSecurity's penetration testing courses and securitytube's python classes, as well as spending hours watching talks (AdrianCrenshaw/Irongeek youtube channel) of leveraging free good resources (e.g. LiveOverflow on youtube). I did, and suggest, a mix of both, going Sec+ > SOC Monkey job > CEH > IR/CyberThreatIntel job > GMON > SOC Manager > eWPT & GWAPT > Penetration Tester This brought me in at a decent SOC salary and then allowed me to triple that salary in ~1.5 years. YMMV, but it's definitely worth it to get your foot in, get a decent salary position, keep eating Ramen and invest your salary into your training, play the game a bit, and voila.