Security Operations Center (SOC) Analyst Career Path Guide

A Security Operations Center (SOC) Analyst monitors, detects, and responds to cybersecurity threats and incidents within an organization. They analyze security alerts, investigate potential breaches, and coordinate with other IT and cybersecurity teams to safeguard digital assets and maintain resilient defenses against cyberattacks. This role combines real-time threat detection with incident response and continuous improvement of security posture.

15%

growth rate

$90,000

median salary

remote-friendly

πŸ“ˆ Market Demand

Low
High
Very High

The demand for SOC Analysts remains very high worldwide, fueled by the surge in cyber threats and the expansion of digital infrastructures. Organizations across industries are prioritizing security operations, resulting in strong hiring trends and competitive salaries.

πŸ‡ΊπŸ‡Έ Annual Salary (US, USD)

60,000β€”120,000
Median: $90,000
Entry-Level
$69,000
Mid-Level
$90,000
Senior-Level
$111,000

Top 10% of earners in this field can expect salaries starting from $120,000+ per year, especially with specialized skills in high-demand areas.

Core Functions of the Security Operations Center (SOC) Analyst Role

Security Operations Center (SOC) Analysts serve as frontline defenders for an organization's cybersecurity infrastructure. Tasked with monitoring networks and systems continuously, SOC Analysts scrutinize security alerts generated by advanced detection tools. They analyze the nature and severity of threats, distinguish between false positives and genuine attacks, and initiate incident responses when necessary. Their work demands a deep understanding of network architecture, threat intelligence, and cybersecurity frameworks.

The role requires constant vigilance due to the evolving threat landscape where cyber adversaries deploy increasingly sophisticated tactics. SOC Analysts must rapidly adapt to new attack vectors such as ransomware, phishing, zero-day exploits, and insider threats. Beyond detection and mitigation, they document incidents, produce detailed reports for stakeholders, and assist in strengthening security policies. Collaboration with IT teams, threat intelligence providers, and sometimes law enforcement agencies is intrinsic to their daily operations.

This position blends technical expertise with analytical thinking and communication skills. SOC Analysts often work in shifts to ensure 24/7 coverage, utilizing Security Information and Event Management (SIEM) platforms and other tools to correlate data from multiple sources. Their role is not only reactive but proactive, involving vulnerability assessments, running threat hunts, tuning detection rules, and contributing to security awareness training. This dynamic, high-stakes environment offers continuous learning opportunities and a vital impact on organizational cybersecurity resilience.

Key Responsibilities

  • Monitor security alerts and logs from SIEM platforms to detect and analyze potential threats.
  • Conduct initial triage and investigation of security incidents to determine severity and scope.
  • Respond to cyber incidents, containing threats and coordinating remediation efforts.
  • Maintain and tune detection rules and alerting policies to reduce false positives and enhance accuracy.
  • Perform vulnerability scanning and assist in patch management processes.
  • Document incident details and produce comprehensive reports for stakeholders and compliance purposes.
  • Participate in threat hunting activities to proactively identify hidden threats.
  • Collaborate with IT, risk management, and compliance teams to align security controls.
  • Support digital forensics and evidence gathering during investigations.
  • Stay current on emerging threats, attack techniques, and cybersecurity technologies.
  • Assist in developing and updating incident response plans and playbooks.
  • Provide security awareness and training support within the organization.
  • Use threat intelligence feeds to contextualize alerts and improve detection capabilities.
  • Contribute to compliance audits by supporting necessary documentation and evidence collection.
  • Perform root cause analysis of incidents to inform preventive measures.

Work Setting

Security Operations Center Analysts usually work inside dedicated SOC facilities or within IT departments of medium to large organizations. The environment is technology-heavy, often requiring 24/7 shift work given the continuous nature of cyber threats. Analysts mainly operate at computer workstations equipped with multiple monitors displaying real-time alerts, dashboards, and investigative tools. The role demands high concentration levels and quick decision-making, often involving fast-paced, high-pressure situations. Collaboration is essential, as SOC Analysts frequently coordinate with other cybersecurity specialists, IT teams, and management. Remote work possibilities exist but most organizations prefer in-person or hybrid setups to ensure timely incident handling and team communication.

Tech Stack

  • SIEM platforms (Splunk, IBM QRadar, ArcSight)
  • Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
  • Endpoint Detection and Response (EDR) solutions (CrowdStrike, Carbon Black)
  • Firewalls and VPN technologies
  • Network Packet Analyzers (Wireshark, tcpdump)
  • Vulnerability Scanners (Nessus, Qualys, OpenVAS)
  • Threat Intelligence Platforms (Recorded Future, ThreatConnect)
  • Security Orchestration, Automation, and Response (SOAR) tools
  • Log Management Systems
  • Malware Analysis Tools
  • Operating Systems (Linux, Windows Server)
  • Scripting languages (Python, PowerShell, Bash)
  • Forensic tools (EnCase, FTK)
  • Cloud security tools (AWS CloudTrail, Azure Security Center)
  • Password managers and multi-factor authentication tools
  • Ticketing and incident management systems (Jira, ServiceNow)
  • Phishing simulation software
  • Network scanners and mapping tools (Nmap)
  • Encryption and cryptography software
  • Data visualization tools

Skills and Qualifications

Education Level

Most employers prefer candidates with a bachelor's degree especially in cybersecurity, computer science, information technology, or a related field. However, a degree alone is not always mandatory if supplemented with strong technical certifications and hands-on experience. Increasingly, specialized cybersecurity certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or GIAC certifications weigh heavily in hiring decisions. The evolving threat landscape demands continuous learning, so a SOC analyst benefits from ongoing professional development through courses, workshops, and participation in cybersecurity communities. Some organizations also accept candidates with two-year technical degrees or military cybersecurity experience, provided they demonstrate proficiency in core skills.

Tech Skills

  • Proficiency in SIEM platforms
  • Network protocols and architecture understanding (TCP/IP, DNS, HTTP)
  • Incident detection and response techniques
  • Log analysis and event correlation
  • Malware identification and analysis
  • Familiarity with cybersecurity frameworks (NIST, ISO 27001)
  • Vulnerability assessment and management
  • Scripting for automation (Python, PowerShell)
  • Use of forensic analysis tools
  • Knowledge of firewall and IDS/IPS management
  • Cloud security monitoring (AWS, Azure platforms)
  • Threat intelligence gathering and application
  • Endpoint security tools expertise
  • Encryption and cryptography basics
  • Operating system hardening (Linux, Windows)

Soft Abilities

  • Analytical thinking
  • Attention to detail
  • Effective communication
  • Problem-solving
  • Stress management
  • Team collaboration and coordination
  • Critical thinking
  • Time management
  • Continuous learning mindset
  • Adaptability

Path to Security Operations Center (SOC) Analyst

Entering the field of Security Operations Center (SOC) Analyst begins with acquiring foundational knowledge in computer science, networking, and cybersecurity principles. Aspiring analysts should build a solid understanding of how networks operate and the common vulnerabilities that exist. Obtaining a bachelor’s degree in cybersecurity, information technology, or related areas often provides the structured learning environment to acquire these basics.

Gaining hands-on experience is crucial. Candidates often start with internships, help desk roles, or entry-level IT support jobs to get familiar with security tools, network configurations, and system administration. Parallelly, earning cybersecurity certifications boosts credibility. Entry-level certs such as CompTIA Security+ validate fundamental security knowledge, while specialized ones like EC-Council’s Certified Ethical Hacker or GIAC’s GSEC expand technical expertise.

Employers value candidates who demonstrate the ability to use SIEM tools, perform forensic analysis, and understand incident response workflows. Joining cybersecurity communities, participating in Capture The Flag (CTF) competitions, and attending industry conferences can deepen practical knowledge and networking opportunities.

On the job, continuous skill development through training programs and exposure to diverse threats is inevitable. Analysts should proactively learn scripting to automate routine tasks and improve detection. Transitioning from junior to mid and senior roles involves taking on more complex incident investigations, designing security strategies, and mentoring junior colleagues.

Keeping up with emerging threats, understanding regulatory compliance requirements, and developing soft skills for teamwork and communication are also essential on the path to becoming a successful SOC Analyst.

Required Education

A typical educational pathway begins with a bachelor’s degree in cybersecurity, information technology, computer science, or related fields. Some institutions offer specialized degrees focused solely on cybersecurity, providing courses in ethical hacking, digital forensics, network defense, cryptography, and risk management. Additionally, community colleges and technical schools offer associate degrees or diploma programs that provide faster entry points but often require supplementation with certifications and on-the-job learning.

Certifications serve as critical milestones. Entry-level options include CompTIA Security+, which covers security fundamentals, network security, and risk management. Beyond that, certifications like Certified Information Systems Security Professional (CISSP) are more advanced and generally require work experience, focusing on managing enterprise security programs. The Certified Ethical Hacker (CEH) certifies offensive security skills important for threat analysis.

Vendor-specific training around SIEM tools like Splunk or IBM QRadar is also beneficial, given their centrality in SOC workflows. Many organizations provide internal training for their specific environments and tools. In addition to formal education and certifications, practical experience through labs, virtual environments, and participation in cybersecurity challenges is a valued part of training.

Regular professional development is critical, as cyber threats and technologies evolve rapidly. Analysts should attend webinars, subscribe to threat intelligence feeds, and participate in industry conferences to stay current and relevant.

Career Path Tiers

Junior SOC Analyst

Experience: 0-2 years

Junior SOC Analysts focus on monitoring security alerts and assisting in incident detection under supervision. They primarily triage alerts, perform initial investigation steps, and escalate serious incidents. The role is learning-intensive, requiring mastery of basic cybersecurity concepts, logging tools, and protocols. Junior analysts gain firsthand exposure to incident response processes and SIEM platforms while building foundational skills such as log analysis, threat identification, and communication with team members.

Mid-level SOC Analyst

Experience: 2-5 years

Mid-level SOC Analysts have more autonomy and responsibilities. They conduct thorough investigations, coordinate incident response activities, and begin tuning security tools. This level involves mentoring junior staff, contributing to threat hunting, and applying advanced technical skills like malware analysis and scripting for automation. Mid-level analysts collaborate cross-functionally on remediation efforts and help formulate security policies, deepening their expertise in managing real-world threats.

Senior SOC Analyst

Experience: 5+ years

Senior SOC Analysts lead complex incident investigations and response efforts, often managing the SOC team’s operational workflows. They design and optimize detection methodologies, integrate threat intelligence, and liaise with leadership to align security strategies with business goals. At this level, professionals contribute to training programs and may influence organizational risk management frameworks. Their expertise extends into forensic analysis, proactive threat hunting, and orchestration of incident containment activities.

SOC Manager / Lead Analyst

Experience: 7+ years

SOC Managers or Lead Analysts oversee the entire SOC function, managing personnel, budgets, and technology deployments. They develop comprehensive security monitoring strategies, ensure compliance with regulatory frameworks, and act as the central point of communication during critical incidents. Their leadership role demands a blend of technical mastery, strategic planning, and team development. They often engage with executive stakeholders to translate technical risk into business impact and direct the evolution of SOC capabilities.

Global Outlook

The demand for SOC Analysts spans the globe, driven by the digital transformation of organizations and the universal threat of cyberattacks. The United States remains a major hub for cybersecurity roles due to its massive technology sector and regulatory environment. Financial centers like New York and tech clusters such as Silicon Valley offer abundant opportunities.

Europe also offers significant openings, with countries like the United Kingdom, Germany, and the Netherlands leading in cybersecurity investments. The European Union’s stringent data protection laws (GDPR) underscore the need for robust security operations teams.

In Asia-Pacific, countries such as Singapore, Australia, and Japan are rapidly expanding cyber defense capabilities, making them attractive locations for SOC Analysts. Emerging markets in India and Southeast Asia offer growing opportunities, fueled by increased internet penetration and enterprise digitalization.

Remote work possibilities continue to grow globally, allowing professionals to collaborate with organizations regardless of location. This flexibility opens doors to international networks and diverse experiences. Multinational corporations and managed security service providers offer roles requiring cross-border coordination and exposure to global threat intelligence.

Language skills and cultural awareness become advantageous when dealing with regional threat actors or compliance frameworks. Understanding geopolitical dynamics also informs threat assessment in global roles, enhancing an analyst’s effectiveness on the international stage.

Job Market Today

Role Challenges

SOC Analysts face a rapidly evolving adversarial landscape where cybercriminals constantly develop new tactics to bypass defenses. There is often an overwhelming volume of alerts which requires effective prioritization to prevent alert fatigue. Complex hybrid infrastructures incorporating cloud, on-premises, and IoT devices introduce multiple attack surfaces that must be monitored simultaneously. Workforce shortages make it difficult for organizations to staff skilled analysts, increasing pressure on existing teams. Continuous learning is a necessity as new vulnerabilities and compliance requirements emerge. Lastly, analysts operate under stressful conditions including shift work, requiring resilience and composure during high-impact incidents.

Growth Paths

As cyber threats grow both in frequency and sophistication, the need for skilled SOC Analysts is escalating globally. Expansion of cloud adoption, remote work, and digital services fuels demand for advanced security monitoring and incident response. Automation and AI integration create opportunities for analysts to focus on higher-level investigations and threat hunting rather than repetitive alert triage. Specialized roles within SOC teams such as malware analysts, threat intelligence analysts, and incident responders are emerging. Growth also arises from formalizing security operations in smaller firms, government entities, and critical infrastructure sectors. Career progression paths, certifications, and cross-disciplinary skills can lead to management or consulting roles.

Industry Trends

Security Automation and Orchestration (SOAR) tools are increasingly prevalent, helping streamline and accelerate response workflows. Cloud-native security monitoring and hybrid environment integration are vital as organizations move infrastructure to cloud platforms. Threat Intelligence integration is more sophisticated, enabling contextualized detections and adaptive defense. Zero Trust security models prompt SOC Analysts to validate that no access is inherently trusted, intensifying monitoring granularity. AI and machine learning enhance anomaly detection but also require analysts to mitigate false positives and adversarial AI tactics. Emphasis on compliance with data privacy regulations shapes SOC operations. Finally, cybersecurity frameworks and threat sharing collaborations improve community defense strategies.

A Day in the Life

Morning (9:00 AM - 12:00 PM)

Focus: Alert Monitoring & Incident Triage
  • Review overnight security alerts and notifications from SIEM tools.
  • Prioritize and categorize incidents based on severity and potential impact.
  • Perform initial investigations on suspicious activities or anomalies.
  • Check system health and update detection rules if needed.
  • Communicate critical findings to the SOC team and management.

Afternoon (12:00 PM - 3:00 PM)

Focus: Incident Response & Collaboration
  • Investigate active security incidents with deeper forensics and analysis.
  • Coordinate incident containment and mitigation actions with IT teams.
  • Engage with threat intelligence feeds to enrich context for detections.
  • Document incidents thoroughly including timelines and technical details.
  • Contribute to policy updates and security awareness activities.

Late Afternoon (3:00 PM - 6:00 PM)

Focus: Proactive Security & Learning
  • Conduct threat hunting exercises leveraging anomaly detection tools.
  • Review and optimize SIEM and endpoint detection system configurations.
  • Analyze recent security incidents for lessons learned and improvement.
  • Participate in training sessions or cybersecurity briefings.
  • Prepare reports and summaries for shift handovers.

Work-Life Balance & Stress

Stress Level: High

Balance Rating: Challenging

The pressure to remain vigilant around the clock and respond promptly to incidents can result in a high-stress environment, especially during critical events or prolonged attack campaigns. Shift work is common to provide 24/7 coverage, impacting personal routines. Despite this, organizations are increasingly investing in automation and team rotations to mitigate burnout. Success in maintaining balance often depends on personal time management, stress resilience, and employer support in fostering a healthy work environment.

Skill Map

This map outlines the core competencies and areas for growth in this profession, showing how foundational skills lead to specialized expertise.

Foundational Skills

Core knowledge essential to every SOC Analyst for daily operations and understanding cybersecurity principles.

  • Network Protocols (TCP/IP, DNS, HTTP)
  • Basic Cybersecurity Concepts
  • Log Analysis and Event Correlation
  • Incident Detection and Response
  • Operating System Fundamentals (Linux, Windows)
  • Use of SIEM Tools

Advanced Technical Skills

Skills needed to perform in-depth analysis, threat hunting, and forensic investigations.

  • Malware Analysis
  • Scripting and Automation (Python, PowerShell)
  • Vulnerability Management
  • Network Traffic Analysis
  • Threat Intelligence Application
  • Cloud Security Monitoring

Professional & Soft Skills

Abilities that enhance team collaboration, communication, and adaptiveness within a SOC environment.

  • Analytical Thinking
  • Effective Communication
  • Stress Management
  • Time Management
  • Teamwork and Collaboration
  • Continuous Learning

Pros & Cons for Security Operations Center (SOC) Analyst

βœ… Pros

  • High demand and excellent job security in a growing cybersecurity field.
  • Opportunities for continuous learning and professional development in emerging technologies.
  • Critical role in protecting organizations from cyber threats, providing a strong sense of purpose.
  • Exposure to a wide range of tools, technologies, and attack methodologies.
  • Career advancement paths into specialized and managerial roles.
  • Collaborative work environment with cross-functional teams.

❌ Cons

  • High-stress environment due to the constant threat of cyberattacks and need for rapid response.
  • Shift work and 24/7 monitoring requirements can disrupt work-life balance.
  • Alert fatigue caused by large volumes of false positives from security tools.
  • Pressure to stay current with fast-evolving technologies and threat landscapes.
  • Repetitive nature of some monitoring tasks prior to automation.
  • Potential for burnout without proper support and stress management.

Common Mistakes of Beginners

  • Focusing too much on alarms without contextual analysis, leading to improper prioritization.
  • Ignoring the importance of documenting incidents and processes thoroughly.
  • Lack of collaboration with other teams, missing critical information for incident response.
  • Overreliance on automated tools without understanding their limitations.
  • Failing to keep learning regularly about new threats and security trends.
  • Poor time management causing delays in incident escalation or response.
  • Neglecting soft skills like communication, impacting team effectiveness.
  • Insufficient attention to tuning and maintaining detection rules, resulting in alert fatigue.

Contextual Advice

  • Develop a strong foundation in networking and system administration fundamentals early on.
  • Regularly practice using SIEM tools and participate in hands-on labs or simulations.
  • Embrace continuous education through certifications, conferences, and threat intelligence sources.
  • Build a network within cybersecurity communities for mentorship and knowledge sharing.
  • Balance technical skills development with soft skills, especially communication and teamwork.
  • Document everything clearly and thoroughly to support investigations and compliance requirements.
  • Keep a healthy work-life balance to sustain long-term performance, especially during shift rotations.
  • Engage in threat hunting to move beyond reactive monitoring and contribute proactively.

Examples and Case Studies

Detecting and Mitigating Ransomware Attack at a Financial Institution

A mid-sized bank’s SOC team identified unusual network traffic through their SIEM platform indicating a potential ransomware infection. The SOC Analyst prioritized the alert, quickly isolating affected endpoints and collaborating with the IT department to contain the malware before widespread encryption occurred. The incident was documented thoroughly, and intelligence was shared with industry peers. The team then conducted a root cause analysis, driving improvements in email filtering and user training to reduce phishing risk.

Key Takeaway: Prompt detection and coordinated response prevented severe operational disruption and financial loss, highlighting the importance of alert prioritization and cross-team collaboration.

Threat Hunting Reveals Persistent Insider Threat

Through proactive threat hunting activities, a SOC Analyst uncovered anomalous access patterns from a privileged user that traditional monitoring had missed. The investigation revealed data exfiltration attempts. The analyst led the containment process and worked with compliance to handle legal aspects. The findings prompted policy revisions and enhancements in privileged access management.

Key Takeaway: Proactive approaches such as threat hunting are invaluable for detecting stealthy threats that automated alerts might overlook.

Integrating Cloud Security Monitoring in a Hybrid Environment

A multinational corporation expanded their SOC’s capabilities to monitor workloads deployed in Azure and AWS. SOC Analysts adapted their workflows to ingest cloud-native logs and configured new alert rules targeting cloud-specific vulnerabilities. Continuous learning and vendor training enabled the team to maintain visibility and quickly respond to cloud incidents.

Key Takeaway: Adapting to cloud environments is now essential for SOC Analysts, requiring ongoing training and tool proficiency.

Portfolio Tips

When building a portfolio as an aspiring Security Operations Center Analyst, focus on showcasing practical skills and real-world problem solving rather than just theoretical knowledge. Include documented projects where you have analyzed logs, identified suspicious activities, or responded to simulated incidents. Demonstrate familiarity with key tools such as SIEM platforms, vulnerability scanners, or scripting languages. Hands-on exercises from platforms like TryHackMe, Hack The Box, or Cyber Ranges provide tangible proof of capability.

Detail any completed certifications and relevant coursework clearly. Use case studies or incident reports you have prepared to illustrate analytical thinking and communication skills. Highlight any contributions to cybersecurity communities or participation in Capture The Flag competitions.

A well-organized, digital portfolio that includes links to GitHub repositories for scripts, code samples, and documentation significantly strengthens your candidacy. Don't overlook writing blogs or articles about security topics, as this improves your visibility and establishes you as an engaged professional eager to share insights. Always tailor your portfolio to the job description, emphasizing skills and experiences that align with the employer's technology stack and security needs.

Job Outlook & Related Roles

Growth Rate: 15%
Status: Growing much faster than average
Source: U.S. Bureau of Labor Statistics

Related Roles

Frequently Asked Questions

What is the typical career progression for a SOC Analyst?

Career progression usually starts at the junior SOC Analyst level where you learn alert triage and incident response basics. With experience and certifications, you can advance to mid-level roles involving in-depth investigations and threat hunting. Senior analysts take on leadership in incident management and security strategy development. Eventually, opportunities exist to become SOC Manager, cybersecurity consultant, or specialize in fields like penetration testing or digital forensics.

Do I need a degree to become a SOC Analyst?

While a bachelor’s degree in cybersecurity, IT, or computer science is highly beneficial and preferred by many employers, it is not always mandatory. Practical experience, relevant certifications such as CompTIA Security+ or CEH, and demonstrated proficiency with SOC tools can compensate for the absence of a degree in some cases.

Are SOC Analysts required to work night shifts or weekends?

Many SOCs operate 24/7 to monitor threats continuously, so analysts often work in shifts that can include nights, weekends, and holidays. Shift scheduling varies by organization but developing stamina and effective time management skills is important for maintaining work-life balance.

What certifications are recommended for SOC Analysts?

Entry-level certifications like CompTIA Security+ provide foundational knowledge. Other valuable certifications include Certified Ethical Hacker (CEH), GIAC Security Essentials (GSEC), and Certified Information Systems Security Professional (CISSP) for advanced roles. Vendor certifications in specific tools like Splunk Certified User or Microsoft Certified: Security Operations Analyst are also beneficial.

What tools do SOC Analysts use daily?

Analysts commonly use Security Information and Event Management (SIEM) platforms such as Splunk, IBM QRadar, or ArcSight to correlate and analyze security events. Endpoint Detection and Response (EDR) tools like CrowdStrike, vulnerability scanners like Nessus, network packet analyzers such as Wireshark, and threat intelligence platforms are also vital.

How important are soft skills in a SOC Analyst role?

Soft skills are critical. Effective communication is necessary to report incidents clearly to technical and non-technical stakeholders. Analytical thinking helps in prioritizing and understanding complex threats. Stress management is essential due to high-pressure situations, and teamwork ensures efficient incident response.

Can SOC Analysts work remotely?

Remote work possibilities have increased due to advances in secure network access and collaboration tools. However, many organizations prefer on-site or hybrid models for SOC Analysts to ensure rapid communication and secure environments. Some roles, particularly with managed security service providers (MSSPs), offer more remote flexibility.

What are common challenges faced by SOC Analysts?

Challenges include managing alert fatigue from high false positives, staying updated with constantly changing threats, working irregular hours during shifts, balancing speed with thoroughness during incidents, and continuous learning demands.

How can a SOC Analyst stay current with cybersecurity trends?

Regularly reading threat intelligence reports, participating in cybersecurity communities, attending webinars and conferences, engaging in continuous certification and training, and experimenting with new tools or labs help analysts remain updated.

Sources & References

Share career guide

Jobicy+ Subscription

Jobicy

578 professionals pay to access exclusive and experimental features on Jobicy

Free

USD $0/month

For people just getting started

  • • Unlimited applies and searches
  • • Access on web and mobile apps
  • • Weekly job alerts
  • • Access to additional tools like Bookmarks, Applications, and more

Plus

USD $8/month

Everything in Free, and:

  • • Ad-free experience
  • • Daily job alerts
  • • Personal career consultant
  • • AI-powered job advice
  • • Featured & Pinned Resume
  • • Custom Resume URL
Go to account β€Ί