Each1Teach1 Tech

Each1Teach1 Tech Logo

Basic Information

Sponsor Address: 1009 Campbell Ridge Drive, Elgin, SC, 29045-9168
Phone Number: 8035462173
Coordinator Contact Name: Angela Chapman

Action Shots

Each1Teach1 Tech
Each1Teach1 Tech

* Click each thumbnail for a larger version.

Additional Information

Accrediting Organization: US-DOL
Year Organized: 2020
Districts Covered: SC and remote locations as long as the HQ is in SC. Any one can take the Registered apprenticeship program.
Program Length: 130 weeks or 26 weeks
Starting Wage: 17
Minimum Wage: 17
Education Prerequisites:

High school or equivalent:
Must have smartphone experience.
Must have problem solving capability.
Must read the book: The Cyber Samurai : A journey or resilience and mastery.
https://a.co/d/f637doh

Physical Requirements:

Able to lift 50ibs.

Exams: Only at the end of the program.
Age Limits: 16
Additional Requirements: Candidates need to meet the income requirements: That is be on the poverty level.&nbsp;<br /> 20 percentage above povertly line is fine provided the family size is considered.&nbsp;
Qualifications:

Minimum requirement is High school diploma or GED.
If you have BSC or Master that is fine.

Application Process:

If you are a school go to the site and choose:

E1T1 iFACT TechStart Pro

E1T1 iFACT TechStart Pro is designed to equip life learners, middle and high school students with foundational IT knowledge and practical skills, preparing them for advanced tracks in Cybersecurity or IT. The program aims to make technology education accessible, affordable, and relevant to the needs of the evolving digital landscape.

$2000/ month / cohort

Features and benefits

  • Possible track for completion:
    Cybersecurity support technician
    IT specialist I
  • Flexible schedule
  • Local school facilities
  • Local Teachers with specialized training
  • Competitive pricing.
  • Hands-on and On the job training: OJT
  • Adaptable and expandable
  • Pre-requisite for RAP
  • $150/hour for the first 10 students. For any additional students (up to a maximum of 5),a flat rate of $100/hour will apply
  • $2000.00 for 16 hours / month / cohort (15 students max).

1. Cybersecurity certification with ISC2
2. AWS CFL-C01
3. CompTIA Sec+
4. CySA+ or SSCP with ISC2

As an individual learner:
Go to the website fill out the apprenticeship application form.
We will respond back to you on that one.
If you really need to move forward faster as the registered apprenticeship program is based on funding.
Proceed to choose the short term program you desire.
A. SOC Team Bi-yearly Sponsorship -(STBS)
B. SOC Teach On-demand Membership -(STOM)

1. Cybersecurity certification with ISC2
2. AWS CFL-C01
3. CompTIA Sec+
4. CySA+ or SSCP with ISC2

Costs/Tuition: 2000
Financial Aid:

Scholarship

State License/Certification Requirements: None
10 Year Growth: 5000 leaners trained and working in cybersecurity
Number of Hours on the Job Training: 20- 30 Hours per week
Preparation:

You must be mentally ready, Bring your problem solving skills with you..
Equip yourself with 1. Working Laptop 2.7 or more Ghz CPU, minimum 8 gb of ram and 500gb of HDD or ssd. 2. Highspeed internet is required 3. A smartphone

Working Conditions:

Remotely and some field work as IT generalist support to complete IT requirements and become well rounded as a Cyber secuirty operations center analyst. You can only defend what you know how it works.

Work Process Schedule: Internal
Interests:

We are interested in public, charter, and private schools.

Work Values:

Work Values of a SOC Analyst Level I:

  1. Attention to Detail:

    • Precision is key in detecting and analyzing potential security threats. A SOC analyst must meticulously monitor systems and analyze data to catch even the smallest anomalies.
  2. Proactive Problem Solving:

    • The ability to take initiative in identifying and mitigating security risks is essential. We value analysts who can anticipate problems before they escalate and take action swiftly.
  3. Collaboration:

    • Teamwork is at the core of a successful SOC. We value strong communicators who work well with others, sharing insights and collaborating on incident response to safeguard the organization.
  4. Continuous Learning:

    • Cybersecurity is a rapidly evolving field. We encourage a growth mindset, where analysts continually expand their knowledge of new threats, tools, and industry best practices.
  5. Integrity:

    • Maintaining confidentiality and following ethical practices in incident handling is paramount. Our SOC analysts must uphold the highest standards of professionalism and responsibility.
  6. Accountability:

    • We value individuals who take ownership of their tasks, ensuring that incidents are handled promptly and thoroughly, and who can be relied upon in critical situations.
  7. Resilience:

    • The security environment can be high-pressure and fast-paced. We value SOC analysts who stay calm under pressure and maintain a strong focus during challenging situations.
  8. Adaptability:

    • Being open to new tools, methodologies, and evolving threats is crucial. We value analysts who can adapt quickly to changing circumstances and continuously improve their approach to security.
  9. Customer Focus:

    • Understanding the impact of security incidents on the business and focusing on minimizing risks for internal and external stakeholders is a key value we uphold in our SOC.
  10. Commitment to Excellence:

    • We aim for top-tier performance, ensuring that our SOC analysts deliver the highest quality of work, from incident monitoring to reporting and prevention strategies.

These values are the foundation of an effective SOC team, ensuring that analysts not only perform their duties well but also contribute to a culture of trust, continuous improvement, and teamwork.

Tasks:

1. SOC Level Analyst
Monitoring, detecting and responding to incident impacting the asset of the organization.
2. Support tech work
3. Network assist

Duties:

Duties of a SOC Analyst Level I:

  1. Monitor Security Systems:

    • Continuously monitor logs and alerts from security systems such as SIEMs, firewalls, IDS/IPS, and endpoint protection platforms.
    • Look for suspicious activity or potential security incidents.
  2. Triage Security Alerts:

    • Analyze security alerts to determine their severity and urgency.
    • Prioritize alerts and escalate them to higher-level analysts when necessary.
  3. Initial Incident Response:

    • Respond to security incidents in their early stages, investigating and mitigating potential threats.
    • Perform basic containment and remediation tasks as directed by senior analysts.
  4. Threat Analysis:

    • Identify and track malicious activity such as unauthorized access attempts, malware infections, or phishing attacks.
    • Help to understand the root cause of security incidents by analyzing logs, system data, and network traffic.
  5. Escalation and Reporting:

    • Escalate complex or critical security incidents to Level II or senior SOC analysts for further investigation.
    • Document all incidents, actions taken, and findings in incident management tools for future reference.
  6. Vulnerability Management Support:

    • Assist in identifying potential vulnerabilities within the network and systems.
    • Suggest initial mitigation measures for vulnerabilities discovered during monitoring.
  7. Support Threat Intelligence Activities:

    • Keep up to date with the latest security news, vulnerabilities, and emerging threats.
    • Help integrate threat intelligence into monitoring activities to enhance detection capabilities.
  8. Communication and Collaboration:

    • Work closely with senior analysts, IT teams, and other departments to investigate security events.
    • Provide updates and reports on ongoing incidents to ensure all stakeholders are informed.
  9. Maintain Security Tools:

    • Support the maintenance and tuning of security tools to ensure optimal performance and relevance in threat detection.
  10. Documentation:

    • Log all activities, incidents, and investigations to ensure accurate records for audits, reviews, and incident response processes.

These duties ensure that the SOC Analyst Level I helps protect the organization's network and data from potential threats while collaborating with senior team members to manage complex security incidents.

Testing:

Screening: This happens after initial instruction in our E1T1 Techstart Pro. We ask questions on security operations.

Skills:

Skills & Qualifications you will learn:

  • Foundational Knowledge of Security Principles: Basic understanding of network security, operating systems, and common attack vectors (e.g., phishing, malware, DDoS attacks).
  • Experience with Security Tools: Familiarity with SIEM platforms, firewalls, and endpoint protection tools.
  • Strong Analytical Skills: Ability to analyze data from multiple sources and identify patterns or anomalies.
  • Team Player: Willingness to work in a team environment and collaborate on incident resolution.
  • Attention to Detail: Ability to follow procedures carefully and document findings thoroughly.
  • Problem-Solving Skills: Capacity to think critically and solve issues with minimal supervision.
Knowledge:

Our knowledge base is research oriented and team driven.

Work Style:

Remotely and peice wise paired with a team member in all cybersecurity operation center work.

Work Environment:

  • Shifts: May involve working in shifts to provide 24/7 security monitoring.
  • Tools: Hands-on experience with tools like Splunk, Wazuh, Jira, or similar platforms is a plus.

Mission Statement:

To provide an inclusive, earn-to-learn platform that empowers under-served communities with accessible and affordable learning options, while bridging the skills gap for successful employment and enabling positive community impact.

Philosophy/Belief Statement:

Our approach is all about practical, experiential learning. We don't believe in just knowing facts--we focus on giving you the tools to apply your knowledge in real-world situations. We want to take you beyond theory, helping you effortlessly put what you learn into practice, just like tying your shoelaces. When you truly understand how things work, you can protect and improve them. That's how you create lasting impact, not only for yourself but for those around you.

Testimonials:

ROLANDA

While certifications and a college degree are not always adequate to a high- paying job right away, taking the hands-on training course for AWS in Josiah's excellent online class will definitely correlate to a higher salary. Yes, Josiah's class is absolutely worth it. The lack of having a hands-on cloud experience was identified online as the number one challenge with cloud adoption by 25% of corporations. I believe that because of the shortage of hands-on experience, by taking the time to continue and complete Josiah's wonderful hands on course is well worth the time and effort.

Edikan

The program has exposed me to many opportunities, and awareness. Being the fact that there are many more things to learn out there. In order to compete with others and to stand a better position in life. I'll encourage people to develop and devote more into IT because it's the future…..

Azieb Gebrehiwet

I started the class with very little skills or experience in IT. I felt quite intimidated and overwhelmed by what I was about to learn. Despite these feelings, I made a decision to stay on board. Even when I felt at times like giving up on the program, Josiah's dedication, encouragement and powerful words were the best motivation to keep pushing.

JANELL

It was exciting to have someone with Josiah's knowledge and IT experience willing to take time out of his busy schedule to teach the skills needed for us to succeed. I really enjoyed the dedication of Josiah and my fellow classmates meeting twice a week since July.

Apprenticeship Program History:

We have been operating since 2020 but was registered as an RAP in 2022.
Due to lack of funding we are very picky in who we work with. Therefore we have devecloped a sustainable system for our leaners many of them are working in fortune 500 organizations.

Social Media:

fb: each1teach1tech
x.com: each1teach1llc
Instagram : e1t1tech

Full Occupation Description:

Job Overview:

As a SOC Analyst Level I, you will be the first line of defense in a Security Operations Center (SOC), responsible for monitoring and responding to security events across the organization's systems and networks. You will work closely with senior analysts to detect, investigate, and mitigate potential threats in real-time, ensuring the integrity, confidentiality, and availability of critical assets.

Key Responsibilities:

  • Monitor Security Systems: Continuously review and analyze logs, alerts, and security events from various systems (SIEM, IDS/IPS, firewalls, etc.).
  • Incident Detection & Response: Identify potential security threats and anomalies, escalate incidents, and assist in the initial stages of investigation and response.
  • Analyze Security Alerts: Triage alerts to determine their priority and potential impact, investigating further or escalating when necessary.
  • Support Incident Investigations: Collaborate with senior analysts to collect, analyze, and preserve digital evidence related to potential security incidents.
  • Threat Intelligence: Stay updated on emerging threats, vulnerabilities, and exploits to enhance detection capabilities.
  • Document Findings: Maintain accurate records of incidents, investigations, and remediation steps taken using SOC tools and platforms.
  • Communicate Effectively: Collaborate with other team members, reporting security incidents and risks to leadership and affected teams.

Preferred Qualifications:

  • Certifications: CompTIA Security+, Certified Ethical Hacker (CEH), or other relevant certifications.
  • Experience: 0-2 years of experience in IT, network administration, or cybersecurity.
  • Knowledge of Cybersecurity Frameworks: Familiarity with NIST, ISO 27001, or other industry security standards.

This description outlines the foundational duties of a Level I SOC Ana