Top 10 It skills in demand for 2018

British companies are heading towards a security operations centre (SOC) crisis which could dramatically swing the threat success balance in favour of the bad guys.
The Agari 'Email Fraud & ID Deception insights Trends' report published today should serve as a wake-up call to organisations across the country that the SOC is cracking up under the strain of a severe skilled staff shortage.
According to the Agari research, based upon the number of phishing incidents reported and the time it takes to investigate just this threat sector, the average SOC needs a total of 54 skilled analysts to perform optimally.
Yet the average number of analysts in UK-based SOCs is just 12.
"The fact that UK enterprises are suffering an average deficit of over 40 analysts at any one time," Crane Hassold, director of threat research for the Agari Cyber Intelligence Division, told SC Media UK, "should be a massive red flag that organisations are simply unable to deal with the burgeoning number, and increased sophistication of threats – especially those using targeted email."
The phishing threat isn't the only thing that's sucking up the time of SOC analysts, but it has become a pretty important resource drain when those resources are being stretched so thinly.
The research suggests that analysts in UK SOCs spend an average of 4.25 hours triaging phishing incidents that turn out to be false positives, whereas actual phishing incidents require only slightly longer at 4.81 hours. The significance of these figures becomes apparent when you read that of the 24,000 phishing incidents reported by employees per UK organisation each year, on average, some 55 percent of these are false positives.
"The number of suspected email threats reported by employees shows that much has been achieved in educating staff on the threat of phishing and other email threats," Hassold said. "However, the increase in these reports is flooding SOCs with a raft of false positives, which current resources just can’t deal with."
And there lies the rub: the cost of manually handling these reports is over £3 million a year, according to Agari, assuming of course that SOCs can find the skilled analysts required.
Rod Soto, head of security research at JASK, compares the problem to having a castle with no guards or an open backdoor in your house with no locks or cameras. "The impact comes in significant losses in financial terms, reputation and intellectual property," Soto told SC.
The skills shortage also plays out with other organisations continually seeking to "pry your most valued professionals away with ever new shiny things and increasing compensation" as Steffan Jones, the Security Operations Manager responsible for Alert Logic’s European arm of its Global SOC says.
"The expertise is out there," Jones said, "but a lot is in motion far more than other IT disciplines."
Which means that most enterprises are forever behind the curve in terms of being properly prepared to defend the business.
"Consequently, there will be less focus on delivering proactive security awareness and expertise to end users and business projects, broadening the scope for monitoring and workload of the SOC to undertake," Jones warned, "resulting in a vicious cycle rather than a virtuous one."
So, what should enterprises be doing in order to mitigate the risks that this apparent shortage of optimally-staffed SOCs bring to the data security party?
Barbara Kay, senior director security at ExtraHop, feels that there is a "rich vein of talent within organisations if they cross-train existing IT teams to understand security".
She admitted that this "takes a commitment, but leverages existing knowledge of the business and its IT systems."
Kay told SC that security teams must consciously reassess their processes and tools to get the most from their people, meaning both better and fewer tools which are flexible and proactive in adopting automated processes and machine learning as staples.
Javvad Malik, security advocate for AlienVault, agreed that "having tools that are built together and can also integrate threat intelligence… can help reduce the different applications needed to be managed".
Kunal Hatodé, senior manager (EMEA) for advanced cyber security services at NTT Security, added that "with the help of an automated workflow orchestration tool, it’s possible to carry out investigations across all internal and external tools in a shorter time, at least 60 percent quicker, by carrying them out in parallel rather than sequentially".
We'll leave the last word to JASK's Rod Soto though, who provided SC with this handy bullet point list of measures the enterprise can take:
-
Hire on skills not degrees
-
Reach within your own organisation for potential individuals that can be trained and already know your enterprise systems
-
Once you have personnel invest in them, have a career path and make them feel appreciated so they do not leave
-
Embrace technologies that will allow cybersecurity operators to perform further tasks. Things such as SOC automation, Machine Learning and AI

Latest Jobs
-
- Account Director | Cyber Security Consulting | UK - South East
- London
- N/A
-
Account Director | Cyber Security Consulting - Financial Services | UK - South East. New Role due to Growth We are looking for an experienced Account Director to develop and expand existing relationships across the financial services sector, working with investment firms, asset managers, private equity groups and strategic partners to deliver intelligent cyber consulting and a bespoke Cyber product offerings. You will act as a trusted advisor, helping organisations strengthen digital resilience, manage third-party and regulatory risk and adopt a proactive approach to cyber assurance. Key Responsibilities Manage a defined portfolio of financial clients, understanding business priorities and aligning tailored cyber solutions. Drive new client engagement while nurturing existing partnerships through a consultative, long-term approach. Present the benefits of advanced cyber services including threat intelligence, vulnerability management, incident readiness, and continuous risk monitoring. Collaborate with technical and delivery teams to ensure smooth engagement from proposal through to implementation and ongoing support. Prepare proposals, negotiate commercial terms, and clearly articulate value and business outcomes. Build trusted relationships at senior and board level. Ideal Profile Strong background in cybersecurity, consulting, or risk management within financial services. Skilled communicator with proven success managing and growing key accounts. Able to translate complex technical insight into commercial and strategic value for clients. Confident engaging with senior stakeholders and decision makers. Please note: Sponsorship is not available.
-
- SOC Analyst- Level 2- Hybrid Greater London
- London
- N/A
-
SOC Analyst- Level 2- Hybrid Greater London New opportunity created through continued growth. We’re looking for a SOC Analyst (Level 2) to strengthen a growing managed security team. You’ll work hands-on with Microsoft Sentinel and Defender XDR, investigating alerts, responding to incidents, and helping improve how clients stay protected. This role is ideal for someone who enjoys unravelling security events, thinking critically under pressure, and making a real difference day to day. What you’ll do · Investigate and respond to security activity across SIEM and endpoint tools · Analyse network and log data to uncover real threats · Support automation initiatives to streamline response processes · Help maintain visibility, data flow, and performance across SOC platforms What you’ll need · Practical experience using Microsoft Sentinel and Defender XDR · Confident working with KQL or similar query languages · Understanding of attacker tactics and response techniques · SC-200 certifications would be nice. · Experience supporting multiple customer environments Please note: Sponsorship is not available.
-
- Senior SOC Engineer - UK - New role due to growth
- London
- N/A
-
Senior SOC Engineer – New role due to growth We are hiring a Senior SOC Engineer to take the lead across security operations for a growing managed service. You will lead detection, response and onboarding activity across multiple clients, helping shape how the SOC evolves. Expect variety; from fine-tuning alerts and threat hunting to supporting customers and mentoring junior analysts. What you’ll bring · Strong experience across SIEM, EDR, and threat detection tools · Confident working with customers in a managed service environment · Skilled in scripting or query languages such as KQL or PowerShell · Knowledge of frameworks like NIST, ISO27001, MITRE ATT&CK · Calm communicator with a problem-solving mindset · Experience with Azure Lighthouse or delegated access models · Prior involvement in automation or SOC improvement projects Location: South East England- Hybrid role Please note: Sponsorship cannot be offered now or in the future.
-
- SENIOR Cyber Risk Consultant. Cyber Risk consultancy - the right way. UK. Hybrid - Remote first
- United Kingdom
- N/A
-
Senior Cyber Risk Consultant needed. New position due to growth Seeking a passionate Cyber Security Risk Consultant who enjoys helping clients make a different to their business. Dedicated training budgets, Unlimited holiday structured career path, Work life balance guaranteed Cyber Risk consultancy done the right way. A successful individual will have experience working with clients to identify business cyber security risk. This is a remote first opportunity which means you will spend the majority of your time working remotely. You will however spend some time meeting clients as well as meeting up with the team on a monthly basis.. Some of the nice to have certifications. CRISC, ISO27001 Lead implementer, CISA, CISM, CISSP Unable to offer Visa sponsorship now or in the future.