Top 10 It skills in demand for 2018
British companies are heading towards a security operations centre (SOC) crisis which could dramatically swing the threat success balance in favour of the bad guys.
The Agari 'Email Fraud & ID Deception insights Trends' report published today should serve as a wake-up call to organisations across the country that the SOC is cracking up under the strain of a severe skilled staff shortage.
According to the Agari research, based upon the number of phishing incidents reported and the time it takes to investigate just this threat sector, the average SOC needs a total of 54 skilled analysts to perform optimally.
Yet the average number of analysts in UK-based SOCs is just 12.
"The fact that UK enterprises are suffering an average deficit of over 40 analysts at any one time," Crane Hassold, director of threat research for the Agari Cyber Intelligence Division, told SC Media UK, "should be a massive red flag that organisations are simply unable to deal with the burgeoning number, and increased sophistication of threats – especially those using targeted email."
The phishing threat isn't the only thing that's sucking up the time of SOC analysts, but it has become a pretty important resource drain when those resources are being stretched so thinly.
The research suggests that analysts in UK SOCs spend an average of 4.25 hours triaging phishing incidents that turn out to be false positives, whereas actual phishing incidents require only slightly longer at 4.81 hours. The significance of these figures becomes apparent when you read that of the 24,000 phishing incidents reported by employees per UK organisation each year, on average, some 55 percent of these are false positives.
"The number of suspected email threats reported by employees shows that much has been achieved in educating staff on the threat of phishing and other email threats," Hassold said. "However, the increase in these reports is flooding SOCs with a raft of false positives, which current resources just can’t deal with."
And there lies the rub: the cost of manually handling these reports is over £3 million a year, according to Agari, assuming of course that SOCs can find the skilled analysts required.
Rod Soto, head of security research at JASK, compares the problem to having a castle with no guards or an open backdoor in your house with no locks or cameras. "The impact comes in significant losses in financial terms, reputation and intellectual property," Soto told SC.
The skills shortage also plays out with other organisations continually seeking to "pry your most valued professionals away with ever new shiny things and increasing compensation" as Steffan Jones, the Security Operations Manager responsible for Alert Logic’s European arm of its Global SOC says.
"The expertise is out there," Jones said, "but a lot is in motion far more than other IT disciplines."
Which means that most enterprises are forever behind the curve in terms of being properly prepared to defend the business.
"Consequently, there will be less focus on delivering proactive security awareness and expertise to end users and business projects, broadening the scope for monitoring and workload of the SOC to undertake," Jones warned, "resulting in a vicious cycle rather than a virtuous one."
So, what should enterprises be doing in order to mitigate the risks that this apparent shortage of optimally-staffed SOCs bring to the data security party?
Barbara Kay, senior director security at ExtraHop, feels that there is a "rich vein of talent within organisations if they cross-train existing IT teams to understand security".
She admitted that this "takes a commitment, but leverages existing knowledge of the business and its IT systems."
Kay told SC that security teams must consciously reassess their processes and tools to get the most from their people, meaning both better and fewer tools which are flexible and proactive in adopting automated processes and machine learning as staples.
Javvad Malik, security advocate for AlienVault, agreed that "having tools that are built together and can also integrate threat intelligence… can help reduce the different applications needed to be managed".
Kunal Hatodé, senior manager (EMEA) for advanced cyber security services at NTT Security, added that "with the help of an automated workflow orchestration tool, it’s possible to carry out investigations across all internal and external tools in a shorter time, at least 60 percent quicker, by carrying them out in parallel rather than sequentially".
We'll leave the last word to JASK's Rod Soto though, who provided SC with this handy bullet point list of measures the enterprise can take:
-
Hire on skills not degrees
-
Reach within your own organisation for potential individuals that can be trained and already know your enterprise systems
-
Once you have personnel invest in them, have a career path and make them feel appreciated so they do not leave
-
Embrace technologies that will allow cybersecurity operators to perform further tasks. Things such as SOC automation, Machine Learning and AI
Latest Jobs
-
- Public Sector Cyber Security Sales | UK
- England
- N/A
-
Public Sector Cyber Security Sales | UK UK | Remote / Hybrid A cyber security provider is seeking a Public Sector Sales professional to drive growth across UK government and public sector organisations. Must have current Cyber Security sales experience. Responsibilities Generate new business selling cyber security solutions into UK public sector Build relationships with CIO, CISO and senior technology stakeholders Manage the full sales cycle from opportunity to contract close Develop pipeline across central government, local government and public sector bodies Support bids, tenders and framework opportunities Experience Proven cyber security sales experience in the UK Track record selling into public sector organisations Familiarity with CCS, G Cloud or other government frameworks Strong stakeholder engagement and deal management skills Location UK based Security Requirements Eligible to obtain UK Security Clearance
-
- Security Architect | MoD - Security Cleared. OUTSIDE IR35 | Hampshire
- N/A
- Outside IR35
-
Security Architect | MOD | Security Cleared | Outside IR35 | Hampshire Commutable The successful candidate must be willing to undergo DV Clearance, ideally already holding active clearance. You will produce high and low level security architecture documentation, guiding and validating designs for systems deployed within sensitive environments. The role requires providing specialist security input into solution design, service transition and change initiatives, working closely with engineering, operations, client and third party stakeholders. You must have current hands on architectural experience, including VMware secure platform design and virtualisation architecture, alongside AWS expertise. This is an outside IR35 contract- 6 month rolling. Part of a longer term MoD project
-
- Active Directory | RBA engineer | UK Remote | SC Clearable
- United Kingdom
- N/A
-
Technical Active Directory (AD) and RBA specialist needed to play a key part in complex, enterprise scale Active Directory and access transformation programmes. You will work alongside senior team, helping reshape access models, modernise legacy directory structures and strengthen security posture across secure environments. This is hands on delivery within high impact projects where your work directly improves access control, compliance and operational resilience. Active UK Security Clearance required. This is a remote role with client travel. Implementation of Role Based Access Control across large AD estates Restructuring complex permission models, security groups and delegated access Supporting domain controller upgrades and core directory improvements Applying security hardening standards and remediating audit findings Enhancing authentication, policy and access governance frameworks Troubleshooting and resolving technical AD challenges within live environments Producing robust technical documentation and identifying project risks You must have the following technical experience Enterprise Active Directory administration Role Based Access and permission remediation OU design and governance Group Policy management Security group delegation models DNS and DHCP services Kerberos authentication / NTLM PowerShell scripting and automation Azure AD | Entra ID Hybrid identity environments Identity Governance PAM
-
- Identity and Access Management Consultant (Saviynt & Microsoft Entra) | UK
- United Kingdom
- N/A
-
Role summary Technical IAM consultant delivering identity governance and cloud identity solutions to enterprise clients. What you will do Implement / Configure / Deploy Saviynt IGA / Microsoft Entra solutions: Lead technical workshops, gather requirements and translate into solution designs. Troubleshoot complex issues, support testing and deployments. Produce technical artefacts and configuration guides. Key skills Hands-on Saviynt IGA experience (workflow, connectors, access governance). Strong practical knowledge of Microsoft Entra ID / Azure AD identity and access controls. Understanding of identity protocols (SAML, OAuth, OpenID Connect) and hybrid identity. Experience with APIs / REST for integrations and automation. What we are looking for Proven delivery experience in IAM / IGA projects, preferably in consulting. Confident communicator with client-facing delivery exposure.