Crisis in the SOC as skills shortage bites deep, says report

British companies are heading towards a security operations centre (SOC) crisis which could dramatically swing the threat success balance in favour of the bad guys.
The Agari 'Email Fraud & ID Deception insights Trends' report published today should serve as a wake-up call to organisations across the country that the SOC is cracking up under the strain of a severe skilled staff shortage.
According to the Agari research, based upon the number of phishing incidents reported and the time it takes to investigate just this threat sector, the average SOC needs a total of 54 skilled analysts to perform optimally.
Yet the average number of analysts in UK-based SOCs is just 12.
"The fact that UK enterprises are suffering an average deficit of over 40 analysts at any one time," Crane Hassold, director of threat research for the Agari Cyber Intelligence Division, told SC Media UK, "should be a massive red flag that organisations are simply unable to deal with the burgeoning number, and increased sophistication of threats – especially those using targeted email."
The phishing threat isn't the only thing that's sucking up the time of SOC analysts, but it has become a pretty important resource drain when those resources are being stretched so thinly.
The research suggests that analysts in UK SOCs spend an average of 4.25 hours triaging phishing incidents that turn out to be false positives, whereas actual phishing incidents require only slightly longer at 4.81 hours. The significance of these figures becomes apparent when you read that of the 24,000 phishing incidents reported by employees per UK organisation each year, on average, some 55 percent of these are false positives.
"The number of suspected email threats reported by employees shows that much has been achieved in educating staff on the threat of phishing and other email threats," Hassold said. "However, the increase in these reports is flooding SOCs with a raft of false positives, which current resources just can’t deal with."
And there lies the rub: the cost of manually handling these reports is over £3 million a year, according to Agari, assuming of course that SOCs can find the skilled analysts required.
Rod Soto, head of security research at JASK, compares the problem to having a castle with no guards or an open backdoor in your house with no locks or cameras. "The impact comes in significant losses in financial terms, reputation and intellectual property," Soto told SC.
The skills shortage also plays out with other organisations continually seeking to "pry your most valued professionals away with ever new shiny things and increasing compensation" as Steffan Jones, the Security Operations Manager responsible for Alert Logic’s European arm of its Global SOC says.
"The expertise is out there," Jones said, "but a lot is in motion far more than other IT disciplines."
Which means that most enterprises are forever behind the curve in terms of being properly prepared to defend the business.
"Consequently, there will be less focus on delivering proactive security awareness and expertise to end users and business projects, broadening the scope for monitoring and workload of the SOC to undertake," Jones warned, "resulting in a vicious cycle rather than a virtuous one."
So, what should enterprises be doing in order to mitigate the risks that this apparent shortage of optimally-staffed SOCs bring to the data security party?
Barbara Kay, senior director security at ExtraHop, feels that there is a "rich vein of talent within organisations if they cross-train existing IT teams to understand security".
She admitted that this "takes a commitment, but leverages existing knowledge of the business and its IT systems."
Kay told SC that security teams must consciously reassess their processes and tools to get the most from their people, meaning both better and fewer tools which are flexible and proactive in adopting automated processes and machine learning as staples.
Javvad Malik, security advocate for AlienVault, agreed that "having tools that are built together and can also integrate threat intelligence… can help reduce the different applications needed to be managed".
Kunal Hatodé, senior manager (EMEA) for advanced cyber security services at NTT Security, added that "with the help of an automated workflow orchestration tool, it’s possible to carry out investigations across all internal and external tools in a shorter time, at least 60 percent quicker, by carrying them out in parallel rather than sequentially".
We'll leave the last word to JASK's Rod Soto though, who provided SC with this handy bullet point list of measures the enterprise can take:
-
Hire on skills not degrees
-
Reach within your own organisation for potential individuals that can be trained and already know your enterprise systems
-
Once you have personnel invest in them, have a career path and make them feel appreciated so they do not leave
-
Embrace technologies that will allow cybersecurity operators to perform further tasks. Things such as SOC automation, Machine Learning and AI

Latest Jobs
-
- Contact 12 month- Security Operations- Crowdstrike Falcon Insight EDR / Analyst.
- United Kingdom
- Dependent on experience
-
Security Operations engineer / Analyst with Crowdstrike Falcon Insight EDR experience for a 12 month contract. Experienced Contractor with Crowdstrike Falcon Insight: Endpoint detection and Response (EDR) experience needed - 12 month rolling project. Implementation, configuration and Analyst experience needed with Crowdstrike Falcon Insight: (EDR) Migration project- relocating capability internationally. technically implementing, configuration of that that migration and then transition to BAU role monitoring. DCL Search exclusive associate Project.
-
- SailPoint Consultant
- London
- Upto £75,000 plus benefits
-
SailPoint Consultant is needed for an expanding Financial Service business, this is an exciting time to join the Business as they are in the Process of deploying both IAM and PAM solutions and this consultant will form a key part of the IAM team Location can be flexible but would require the individual to come into the London office a couple of times a month for team meetings and face to face project reviews Duties include · Engage in the Identity & Access Management project to deliver SailPoint IdentityNow and Privileged Access Management · On-board applications and users into IAM tools and customise or configure integrations as required · Regularly review, secure and recertify privileged roles in applications, databases and operating systems · Implement least privilege, just-in-time access, password rotation and vaulting wherever possible · Migrate application authentication to Single Sign-On through the use of SAML and OAuth · Implement and enforce the use of MFA where possible, focusing on critical applications and risky sign-ins · Provide technical support to Centrify and SailPoint users Key experience required: Previous experience with SailPoint, including integrating and deploying into a business, onboarding users and applications, supporting users and performing manual administration tasks. Experience with SAML and OAuth to migrate applications to Single Sign-on. If you are interested in hearing more please reach out to me for more information
-
- Centrify Consultant
- London
- Upto £75,000 plus benefits
-
A Privileged Access Management Consultant is needed for an expanding Financial Service business, this is an exciting time to join the Business as they are in the Process of deploying a Centrify PAM solution,, this consultant will form a key part of the team Location can be flexible but would require the individual to come into the London office a couple of times a month for team meetings and face to face project reviews Duties include · On-board applications and users into PAM tools and customise or configure integrations as required · Regularly review, secure and recertify privileged roles in applications, databases and operating systems · Implement least privilege, just-in-time access, password rotation and vaulting wherever possible · Migrate application authentication to Single Sign-On through the use of SAML and OAuth · Implement and enforce the use of MFA where possible, focusing on critical applications and risky sign-ins · Provide technical support to Centrify users You would also gain expsoure with the IAM toolset as part of an Identity Access deployment. Key experience required: Previous experience with a PAM tool (Centrify would be an added bonus but not essential) including integrating and deploying into a business, onboarding users and applications, supporting users and performing manual administration tasks. Experience with SAML and OAuth to migrate applications to Single Sign-on. If you are interested in hearing more please reach out to me for more information
-
- SOC team lead- Deputy SOC manager - Managed Security Services, Bradford. Exclusive
- Bradford
- £70,000 +
-
SOC team lead- Deputy SOC Manager - Managed Cyber Security Services, Bradford. Exclusive Identifier project. Technical team lead needed to join a Managed Cyber Security Services business. The role will be a hands on lead role and technical escalation point for the team. You will also be responsible for leading, mentoring, growing and developing the team. You will be the deputy SOC manager and be involved in the strategic growth of the capability. A managed security services background is essential, specifically within a managed security operations capability. Current hands on support experience across Firewall, SIEM, Incident Response is essential.