Our last blog post, “Six Reasons Why the SOC Analyst Role is So Hard” we briefly discuss the difficulty in finding experienced Security Operations Center (SOC) analysts. We know the talent scarcity is real and there are far too few qualified SOC analysts to meet the rising demand. For the last two decades our industry has tried many different solutions to resolve the scarcity problem, including letting the Network Operations Center (NOC) handle security monitoring, which was a complete failure.
Many of us decided the best option was to grow and nurture our own SOC analyst teams. From my own professional standpoint, this is why I conduct a 12-week training program at every SOC I’ve built. Unfortunately, the academic path for the SOC analyst doesn’t exist. An aspiring SOC analyst can’t study security analysis except at new security bootcamps like SecureSet. And, there are two major challenges with the ‘grow your own’ approach:
- Significant resources required for training (time, costs, people)
- Risk of short retention due to the dramatic increase in marketability of a trained SOC analyst
To further illustrate the problem, 12 weeks of formal training is required, in addition to 6+ months of on-the-job training to gain a basic SOC analyst skillset. After that, retention risk becomes a real issue because average tenure kicks in a year later and you have to train a new replacement. This means we are faced with a never-ending cycle of recruiting, training and retraining analysts, and it’s a hugely expensive way to solve the problem. More importantly, we are losing our front-line experienced analysts on a regular basis and losing the tribal knowledge that goes with them.
Another solution many have tried is engaging with outsourced service providers or off-shore monitoring services. While this passes the buck (pun intended), the responsibility for detecting a breach cannot be delegated. These providers often have an even harder time finding deep security analysis expertise and they are incented to reduce their costs as low as possible to maintain a decent profit margin. Given the rising criticality and strategic nature of information security to the modern company, this is a discipline that really should be handled in-house by analysts who understand their parent company’s business model and priorities.
One of the most common techniques to deal with the shortage of SOC analysts is to create an “event funnel” to pair the volume of events back to the capacity of the people in the SOC. Even the most mature of SOC’s will look at less than 1% of their total security alarms. SOC teams that are understaffed and highly rotational may only look at .001%. Is it realistic to expect that an organization whose purpose is to put “eyes on” security logs can be effective with such limited visibility?
Effective solutions to deal with the scarcity of skilled, capable analysts has become one of the foremost challenges facing enterprise security.
Chris Calvert, VP Product Strategy and Co-Founder, Respond Software
Stay up to date with our latest posts by subscribing to our RSS feed: https://respond-software.com/blogs/blogs.atom