As the threat landscape grows, so does the demand for security operations center (SOC) talent. While every role in the SOC has a vital function, four remain critically important:
To successfully fulfill these roles—all of which require a strong mix of technical and cognitive skills—security and risk leaders must conduct an effective skills gap analysis, take stock of their organizational culture, and ensure their people and processes are aligned with the desired output of their SOC. They will then have a well-defined structure in place to recruit, vet, and onboard candidates.
Let’s take a look at the roles and how and why each is essential to running an effective SOC.
This role is critically important as the SOC manager is responsible for leading the security operations team, including technical oversight and guidance and various people management duties such as staffing, training, scheduling and coaching.
The ideal candidate will be a leader who can skillfully prioritize, effectively communicate and, during times of crisis, perform at a high level while acting as a stabilizing force for the SOC team and the organization. SOC managers should also have the skills needed to oversee the SOC’s performance metric framework (e.g., trend analysis, tasking on intelligence) and play an active role in developing and implementing crisis communication plans.
Alert analysts are responsible for the ongoing monitoring of the SOC’s alert queue, investigating suspicious activities within the organization’s IT systems and networks, and in many organizations, threat hunting.
As these analysts are on the “front line” they are also responsible for fielding incoming calls, collecting data, triaging threat alerts, and ensuring the health and homeostasis of security sensors. Without the foundational support alert analysts provide, SOCs run the risk of failing during critical situations, which is when they need to run at peak performance with minimal or no downtime.
The job of these responders is to perform deep analyses of incidents, review relevant logs, and conduct post-initial evaluations. Incident responders are vital to SOCs because they confirm and validate the threat scope before action is taken—a core capability of the SOC that ensures risk and security leaders implement remediation tactics only for those threats or risks deemed legitimate.
Security professionals that take on this role must have expertise in network protocols and operating systems, as well as a deep knowledge of threat detection/evaluation tools and the most effective utilization of the tools' output.
Once the right people are in the right roles, security and risk leaders must focus on how to best create a harmonious team—one that is high performing and working toward the same goals and objectives. This calls for:
Learn about other best practices that can be used to plan and build effective SOCs: [ebook / 6 Key Considerations Before Setting Up a Security Operations Center]
Brooks Crichlow is the Chief Marketing Officer at Dataminr. He’s previously held marketing leadership roles at Tellme Networks, Microsoft, 7.ai and MongoDB.
U3GM Blog Post Comments