Working in a SOC is so stressful that two-thirds of employees want to leave

Fully 73 percent of 554 IT and IT security practitioners, surveyed in the Ponemon Institute’s Devo-commissioned improving the Effectiveness of the Security Operations Centre study, said the increasing workload that SOC staff face was causing burnout, while 71 percent blamed the 24/7/365 on-call culture and 69 percent said there were just too many alerts to chase.
Respondents also named a range of other problems that made 70 percent agree that working in a SOC is “very painful” – including the inability to recruit and retain expert personnel (68 percent), inability to capture actionable intelligence (55 percent), lack of resources (53 percent), and “complexity and chaos” within the SOC (49 percent)."
Full Article: https://www.cso.com.au/article/664803/working-soc-stressful-two-thirds-employees-want-leave/
Thoughts?
Comments
but...
- alert fatigue
- others not pulling their weight (probably due to lack of skills plus not "wanting" to improve skills)
- management not encouraging training
- hire a MSSP/MDR for night shift
- switch to pure red team (where I am headed)
- buy fireeye! (seriously these things weed out the false positive and give you very accurate none BS alerts)
- IPS (maybe pro-active IPS devices are better after all? they do the work for you
) - management should give SOC members 1-2 hours of threat hunt sessions (SOC engineers need to be in an "active defense" mindset and not always in a reactive boring alert mindset)
- hire a snort/suricata experience infrastructure engineer to tune the damn thing! (I can't stand shops who expect SOC analysts to be infrastructure engineers and for infrastructure engineers to attend to alerts!) Its like asking your mechanic to be your driver too!
- more orchestration
- playbooks (what should we react to and what we should let go)
- go cloud, everyone will eventually be in the cloud

honestly I don't care to respond to any criticism lol everyone has a way of doing things but the industry and these types of articles are proving my point.Courses: TBD
Certs: AZ-500 (in-progress), MS-500, Pentester Academy - PACES, Pentester Academy - CRTE, OSCP
Security Engineer/Analyst/Geek, Red & Blue Teams
OSCP, GCFA, GWAPT, CISSP, OSWP, CCNA Cyber Ops, Sec+, Linux+, AWS CCP, CCSK
2019 goals: GWAPT, Linux+, (possible: SLAE, CCSK, AWS SA-A)
I think the majority of issues when it comes to these things are not due to the job itself, but due to managements lack of attention to the job. It can be stressful, but so is working on a car with a crescent wrench and a hammer. Doable, but you're swearing the whole time. Give them the right tools, the right training, and have their back. These numbers would change quite a bit.
Security Engineer/Analyst/Geek, Red & Blue Teams
OSCP, GCFA, GWAPT, CISSP, OSWP, CCNA Cyber Ops, Sec+, Linux+, AWS CCP, CCSK
2019 goals: GWAPT, Linux+, (possible: SLAE, CCSK, AWS SA-A)
Organizations are also slow to understand how security automation and orchestration can help improve their security posture. This is not a quick or cheap thing to implement. It requires both full understandings of all the normal activity occurring on your network and ongoing tuning to be effective. Lastly, network operations teams typically design their network(s) to be easy to diagnose and repair--which is usually not conducive to a network being internally secure. This leads to a deluge of noise that makes it difficult to determine the occurrence of true, malicious security incidents. Once again, mental fatigue and disillusionment with the SecOps role results.
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray