In a security operations center (SOC), your cybersecurity tools are only as good as the people using them and your SOC’s culture. What are the critical SOC roles? What qualities should you look for when hiring for them? And, what should you expect from a cybersecurity career?

Learn more about why IBM was selected as a Global and European Leader in Managed Security Services.

Drawing from my experience working in IBM Security’s Managed Security Services SOC, here are some insights on how SOCs around the world should staff and organize based on their needs.

Key Roles in a SOC

Making sure you have the right people in the right roles is crucial for the success of a modern-day SOC. The main roles found within a company’s SOC depend on the program’s maturity, company size and budget.

At IBM, I work with clients who have one or two security people who wear many hats within the organization. I also work with mature SOCs who have their own 24/7 operations and highly specific roles.

But, most of my clients are somewhere in the middle. They have full-time employees for some roles and supplement with service providers for others, such as to achieve 24/7 “eyes on glass” or for incident responders who can be kept “on retainer.”

In general, roles are centered around key SOC functions: investigation and analysis, operations and maintenance, engineering and architecture, protection and defense, threat intelligence and oversight and governance.

Investigation and Analysis
These roles respond to a trigger, such as an alert or suspicious event. They can be separated based on technology, such as host, network-based or tiered-based on skill/scope, such as “Tier 1,” and “Tier 2.” They include:

  • Security analyst
  • Incident responder
  • Incident manager

Operations and Maintenance
These roles are key to the day-to-day management of tools. Typical responsibilities include managing device health, troubleshooting, version management and policy management. They include:

  • Device administrator (firewall, intrusion prevention system, endpoint agent, etc.)
  • Security engineer

Engineering and Architecture

Architect and engineering roles are key to advancing and improving your security operations. They can be correlation engineers responsible for writing new use cases and collecting and operating new logs. This role can also be developers who write custom tools or integration architects who help to recommend and implement new tools. These roles include:

  • Developer
  • Security architect
  • Security engineer

Protection and Defense

Roles in this category tend to be proactive in nature, helping to identify security gaps and improve security posture before a threat actor has the opportunity to exploit them. They include:

  • Threat hunters
  • Vulnerability manager
  • Penetration tester

Threat Intelligence

Threat intelligence is a unique SOC function in some cases. In other cases, it is combined with other roles. Intel analysts are responsible for tracking the threat landscape, including actors and campaigns that may target the organization. In most cases, intelligence analysts work closely with engineers and architects to ensure the right detection tools are in place proactively.

  • Threat intelligence analyst
  • Threat research analyst

Oversight and Governance

These roles can include management positions to help drive strategy, manage security budgets and maintain compliance. They include:

  • Compliance officer
  • Security awareness and training professional
  • SOC manager
  • Chief information security officer

Changes to SOC Roles

The cybersecurity industry has evolved, and the roles needed within the SOC have changed. We’re in the middle of a transition period where SOCs everywhere are seeking to move from a reactive, alert-driven approach to a proactive, “smart” approach — a step closer toward “SOC 2.0.”

Alert fatigue is also a real driver among SOC employees. It contributes to chronic staffing and retention challenges, as well as hiring shortages. Time and time again, SOCs get stuck in a hire-train-replace cycle, constantly churning through analysts as they move on to bigger and better career options. It’s a cycle that can’t continue.

As a result, more and more companies are seeking to identify and automate routine tasks. SOAR (Security Orchestration, Automation and Response) platforms are becoming more popular, and many companies are introducing elements of machine learning for initial alert triage.

While automation takes over most of the previous “Level 1” analyst work, the remaining alerts will require in-depth analytical skills. This, in turn, leads to increasing specialization of roles within the SOC and drives demand for higher-value skills, introducing new opportunities for employee career growth and simultaneously contributing to overall SOC maturity.

Hiring for the SOC 2.0

As a hiring manager, I often look more for personality traits than skills, because skills can be taught. For example, when hiring analysts, I look for passionate and motivated individuals, who have an innate curiosity. This is more important to me than in-depth experience with a particular tool or platform, as it shows me that they will excel at analysis and investigations, regardless of the tool. I love tinkerers and experimenters — bonus points if they’ve set up a home lab for testing and playing with malware.

For more senior roles, I look for employees who have experience in and understand best-practice methodologies. If you want to be an intel analyst, for example, learn the intelligence lifecycle. Study industry frameworks, such as MITRE ATT&CK, so you can understand adversary tactics, techniques and procedures. Strive for highly technical certifications, such as the Offensive Security Certified Professional or GIAC Certified Incident Handler.

At the more senior levels, specialization is key. You should also be able to interact and effectively communicate with other stakeholders. Generally, the more senior the role, the more frequent is the customer interaction. Technical skill is a must, but team members must also be able to convey complex security information to clients in a way that makes sense and allows them to make the best decisions on how to use their limited resources to maximize their security posture.

Real-World Example: Maze Ransomware

Ultimately, the goal of any SOC is to detect, analyze and respond to security threats. Regardless of your role, everyone in an SOC has this key goal in mind at all times, so the environment must be highly collaborative.

This really starts to come to life when you look at recent threats our SOC has handled. One such example is the Maze ransomware. After responding to several engagements, our X-Force Incident Response Team started to learn about the ways the Maze actors exfiltrated data, deleted backups, encrypted files and held the exfiltrated data for ransom. The group would post some of the stolen data on their “Wall of Shame” to scare victims into paying.

As our incident response team saw more of this activity, our intelligence team learned more about the threat actors. They then passed their findings to our threat hunters, who started hunting proactively, and to our correlation engineers, who pushed out new detection tools, which then fed into our “eyes-on-glass” monitoring teams. It’s the cyber threat circle of life.

More from Intelligence & Analytics

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today