Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Two tips to prevent threat intelligence analysts from burnout

By Yuliya Novikova
stressed
September 22, 2020

Threat Intelligence (TI) analysts are one of the key groups of experts in Security Operation Centers (SOCs) and play an important role in making sure IT systems are functioning properly. They are in charge of identifying attack vectors that most threaten the organization, define their company’s defensive strategy and help other team members make informed decisions about potential threats. However, handling such a vast amount of responsibilities, data and managing repetitive tasks is the exact type of work that makes TI employees prone to burnout.

A recent study surveying CISOs and senior IT leaders for enterprise businesses found that 70% of respondents agreed that it has become difficult for enterprises to source skilled cybersecurity pros, and 40-49% said the difficulty extends across multiple roles, including threat intelligence. Such a high-pressure role combined with a mandatory level of hiring expertise is a significant challenge for companies, meaning that many must get by with an understaffed and overworked team.

As a result, organizations are looking for different ways to retain talent and avoid burdening these professionals with increasing tasks and responsibilities. Two possible ways to alleviate some of their workload include employing interns to take on simple jobs, or installing solutions with Artificial Intelligence features to make up for the skill shortage. Nonetheless, there are some challenges to these alternatives to consider that will be explored here.

 

Leveraging interns to lessen the burden

When it comes to lessening the burden of simple tasks for employees, hiring interns can be a suitable solution that allows upper management to focus on more demanding tasks. An ideal picture looks like this: while novices in the profession take on simple tasks, skilled specialists can devote their time to more complicated issues.  

In doing so, a company is able to produce in demand professionals in house, and train them in such a way that is most applicable to their organization. Interns are then able to learn from experts in their field, and take on more responsibility as they gain experience.

However, there are limitations to this approach. As most interns are limited in real world experience, they will likely require a mentor who will be able to advise them through their work, which can add yet another task to experts’ already demanding daily routines.

Nonetheless, interns are the best way to train and produce additional TI specialists in the field so that there are more individuals suited to take on this type of role, so it is worth considering interns as a long-term plan instead of a quick resolution to a resourcing problem.

 

Benefits of a balanced automation and artificial intelligence approach

Another solution to better manage an expert’s daily tasks is to implement ‘smart’, artificial intelligence (AI)-backed tools that can automate parts of their job. Such security solutions are good at collecting data, both internally and from external sources, and also offer effective pre-processing and categorization. This helps to save time when such steps need to be taken.

Nonetheless, analysis of information coming from various sources, its correlation, understanding of business risks and making decisions based on the collected data all still require human expertise. The survey conducted at the RSA Conference 2020 confirms this with 60% of respondents feeling more confident in findings verified by humans rather than those generated by AI. They say that creativity, previous experience and intuition are essential advantages of taking a human approach.

When considering an AI or automated approach, it is more efficient to balance automation and human parts of analysis and adopt both machine and human-readable TI reports. Efficiency of machine-readable TI depends on how smoothly it is integrated with existing security controls, as well as on the quality of data. As such, a team needs to revise offerings from a number of vendors and choose the strongest data feeds from several of them. To quickly investigate threats, analysts also need access to background on threats.

While the responsibilities in the role of TI analysts poses significant challenges, there is yet to be an easy fix. Therefore, it is necessary to clearly determine the priorities of a TI analysis department, understand what the team is able to remedy more immediately and then determine what resources they are able to invest in long term. Such an approach will alleviate TI analysts from an excess of burnout, and will result in a more well-rounded work environment for these employees.

KEYWORDS: artificial intelligence (AI) cyber security risk management Security Operations Center (SOC) threat intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Yuliya novikova
Yuliya Novikova is Head of Security Services Analysis at Kaspersky.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • golf lessons for security professionals

    Prevent burnout with some lessons learned from golf

    See More
  • ransomware-attack-freepik

    Attackers help victims pay their ransoms, even offer tips to prevent future attack

    See More
  • 5_minutes_with_Bradbury_1021_900px.jpg

    5 minutes with David Bradbury - Hiring globally to prevent security burnout

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • threat and detection.jpg

    Surveillance and Threat Detection

See More Products

Events

View AllSubmit An Event
  • November 19, 2025

    From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

    ON DEMAND: When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing