Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

5 minutes with Julian Waits - How Security Operations Center leaders can create a culture of growth

By Maria Henriquez
5 mins with julian waits
October 15, 2020

Due to the COVID-19 pandemic, IT security teams are now supporting a vastly new remote workforce — a wider attack surface — which increases sophisticated cyberattack attempts by adversaries. Security teams are managing dozens of, if not far more, security solutions to thwart, and security operations teams find themselves sorting manually through 100s of 1,000s of security alerts to close the gap between detection and response, fueling the growing epidemic of analyst burnout and putting enterprises at risk. Traditional security information and event management (SIEM) solutions that are used by many organizations and security teams are inadequate and failing to meet the growing needs of security analysts and the SOC, especially now.  

Recently, Devo sponsored an annual Security Operations Center (SOC) Performance Report that was conducted between March 11- April 5, 2020 by the Ponemon Institute. It found that 78% of the respondents said working in a SOC is very painful. Additionally, 60% say the stress of working in the SOC has caused them to consider changing careers or leaving their jobs. Even worse, 69% said it is very likely or likely that experienced security analysts would quit the SOC. The burden of work on SOC analysts needs to be addressed and it needs to be addressed now - and that responsibility falls on leadership.

Here, we talk to Julian Waits, General Manager of Cybersecurity at Business Unit at Devo, to find out how SOC leaders can create a culture of growth among their teams. 

 

Security magazine: What is your title and background?

Waits: I am the General Manager of Cybersecurity at Business Unit at Devo. I’ve been working in the technology sector for over 30 years, helping early and growth stage technology companies to reach their full potential in their respective market, specializing in security, risk and threat detection. Prior to joining Devo as the GM of the cybersecurity business unit, I held titles such as software developer, field systems engineer, M&A director, Sales VP, and CEO. I also serve on several industry boards, including ICMCP and NICE, promoting development of the next generation of cybersecurity professionals.

 

Security magazine: Why do SOC leaders need to create a culture of growth among their teams? How can this help mitigate analyst/security team’s burnout?

Waits: Creating a culture of growth in the SOC helps leaders address two issues; one being that security talent is very scarce to find and hire, and two being that the analysts you do have in the SOC are getting burnt out. By creating a culture of growth – one where you’re investing time, funds and energy into bettering the skills and career trajectory of analysts – you’re both creating a more enticing environment for hiring candidates and establishing a culture for current employees that acknowledges their work, value and caring for an individual’s growth.

 

Security magazine: How can SOC leaders broaden the soft skills of analysts through activities like job rotations and presentation skills?

Waits: A shortage of talent and the challenge to retain skilled analysts comprise both sides of the platinum broken record of the security industry. Helping your SOC analysts develop their technical and business skills creates a culture of professional growth and advancement, not job hopping. By keeping analysts engaged with practices such as job rotation you’re encouraging them to learn more about the organization’s business, which will help them understand exactly what they’re working hard to protect. Additionally, exposure to other roles in the business— perhaps something on the development side or even a customer-facing role—may open an analysts eyes to skills they maybe weren’t aware they we interested in, and they now have the opportunity to dig into that curiosity a bit more.

 

Security magazine: How can SOC leaders fuel professional growth through training analysts to communicate their work to non-technical and executive-level audiences?

Waits: Improving analysts’ presentation and communication skills by creating opportunities to present their work to non-technical colleagues and company leaders will enhance their skills in providing valuable exposure to important decisionmakers. It also makes it necessary to think about how their work impacts the business on a larger scale—because that’s what’s going to matter most to executive leadership. It’s another way to broaden soft skills, open their eyes to what happens beyond the SOC and, in return, gives exposures to others of all the hard work happening every day within the SOC.

 

Security magazine:  How can they advocate on behalf of their team to the CEO and board to ensure the SOC is equipped with the right/best technologies to alleviate analyst pain?

Waits: Among SOC leaders, the CISO is the bridge between the SOC and the C-suite. While most CEOs and boards are becoming increasingly security conscience, it’s up to the CISO to effectively communicate that security touches every part of the business and a SOC filled with burned-out analysts will compromise security and, in the long run, hurt the bottom line. Equipping your SOC with technology that automates and streamlines the repetitive aspects of analysts’ workflow will benefit the entire organization. The board will also need clear understanding of security priorities, so be prepared to answer questions like, “what trends is the SOC teaching us?” “what are we learning? “what are the types of attacks we see most often in our environment?” “what have we done to mitigate those attacks?” and “are there things that we could do with the SOC to be more proactive about trying to catch this stuff sooner?”

 

Security magazine: How can SOC leaders reevaluate hiring practices to help solve staffing challenges and finding the right security talent?

Waits: Given the well-established shortage of talent, the idea of who we’re hiring to work in the SOC must change. If we insist on only hiring people with a certain degree from particular universities who have specific years of experience in exact roles with certifications X, Y, and Z, we will never solve the talent problem. It’s time to start looking at the qualities of an individual that indicate skills such as the ability to move quickly, innovate, think critically, and solve problems, rather than rigid checklist of outdated milestones. Additionally, one thing the COVID-19 pandemic has taught us is there’s no need for geographical bias when it comes to hiring the best talent. With remote working you can widen your net across the country and hire the best person for the job.

KEYWORDS: cyber security pandemic risk management Security Operations Center (SOC)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with John Scimone

    5 minutes with John Scimone, CSO, Dell Technologies, on how to navigate a culture of security convergence

    See More
  • SOC

    Reducing the Chaos: How to Create a Security Operations Center that Helps

    See More
  • 5mw Lamont Orange

    5 minutes with Lamont Orange - Fostering a security-first culture with SASE adoption

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!