Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireLogical SecurityCybersecurity News

How SOCs distribute cybersecurity alerts to avoid burnout

By Sergey Soldatov
computer room

Image from Pixabay

September 15, 2022

As cyber threats become more advanced, enterprise security operations centers (SOCs) are finding themselves inundated with challenges. Amid that landscape, organizations are also having to deal with a lack of security talent, professional burnout and tight budgets to help with their primary goal of protection, with 40% of organizations reporting that they struggle with staff shortages, and less effective SOCs reporting a lack of investment in technology, training and staffing to do their jobs well.

A typical SOC consists of analysts who take the brunt of the alert triage and incident analysis, as well as experts who analyze the most advanced threats, threat intelligence specialists and a management team. While massive routine tasks are assigned to the analysts, there needs to be a way for them to organize their work as effectively as possible. 

In order to do so, there are several different approaches to the structuring and alert processing of a security operations center. An Enterprise Strategy Group (ESG) report suggests three options which are all used almost equally. More than a quarter (28%) of organizations say analysts in their SOC are tiered based on their skills and level of responsibility, while in 36% of firms, employees are assigned to individual threat vectors. Another 36% say that their analysts all work together on a common alert queue regardless of skills or threat vectors. 

1. Classical approach

The option chosen by 28% of organizations represents the more classical approach to structuring a SOC. Analysts are separated into lines, with the first line processing all incoming alerts. They triage them and handle the ones they can deal with. If the incident is too complicated and the first line doesn’t have instructions on how to respond to it, or if it is a human-driven attack, then the incident goes to the second, which includes staff who are more experienced. They either work through incidents according to a common queue or share them according to individual specializations. There is sometimes a third line which can be further divided into areas of specialization.

2. Assignment on vectors, threat types or areas of competency 

Another model used by 36% of respondents involves assigning analysts to different threat vectors such as network attacks, attacks on servers or web applications, insider threats or Distributed Denial of Service (DDoS). Other parameters for division could be the type of system (such as endpoints, cloud or data centers) or its criticality. If it is not critical, the incident is processed on the first line, and for critical systems the task would go to the second line.

In practice, the first and second approaches are often used together as a hybrid model. For example, the first line deals with all incoming alerts and if there are any cases of a specific type, they send these to specialists on the second or the third line that have been assigned to this specialization.

3. Single queue 

In this approach, used by 36% of organizations, analysts all share a common incident queue. This means all experts work on the same line with the same level of expertise, and can handle the majority of incidents within the queue. However, there still can be some division, with the most sophisticated incidents often still going to a dedicated group of highly skilled professionals.

In some cases, threat analysis software takes the role of the first line, filtering out a part of false positive alerts and highlighting specific details in alerts.

On the second line, experts examine any incident according to a common queue. If a member of staff cannot handle the incident, they can escalate it to a so-called “virtual line.” It is virtual because it isn’t always there, only being created when the incident is escalated from the current line. Unlike the second line, its composition is not fixed, so it can include other experts from the second or third lines.

SOC models differ from business to business depending on their maturity, budgets and relevant cybersecurity risks, but global trends are reshaping the SOC structure. While we are yet to see how these models will change under SOC staff shortages and automation trends, it is a good time for SOCs to analyze the current state of the people and processes in their organization and discuss what improvements are needed to stay protected from cyber threats.

KEYWORDS: alerts burnout cyber security careers employee morale Security Operations Center (SOC) threat monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sergey Soldatov is Head of SOC at Kaspersky.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Avoid Cybersecurity security burnout

    Five tips to avoid cybersecurity burnout

    See More
  • Erez Yalon

    How to avoid common cybersecurity vulnerabilities

    See More
  • Karen Worstell podcast

    Listen to Karen Worstell, Senior Cybersecurity Strategist at VMware, talk eliminating cyber vulnerabilities and burnout

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing