Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical Security

Early bird gets the worm: SOC success starts prior to staffing it

By Bill Thrash
security operations center

Image from Unsplash

October 5, 2022

The cybersecurity staffing shortage has long been a topic of conversation, but it’s reaching a boiling point in 2022. The risks associated with this talent gap have been obvious to those within the industry for many years, but concerns have now gone mainstream, with looming threats spurring the White House to hold a July summit addressing the hundreds of thousands of unfilled cybersecurity positions in the United States.

However, as many seasoned security folks know, filling empty seats won’t solve all of the industry’s problems. Before all else, folks involved in the hiring process need to focus on constantly cultivating workplace culture to improve employee retention rates. Security roles certainly need to be filled as soon as possible, but having all the right tools and solutions is not enough to retain the best talent — staffing security operations centers (SOCs) is only half the battle.

Don’t be afraid to get personal

Before even posting a job listing, organizations need to make sure the onboarding process is as streamlined and comprehensive as possible. Employees need to feel confident and supported from the start, but they also need to feel engaged and immersed in the company culture. Retention comes from a shared sense of purpose, and this must be a critical part of any training and orientation.

A shared goal can establish this sense of purpose. To help define this, implement a 30/60/90 system, outlining metrics which directly relate to the company’s mission and vision within a new hire’s first 30, 60 and 90 days. Doing so will give new employees a more solidified sense of the role they play in moving the organization forward right from the start. With this 30/60/90 strategy, employees are in tune to what needs to be done quarterly and annually to stack up against each collective and individual goal. By laying this groundwork during the onboarding process, employees immediately receive clear expectations and inevitably experience less stress.

Many SOC employees in particular feel an instant pressure to prove themselves upon starting a new position, so it’s important for team leads to effectively communicate expectations and give them a grace period to walk before they run. In most cases, it’s beneficial to give new hires time to get to know the platform and the company culture. When they are able to stand on their own two feet, they can hit the ground running with a holistic understanding of how to navigate threat investigation, detection and response as it pertains to the company’s specific environment.

Cut down on wheel-spinning

In today’s hiring landscape, having a fully staffed SOC is certainly something to write home about, but it’s not enough. 

If employees can’t be retained, organizations are back at square one. A major driver of security employee dissatisfaction at work is constant wheel-spinning. Almost 27% of alerts received by security teams end up going ignored or not investigated. Among those that are pursued, on average, it takes about as much time to assess actual threats versus false positives. As a result, it’s pretty impossible to grow a security team without providing the right resources to handle basic threat detection and response.

To add insult to injury, security teams feel undervalued. It’s no secret that the board is typically most concerned with productivity loss from security incidents, rather than training and internal staffing of its teams. In actuality, both can be of high priority. A more effective approach to productivity leans into the “how and why” things get done and determining which tools to deploy to get there, and also takes into consideration what a healthy and reasonable workload looks like for security teams.

On the other hand, organizations need to be careful not to fall into the trap of acquiring too many tools for their security teams. While many are vital and necessary, having too many can be equally as stressful as not having enough. 

To the SOC and beyond

Ultimately, it’s the people that keep a business going and that is where resources need to be placed. After a smooth hiring and onboarding, it then becomes time to start building on and adding value for those employees. Organizations need to recognize that it’s not enough to provide the means for success in their current roles, but more so their careers.

When all is said and done, a business is only as good as its people, and resources need to be allocated accordingly to reflect this. Setting the stage at the inception of the hiring process will ensure cybersecurity teams find the right prospects who appreciate the full range of professional development the company offers and are excited to work towards the common and individual goals. In turn, retention rates will spike. Turnover in some capacity is unavoidable, but in the end, it’s more productive to spend the time and energy ahead making sure that the right people for the job are given what they’ll need to succeed. 

KEYWORDS: cyber security careers cyber security education retention Security Operations Center (SOC) talent gap

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bill Thrash is Senior Vice President of Customer Operations at Critical Start.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • workplace meeting

    It Starts With You: How to Mitigate Risks From the C-Suite

    See More
  • Look Up in the Sky: It’s a Bird; It’s a Plane; It’s a High Tech Dirigible

    See More
  • security-innovation-fp1170x658.jpg

    Why it pays to be an early adopter of cybersecurity technology

    See More

Related Products

See More Products
  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing