“All 10 SOC analysts do the same kind of work. We haven’t separated them into ‘tiers’ or ‘levels’ like some organizations because most of the ‘tier 1’ work is given to Cortex XSOAR, which performs automatically,” he noted. “100% of alerts have some kind of automation: 15% are fully automated end-to-end and the remaining 85% have partial automation to help them along with input from analysts.” Currently, Palo Alto Networks SOC receives about 36 billion events per day, which is “36 times the volume of data that we need to analyze just since the year 2020,” Johnstone said. The tools, such as XSOAR and automation capabilities from Cortex XSIAM, help bring that number down to an average of 133 events. “For 10 analysts that 130 is very manageable,” he added. “XSOAR automation is doing about 16 analysts worth of work for us. So we’ve got a team of 10 analysts who are essentially supported by this other SOC of 16 which is the tool.” https://lnkd.in/ghnDgtFQ
AI Capabilities for SOC Analysts
Explore top LinkedIn content from expert professionals.
Summary
AI capabilities for SOC (Security Operations Center) analysts refer to the use of artificial intelligence to streamline and enhance cybersecurity tasks, enabling analysts to better detect, analyze, and respond to threats. By automating repetitive processes and correlating data from multiple sources, AI helps reduce workload and speeds up threat resolution.
- Implement automation tools: Use AI-driven platforms to handle repetitive tasks like phishing triage and alert management, saving time and reducing human error.
- Improve threat analysis: Deploy AI systems that can correlate data across multiple sources—like firewall logs and endpoint activity—giving analysts a comprehensive view of potential threats.
- Scale SOC operations: Enable AI to perform tasks equivalent to multiple analysts, allowing your team to manage more incidents efficiently without increasing headcount.
-
-
Phishing triage used to take RFA's SOC team 45 minutes per incident - an eternity in incident response. Now it takes less than 10. Speed is everything when defending some of the world's most targeted financial institutions. Grigoriy Milis, CIO at RFA, a leading MSSP in New York, understood the solution wasn't hiring more analysts, but rather modernizing his SOC with AI-based automation to triage all phishing workflows. Users submit suspicious emails, which our AI quickly triages and investigates with the quality of a senior analyst. If a real phishing threat is identified, the SOC is alerted, and with Radiant Security's integrated response, analysts can contain the attack across all inboxes with a single click. The results speak for themselves: 🔹 RFA clients using Radiant experience 80% fewer incidents. 🔹 Analysts respond more quickly to real attacks and prevent them from escalating. 🔹 A faster, more scalable SOC without hiring. "The best part of using Radiant is having a solution that pulls data from multiple sources fast, so we can see the full picture and act immediately." Thanks for sharing your Radaint experience with the world, Grigory. I appreciate the trust and the partnership. Full case study here: https://lnkd.in/gV5F2rBP #CyberSecurity #SOC #AI #IncidentResponse