Skip to content

Authored by Jonny Milliken, PhD, Senior Cyber Security Manager at Ekco. 

This is the second in a series of posts on SecOps (Security Operations). To read the first one, How to Build Your SecOps Properly in 7 Steps, click here. 

In the ever-evolving landscape of cyber security, SecOps teams face mounting challenges. The volume of threats continues to rise, and analysts often find themselves overwhelmed by alerts and manual processes.

Enter Security Orchestration, Automation, and Response (SOAR): a game-changing solution that empowers SecOps to work smarter and more efficiently.

Discover our SOAR Services

Understanding SOAR

SOAR is more than just a buzzword; it’s a strategic approach that combines orchestration and automation to enhance security operations. Let’s delve into the key aspects of SOAR:

  1. Orchestration: SOAR streamlines workflows by connecting disparate security tools and platforms. It ensures seamless communication between systems, reducing manual intervention and accelerating incident response.
  2. Automation: SOAR automates repetitive tasks, allowing analysts to focus on high-value activities. From enrichment and investigation to containment and remediation, automation plays a pivotal role in optimising SecOps.

Breaking the Cycle: SIEM and TI Platforms

Traditionally, SecOps teams have cycled through various Security Information and Event Management (SIEM) and Threat Intelligence (TI) platforms looking to improve their security posture.

While these tools provide valuable insights, they often lack integration and automation capabilities. Analysts spend precious time switching between interfaces, manually correlating data, and executing routine tasks.

SecOps

Building Something Meaningful with SOAR

Here’s how to harness the power of SOAR to build a more effective SecOps framework:

  1. Evaluate Your Ecosystem: Identify existing tools, processes, and gaps. Consider integrating SOAR with your SIEM (Security Information and Event Management), threat intelligence feeds, and incident response platforms.
  2. Standardise Workflows: Create playbooks that automate common tasks. Whether it’s analysing alerts, enriching data, or executing containment actions, SOAR ensures consistency and efficiency.
  3. Prioritise Use Cases: Focus on use cases that yield the most significant impact. Examples include phishing investigations, malware containment, and vulnerability management.
  4. Collaborate Across Teams: SOAR bridges the gap between SecOps, IT, and other departments. Collaborate on incident response, share insights, and align efforts.
  5. Measure Success: Track metrics like Mean Time to Respond (MTTR) and Mean Time to Acknowledge (MTTA). SOAR should reduce these times significantly.

Conclusion

SOAR isn’t just about technology; it’s a mindset shift. By embracing orchestration and automation, SecOps teams can break free from the cycle of manual tasks and focus on what truly matters: protecting their organisation from cyber threats.

Contact us about SecOps

About the Author:

Jonny Milliken is a seasoned cyber leader who has built and led security teams in security operations, threat intelligence and SOC within MSSPs and large enterprises. He is currently the leader of the SecOps professional services team in Ekco – Ireland’s leading security service provider.

He completed his PhD in Cyber Security in Queens University at ECIT and has presented at various local cyber events such as Big Data Belfast and Belfast B-sides.

Question?
Our specialists have the answer