Back in January 2019, I published an article on Information Security Buzz titled, So, You Wanna Be A Security Star? which explored today’s lack of available security talent, the education required, a SOC analyst’s typical day, real job fatigue, and ways to boost morale of information security workers. We also dug into a 2015 study, A Human Capital Model for Mitigating Security Analyst Burnout, which took an anthropological approach to explore the burnout phenomenon. They were able to train and then place researchers within different Security Operations Centers to better understand, beyond interviews, what is driving the exhaustion. They looked at morale, automation, operational efficiency, management metrics and of course, how this leads to analyst burnout. The study identified four factors that impact the creation and preservation of efficient security analysts: Skills, Empowerment, Creativity and Growth.
As we were preparing to publish, I contacted one of the authors of the study Alex Bardas, currently an Assistant Professor of Computer Science at the University of Kansas. I wanted to thank him for the research and give him a chance to review how we represented the study.
During that conversation, Alex mentioned that he was working on a new grant proposal to the National Science Foundation (NSF) for another research project. This proposal was focused on developing a new metrics framework for security operation centers (SOCs) that measures and validates SOC performance against enterprise network security. It is a collaboration with Professor Bradley Fidler of the Stevens Institute of Technology, who studies the long-term evolution of network architectures from a social and institutional perspective. Alex asked if F5 would be interested in collaborating on this two-year project and the F5 SOC enthusiastically agreed.
Network Operations Centers and Security Operations Centers (NOCs/SOCs) are central components of modern enterprise networks. Organizations deploy NOCs/SOCs to manage their network operations, defend against cyber threats, and maintain regulatory compliance. Traditionally, these organizations are provided with an abstract view of network security through the interface of NOC/SOC metrics, and the NOC/SOC, in turn, interfaces with the network through monitoring software. By isolating a narrow subset of “performance” measurements, most typically a closed ticket count, these metrics misrepresent both the effectiveness of the NOC/SOC and the security posture of the network itself. These metrics tend to incentivize unproductive behavior in a NOC/SOC, conceal potentially fundamental security vulnerabilities in the network itself and trigger destabilizing “right-sizing” processes in the controlling organization.
Alex and team want to develop a new metrics framework that will harmonize NOC/SOC performance against enterprise network security. They are building metrics that serve as proxies for factors such as strategic and long-term planning and provide on-the-ground NOC/SOC operators with ways to input local knowledge into higher-up decisions. In the end, they want to:
1. Be transformative in the ability to communicate real-world security effectiveness,
2. Fit within preexisting NOC/SOC operations and management practices,
3. Serve as the basis for a new generation of enterprise network security tools
(which in turn will ultimately…)
4. Fix the vicious cycle between NOC/SOC practices and management decision-making.
By treating networks, security components, and operations staff as part of an interdependent system, the metrics will be able to account for factors such as outstanding security vulnerabilities, strategic and long-term planning, and constituency interests, and will provide on-the-ground SOC analysts with ways to input local knowledge into higher-up decisions. This could have the potential to ignite a major shift in the security landscape by providing a powerful new framework for real-world security assessments.
Thus far their research team has embedded an academic researcher in a separate security operations center and is analyzing the evolution of the interfaces between NOC/SOC staff, network monitoring software, and enterprise network architecture. They are still in the early stages of the project and our involvement has been more consultative than hands-on. We look forward to potentially testing some of the hypothesis elements from the study and providing feedback to the team when appropriate.
Looking forward, we’ll plan to post periodic updates to the research project including milestones, early analysis and hopefully some results that could help you in your NOC/SOC operations.
About the Author
Related Blog Posts

F5 ADSP Partner Program streamlines adoption of F5 platform
The new F5 ADSP Partner Program creates a dynamic ecosystem that drives growth and success for our partners and customers.

Accelerate Kubernetes and AI workloads with F5 BIG-IP and AWS EKS
The F5 BIG-IP Next for Kubernetes software will soon be available in AWS Marketplace to accelerate managed Kubernetes performance on AWS EKS.
F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.
F5 Silverline Mitigates Record-Breaking DDoS Attacks
Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.
Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.