AI & AutomationCybersecurityCloudSkills & CareersPolicyStartupsDigital Economy

AI-Assisted Security Operations: SIEM, SOAR, and the Analyst Burnout Crisis

February 23, 2026

Security analyst in SOC surrounded by monitors with AI hologram assistant

Thousands of Alerts Per Day, Zero Sleep

A typical Security Operations Center (SOC) receives between 3,000 and 11,000 security alerts per day, depending on organization size — with large enterprises at the upper end of that range, according to Panaseer’s 2025 Security Leaders Report and corroborated by Gartner’s 2025 research. Of these, anywhere from 40% to 80% are false positives, depending on the maturity of detection rules and the organization’s environment. The analyst must triage each alert — determine whether it represents a genuine threat or benign activity — investigate the real threats, contain active incidents, document findings, and escalate as needed. They do this in 8-to-12-hour shifts, often overnight, frequently on-call, and almost always understaffed.

The result is entirely predictable: burnout. According to a Tines automation survey, 71% of SOC analysts report feeling burned out on the job. The Sophos 2025 report on the human cost of vigilance found that 76% of security professionals experience cyber fatigue or burnout. The ISC2 2025 Cybersecurity Workforce Study found that 59% of cybersecurity professionals are considering career changes — and the study made a significant methodological shift, moving away from measuring a “workforce gap” (previously estimated at 4.8 million unfilled positions in 2024) to measuring a “skills gap,” with 59% of respondents now reporting critical or significant skills gaps on their teams, up sharply from 44% the prior year.

This is not a human problem — it is a systems problem. The volume of telemetry data, the sophistication of attacks, and the complexity of modern IT environments have exceeded what human analysts can process, even in the best-resourced SOCs. The response must be technological: using AI and automation to handle the volume, so human analysts can focus on what humans do best — judgment, creativity, and strategic decision-making.


The SOC Technology Stack: SIEM, SOAR, and XDR

Understanding the current state of security operations requires understanding three interconnected technologies:

SIEM (Security Information and Event Management)

SIEM platforms collect, normalize, and correlate security events from across the organization — firewalls, endpoints, servers, cloud services, email systems, identity providers, databases, and applications. The SIEM aggregates millions of events per day into a unified view, applies detection rules and correlation logic, and generates alerts when suspicious patterns are detected.

The SIEM market in 2026 is dominated by four vendors, all recognized in the 2025 Gartner Magic Quadrant for SIEM:

  • Microsoft Sentinel — A cloud-native SIEM built on Azure, named a Leader in the 2025 Gartner Magic Quadrant. Sentinel has grown rapidly due to native integration with Microsoft 365, Entra ID, Defender, and Azure services. Its consumption-based pricing and serverless architecture eliminate the hardware procurement and capacity planning that plagued on-premises SIEM deployments. Microsoft’s integration of Security Copilot — with AI agents for threat hunting, threat intelligence briefing, and dynamic threat detection — makes Sentinel a flagship platform for AI-assisted security operations.
  • Splunk (Cisco) — Also named a Leader in the 2025 Gartner Magic Quadrant — its tenth consecutive year in the Leader quadrant. Splunk is now fully owned by Cisco following the $28 billion acquisition completed in March 2024, making Cisco the world’s third-largest security vendor after Microsoft and Palo Alto Networks. Splunk’s strength is its powerful search language (SPL), massive ecosystem of apps and integrations, and flexibility to handle any data source. Its weakness remains cost: Splunk licensing based on data volume ingestion can become extremely expensive at scale.
  • Google Security Operations (formerly Chronicle) — Google’s cloud-native SIEM, also named a Leader in the 2025 Gartner Magic Quadrant and a Strong Performer in the Forrester Wave: Security Analytics Platforms, Q2 2025. Its predictable pricing model (not volume-based) with 12 months of hot data retention at no additional cost makes it attractive for organizations with high data volumes. Integration with VirusTotal and Mandiant threat intelligence (both Google-owned) and a unified SIEM+SOAR platform are key differentiators.
  • Elastic Security — An open-source-based SIEM built on the Elasticsearch stack, named a Visionary in the 2025 Gartner Magic Quadrant and a Leader in the Forrester Wave: Security Analytics Platforms, Q2 2025. Elastic offers SIEM, endpoint security, and cloud security in a unified platform with AI-driven investigation powered by retrieval-augmented generation (RAG). Its open-source detection rules, self-hosting option, and on-premises deployment capability appeal to cost-conscious organizations and those with data residency requirements.

SOAR (Security Orchestration, Automation, and Response)

SOAR platforms automate the repetitive tasks that consume analyst time: enriching alerts with threat intelligence, correlating related alerts, executing standard response procedures (blocking an IP address, isolating an endpoint, resetting a password), and documenting incident response workflows. The SOAR market was valued at approximately $1.8 billion in 2025 and is projected to reach $5.0 billion by 2035, according to Future Market Insights.

A SOAR playbook for a phishing alert might automatically: (1) extract the sender address, URLs, and attachments from the reported email, (2) check each URL against threat intelligence databases, (3) detonate attachments in a sandbox, (4) if malicious, search for all recipients of the email across the organization, (5) quarantine the email from all inboxes, (6) block the sender domain at the email gateway, (7) check if any recipient clicked the URL, (8) if so, force a password reset and revoke active sessions for those users, and (9) create an incident ticket with all findings documented. What would take an analyst 30-60 minutes happens in seconds.

Leading SOAR platforms in 2026: Microsoft Sentinel includes built-in SOAR (Logic Apps-based playbooks). Palo Alto Networks Cortex AgentiX — the successor to XSOAR (formerly Demisto), announced in October 2025 — is the next-generation agentic SOAR platform that claims a 98% reduction in mean time to resolution and 75% less manual work. Splunk SOAR (formerly Phantom) integrates with Splunk’s SIEM. CrowdStrike Charlotte Agentic SOAR, launched in November 2025, orchestrates AI-powered agents across the security lifecycle using natural-language controls. Google Security Operations provides built-in SOAR automation.

XDR (Extended Detection and Response)

XDR platforms unify detection and response across endpoints, email, identity, cloud, and network — breaking down the silos between individual security tools. Rather than separate alerts from the endpoint agent, the email gateway, the SIEM, and the identity provider, XDR correlates signals across all telemetry sources to construct a unified incident narrative.

XDR represents the convergence of SIEM, SOAR, EDR (Endpoint Detection and Response), and cloud security into a single platform. The market leaders — Microsoft (Defender XDR + Sentinel), CrowdStrike (Falcon platform), and Palo Alto Networks (Cortex XSIAM) — are each pursuing this vision from different starting points. Palo Alto’s XSIAM, which surpassed $1 billion in cumulative bookings in 2025, is particularly notable: a Forrester Total Economic Impact study found that XSIAM customers achieved a 257% ROI with a sub-six-month payback period and 73% cost savings compared to traditional approaches.


Advertisement

AI in the SOC: What Actually Works in 2026

The integration of AI into security operations is the most significant development since SIEM itself. Gartner projects that 70% of large SOCs will pilot AI agents to augment operations by 2028, while the AI-amplified security market is projected to grow from $49 billion in 2025 to $160 billion by 2029. Here is what is working, what is aspirational, and what is hype:

What Works: AI-Powered Alert Triage

AI models trained on historical alert data, analyst decisions, and incident outcomes can classify incoming alerts with high accuracy: true positive (real threat), false positive (benign activity), or needs investigation (ambiguous). Organizations deploying AI-assisted triage report a 60-80% reduction in false positives reaching human analysts, with some platforms achieving even higher accuracy — Rapid7’s InsightIDR AI triage claims 99.93% classification accuracy.

The practical impact is transformative: where manual triage typically covers only 22-40% of incoming alerts, AI-powered triage achieves 100% coverage — every alert is evaluated consistently, eliminating the risk that a critical threat is buried under a mountain of false positives.

Microsoft Sentinel’s AI-powered incident creation automatically groups related alerts into incidents, assigns severity scores, and provides investigation summaries via Security Copilot. CrowdStrike’s Charlotte AI — now described as an “agentic analyst” — triages detections with over 98% accuracy and eliminates more than 40 hours of manual triage work per week on average, according to CrowdStrike.

What Works: Natural Language Querying

Traditional SIEM investigation requires analysts to write complex queries in specialized languages (Splunk’s SPL, Sentinel’s KQL). AI copilots allow analysts to investigate in natural language: “Show me all failed login attempts from external IP addresses in the last 72 hours, grouped by target account.” The AI translates this to the appropriate query language, executes it, and presents the results.

This dramatically reduces the skill barrier for SOC analysts. Junior analysts who previously could not write complex queries can now investigate with the same power as senior analysts — though they still need the security knowledge to interpret the results.

What Works: Automated Playbook Generation and Agentic SOAR

SOAR playbooks traditionally required manual creation by experienced security engineers. AI can now generate playbook suggestions based on the alert type, the organization’s environment, and best practices. The latest development — agentic SOAR — goes further. Palo Alto’s Cortex AgentiX and CrowdStrike’s Charlotte Agentic SOAR allow analysts to build, deploy, and manage AI-driven workflows using natural language and drag-and-drop controls, without writing code. These platforms connect tools, define guardrails, and operationalize both structured playbooks and adaptive, AI-driven workflows.

What Is Aspirational: Autonomous Incident Response

The vision of AI autonomously responding to security incidents — detecting, investigating, containing, and remediating without human intervention — is the goal that every vendor is pursuing. Gartner’s October 2025 Innovation Insight report on AI SOC agents confirms that “augmentation beats automation” — AI works best when it augments human analysts rather than replacing them entirely.

In practice, full autonomy is limited to well-defined, low-risk scenarios: automatically blocking known malicious IPs, quarantining endpoints with confirmed malware, or disabling accounts involved in brute-force attacks. For complex or high-impact incidents (data breach investigation, insider threat, nation-state intrusion), human judgment remains essential. The risk of automated mis-response — blocking a legitimate service, disrupting business operations, or alerting an attacker that they have been detected — is too high for full autonomy. Gartner warns that only 15% of SOCs that pilot AI agents will achieve measurable improvements without structured evaluations and governance frameworks.


The Analyst Burnout Crisis

Technology alone does not solve burnout. The structural factors driving analyst burnout include:

Chronic understaffing: Most SOCs are significantly understaffed relative to their alert volume and threat landscape. The ISC2 2025 study found that 33% of organizations lack the resources to adequately staff their teams and 29% cannot afford to hire staff with the skills they need. Managed security services are growing at 11.1% in 2026, according to Gartner — the fastest-growing segment in security services — as organizations cannot hire fast enough.

Shift work and on-call: Security operations run 24/7/365. Night shifts, weekend on-call rotations, and the psychological burden of being responsible for organizational security at all hours take a measurable toll on mental and physical health. Research from Dark Reading indicates that 70% of SOC analysts with five years or less of experience leave the profession within three years.

Alert fatigue: Investigating thousands of alerts daily — the vast majority of which are false positives — is cognitively exhausting and psychologically demoralizing. The SANS 2025 SOC Survey confirms that 66% of SOC teams cannot keep pace with incoming alert volumes. Analysts describe the feeling of searching for a needle in a haystack while knowing that missing the needle means a breach.

Lack of career progression: Many SOC analysts feel trapped in a triage treadmill with limited opportunities for career growth, strategic work, or skill development. The day-to-day work of alert triage does not build the advanced skills needed for senior security roles.

Organizational undervaluation: Security teams are cost centers that are successful when nothing happens. The absence of visible incidents is interpreted as evidence that the team is unnecessary rather than effective.

Solutions being adopted by progressive organizations:

  • Rotating analysts through different roles (triage, threat hunting, incident response, security engineering) to prevent monotony and build diverse skills
  • Investing in AI-assisted triage to reduce the volume of routine work and allow analysts to focus on complex investigations — with the goal of flipping the ratio from 80% triage / 20% investigation to the reverse
  • Implementing reasonable on-call policies (compensated on-call, maximum consecutive on-call days, mandatory rest after incident response)
  • Creating career progression paths from SOC analyst to threat hunter, security engineer, or security architect
  • Measuring SOC effectiveness by outcomes (mean time to detect, mean time to respond, breach prevention) rather than activity metrics (alerts closed per hour)

Advertisement


Decision Radar (Algeria Lens)

Dimension Assessment
Relevance for Algeria High — Any Algerian organization with significant IT infrastructure needs security monitoring; the National Cybersecurity Strategy 2025-2029 emphasizes SOC capability building, and the 70 million cyber attacks Algeria faced in recent years underscores the urgency
Infrastructure Ready? Partial — Microsoft Sentinel is accessible for organizations using Azure/M365; Elastic Security can be self-hosted for data sovereignty; dedicated SOC facilities exist in major banks and telecoms but are rare elsewhere
Skills Available? Limited — SOC analyst roles are emerging in Algeria (banks, telecoms, Sonatrach, government) but experienced analysts are very scarce; the ISC2 global skills gap is amplified locally where SANS-level training programs are not widely available
Action Timeline 6-12 months for initial SIEM deployment with cloud-native tools; 12-24 months for mature SOC operations with SOAR automation and AI-assisted triage
Key Stakeholders Algerian banks and financial institutions, telecom operators (Djezzy, Mobilis, Ooredoo), Sonatrach/Sonelgaz, government agencies, CERT.dz, Algerian cybersecurity startups, university cybersecurity programs
Decision Type Strategic — Building security operations capability is a multi-year investment in people, process, and technology

Quick Take: For Algerian organizations, cloud-native SIEM platforms — particularly Microsoft Sentinel for those already in the Microsoft ecosystem, or Elastic Security for those needing on-premises deployment — are the most accessible entry points. The AI-assisted features (automated triage, investigation summaries, natural-language querying) are particularly valuable where experienced SOC analysts are scarce, because AI extends the effectiveness of a small team. For organizations that cannot justify a full SOC, regional managed security service providers (MSSPs) offering Sentinel-based or Google SecOps-based monitoring represent a pragmatic starting point. Algeria should prioritize cybersecurity skills development — building SANS-equivalent training programs at universities and through partnerships with CERT.dz would address the skills gap over the medium term.


Sources

Leave a Comment

Advertisement