HomeBlog
Things I Learned About Security From SOCcer

Things I Learned About Security From SOCcer

Oren Saban
|
December 10, 2025
|
5 min read
key takeaways

Do you remember how Guardiola's Barcelona dominated Manchester United in 2011? Every defender knew exactly where their teammates were positioned. When Alves pushed forward, Puyol automatically shifted to cover. When they lost the ball, all four defenders pressed as one unit. Perfect coordination.

Now think about a regular SOC. Security tools work in almost complete isolation. Analysts reinvestigate threats their colleagues had already solved. Information sharing fails at almost every level.

Elite soccer teams coordinate seamlessly. Most security operations don't. Maybe that's why we're losing.

Why Attackers Coordinate Better Than Your Security Stack

SOC analysts face an endless stream of alerts from security tools that don't communicate. Research shows SOC teams spend 32% of their day investigating incidents that pose no actual threat. But the deeper problem isn't just false positives it's coordination failure.

Picture this:

  • A firewall blocks a suspicious IP but doesn't tell the endpoint detection system to watch for related activity
  • An analyst investigates a login anomaly on Tuesday, documents it as benign, and closes the ticket
  • Another analyst gets a similar alert on Friday and starts the investigation from scratch

The same pattern repeats everywhere. Tools don't talk to tools. Teams don't talk to teams.

"But I have an XDR!"

The industry pushed XDR as the answer, but it only works when all tools come from the same vendor. Most enterprises use best-of-breed tools from different vendors, which brings us back to humans manually connecting dots between 15+ security systems.

Gartner's latest SIEM research reveals that "the most effective threat detection, investigation and response setups require deliberate, hierarchical integration across multiple security operations center technology investments; no single platform fully meets all SOC needs."

Yet organizations continue struggling with what Gartner calls "coordinated and holistic approaches to complex security problems."

The solution isn't just about more automation or consolidated platforms. It's smarter coordination.

What Attackers Understand That We Don't

Criminal groups have better tool coordination than most enterprise security stacks. Microsoft's 2024 Digital Defense Report revealed growing collaboration between cybercrime gangs sharing attack techniques. When law enforcement took down LabHost, they found over 2,000 criminal users coordinating their tools for just $179-$300 monthly.

Attackers solved the multi-tool coordination problem we're still struggling with. Their tools share context and work toward unified objectives. Our tools send separate alerts that humans must manually correlate.

Building SOCoordination

Here's what actual security coordination looks like, based on what works in elite teams:

Context-Aware Communication

When an identity system detects anomalous access, network monitoring automatically prioritizes related traffic without creating duplicate alerts. As Gartner notes, modern security operations need "deliberate, hierarchical integration" rather than hoping tools will magically work together.

Institutional Knowledge

Investigation outcomes get captured and shared instantly. No more redundant work across shifts.

Coordinated Response

Security tools adjust their monitoring based on what other tools discover, like defenders covering for teammates.

The Questions That Matter

Challenge current approaches with these questions:

  • When Tool A detects a threat, how does Tool B automatically adjust without human intervention?
  • How do we prevent analysts from reinvestigating incidents colleagues already resolved?
  • What percentage of our alerts represent genuinely new threats versus known patterns?

Elite defenses coordinate perfectly. It's time we learned how.

What's the biggest coordination gap in your security operations? How are you solving tool and team silos?

I'm always happy to talk about security and football (or soccer if I have to)

Reach out to me here

Oren Saban
Co-founder and CPO at Mate
about the author
Oren Saban is the Co-founder and CPO of Mate Security, shaping AI solutions that reduce noise, enhance SOC clarity, and enable teams to respond smarter and faster.
Provision ephemeral, scoped identities per session; no standing secrets, secure connection brokering without credential exposure, automatic teardown at end of task, full session trace (person, prompt, policy, actions).

FAQs

No items found.