How Is an OT SOC Staffed?
OT SOC staffing is the most difficult operational challenge. Analysts need a combination of skills that rarely coexist in the labor market: cybersecurity threat analysis, SIEM and monitoring platform operation, and industrial process knowledge covering relevant sectors (power generation, oil and gas, water treatment, manufacturing, etc.). The SANS ICS workforce survey consistently identifies the skills gap as the primary barrier to OT SOC capability for industrial organizations.
Most OT SOC staffing models use a tiered structure. Tier 1 analysts handle alert triage and initial investigation using documented playbooks. They need cybersecurity fundamentals and OT protocol familiarity, trainable in 3-6 months. Tier 2 analysts handle complex investigation and threat hunting, requiring deep OT knowledge and adversary TTP familiarity. Tier 3 is typically supported by threat intelligence services and specialized engineers from the OT monitoring platform vendor. Organizations building internal OT SOCs should plan for 12-18 months to build a functioning Tier 1-2 capability from an IT security baseline.
Managed OT SOC Services
The staffing challenge makes managed OT SOC services attractive for most organizations. A managed OT SOC provider supplies the analyst team, the platform, the threat intelligence, and the playbooks, while the customer provides network access for sensor deployment and participates in incident response. This model is particularly effective for mid-sized industrial organizations that need 24/7 monitoring capability but can't justify the staffing cost of an internal team. Providers including Dragos Managed Services, Claroty Managed Services, and Opsio's OT security services offer managed OT SOC capabilities.
What Tools Does an OT SOC Use?
The OT SOC technology stack centers on the OT monitoring platform: a passive network sensor and analytics engine specialized for industrial environments. Leading platforms include Dragos Platform, Claroty Platform, Nozomi Networks Guardian, and Microsoft Defender for IoT. Each provides passive network monitoring, asset inventory, protocol analysis, and alert generation. Platform selection should be driven by the OT protocols in your environment, integration requirements with your SIEM or security orchestration platform, and analyst workflow preferences.
An OT SOC also requires case management software for tracking investigations, playbook documentation for standardized response procedures, integration with IT SOC tooling for cross-domain incidents (which is most incidents, given the IT origin of 96% of OT compromises), and threat intelligence feeds specific to OT adversaries. The Dragos WorldView and Claroty Team82 threat intelligence services provide OT-specific adversary tracking that IT-focused threat intelligence services don't cover.
Frequently Asked Questions
Can an IT SOC monitor OT systems?
An IT SOC can monitor the IT/OT boundary and IT-side indicators of OT-targeted attacks. It cannot effectively monitor OT protocols, interpret industrial control system behavior, or make appropriate response decisions for OT systems without specialized OT context. Organizations that route OT alerts into an IT SOC without OT-trained analysts consistently miss OT-specific attack patterns and make response errors that disrupt production. A dedicated OT SOC function, internal or managed, is needed for effective OT security monitoring.
What is the cost of building an internal OT SOC?
An internal OT SOC covering a mid-sized industrial facility requires USD 500,000-1,200,000 in annual operating cost, covering platform licensing, analyst staffing (typically 4-6 analysts for 24/7 coverage including shift coverage and leave), training, and threat intelligence. Capital costs for sensor deployment add USD 100,000-300,000. Managed OT SOC services typically cost USD 150,000-400,000 annually for equivalent coverage, making managed services the economically rational choice for most organizations below enterprise scale.
How does an OT SOC integrate with plant operations?
OT SOC integration with plant operations requires formal liaison arrangements. The OT SOC needs a named operations contact for each facility who can provide process context during alert investigation, authorize containment actions, and coordinate response during incidents. The operations team needs to be informed of security events that may affect production systems before any response action is taken. This coordination must be documented in playbooks rather than relying on ad hoc communication, especially for 24/7 monitoring where the on-call operations contact may change frequently.
Conclusion
An OT SOC is the operational heart of a mature industrial cybersecurity program. Its value comes not from the technology it deploys, though technology is essential, but from the industrial process context that enables analysts to distinguish genuine threats from normal operational patterns and to respond to threats without creating secondary safety or availability events.
The 52% of organizations that have deployed OT monitoring by 2025 have the detection capability. What separates effective OT security operations from monitoring tool deployments is the analyst capability, the playbooks, and the operations integration that turn monitoring data into appropriate response actions. Building or procuring that capability is the OT SOC challenge that most deserves serious organizational attention.
