Does Your Security Team Need Coding Resources?
September 10, 2018

Jennifer Andre
Rapid7

When thinking about security automation, a common concern from security teams is that they don't have the coding capabilities needed to create, implement, and maintain it. Pulling development resources from the IT team or engineering department can take time. Backlogs are long, and revenue-generating projects enough take priority. There is always the option to hire an IT consultant, however this can be a costly endeavor and is not a sustainable long-term option.

As a result, security teams often try and find the sought-after "unicorn." This is a security professional who is not only an expert on all things information security, incident response, or threat intelligence, but also someone who can also write integrations and build automation between systems and products.

As I'm sure you can imagine, finding this rare type of person is a tall order – if not impossible. It can take up to a year to hire a security professional, and that doesn't include finding someone who also has a software development skill set.

So, what are teams to do when internal resources are tight and there isn't budget to hire an outside consultant or "unicorn?"

Start Implementing Your Security Automation Options

To start, begin leveraging a security orchestration and automation solution to handle many, if not all, of your routine tasks for you. This will accomplish three different things:

1. Ensure all your security tasks are taken care of in a timely and proactive way

2. Eliminate the need for coding skills on your team

3. Refocus your team's focus to more strategic, ROI-driven tasks

From there, when you need really customized integrations or complex workflows built, you can bring in coding expertise strategically. This can help optimize both your development and security resources.

Once the need for coding is solved, you can stop chasing the ephemeral unicorn hire. In addition, you will also be able to enhance what your current team is working on. For example, instead of having them spend most of their time on mundane tasks like reviewing alerts, investigating phishing attempts, and scoring IP addresses, they can put their talent to better use. This includes analyzing and responding to threats and developing a more strategic security posture.

When teams have less busy work on their plates, they can spend more time learning new skills. If you want your team to be able to do build custom integrations or automation on top of the security automation and orchestration solution you use, teams can learn and practice coding.

With your team able to re-shift their focus to tasks that are most relevant to their skill set and interests, you may also reduce attrition – an added bonus considering today's security talent crunch.

Find Your Balance

At the end of the day, my main piece of advice to all companies is to code strategically. This is not to say you can't or absolutely should not bring coding resources onto your security team. Instead, look to strike a balance between bringing in scarce resources when you really need them and relying on out-of-the-box solutions whenever possible to alleviate the talent (and time) crunch.

Ideally, the security orchestration and automation solution you choose will allow you to add custom integrations alongside pre-built workflows. These solutions are the ones that can do much of the heavy lifting for you and save your development resources for the truly custom work. In addition, identifying a solution that offers the best of both worlds will keep your team happy and productive, and accelerate the time to value for security automation.

At the end of the day, let your talent focus on what they do best, and let orchestration and automation take care of the rest.

Jennifer Andre is Senior Director, Orchestration and Automation, at Rapid7
Share this

Industry News

October 03, 2024

Check Point® Software Technologies Ltd. announced its position as a leader in The Forrester Wave™: Enterprise Firewalls, Q4 2024 report.

October 03, 2024

Sonar announced two new product capabilities for today’s AI-driven software development ecosystem.

October 03, 2024

Redgate announced a wide range of product updates supporting multiple database management systems (DBMS) across its entire portfolio, designed to support IT professionals grappling with today’s complex database landscape.

October 03, 2024

Elastic announced support for Google Cloud’s Vertex AI platform in the Elasticsearch Open Inference API and Playground.

October 02, 2024

Progress announced the recipients of its 2024 Women in STEM Scholarship Series.

October 02, 2024

SmartBear has integrated the load testing engine of LoadNinja into its automated testing tool, TestComplete.

October 01, 2024

Check Point® Software Technologies Ltd. announced the completion of its acquisition of Cyberint Technologies Ltd., a highly innovative provider of external risk management solutions.

October 01, 2024

Lucid Software announced a robust set of new capabilities aimed at elevating agile workflows for both team-level and program-level planning.

October 01, 2024

Perforce Software announced the Hadoop Service Bundle, a new professional services and support offering from OpenLogic by Perforce.

October 01, 2024

CyberArk announced the successful completion of its acquisition of Venafi, a provider of machine identity management, from Thoma Bravo.

October 01, 2024

Inflectra announced the launch of its AI-powered SpiraApps.

October 01, 2024

The former Synopsys Software Integrity Group has rebranded as Black Duck® Software, a newly independent application security company.

September 30, 2024

Check Point® Software Technologies Ltd. announced that it has been recognized as a Visionary in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms.

September 30, 2024

Harness expanded its strategic partnership with Google Cloud, focusing on new integrations leveraging generative AI technologies.

September 30, 2024

OKX announced the launch of OKX OS, an onchain infrastructure suite.