SOC diversity header image.

Acting on SOC diversity beyond the abstract

It’s 03:17. Your SOC is juggling an identity-flavoured incident: suspicious OAuth consent, a burst of unfamiliar API calls, and a cloud admin role that “definitely wasn’t meant to be permanent.” The technical work is hard, but it’s the human bit that bites. You’ve got smart people, yet the team keeps reaching the same conclusions, potentially missing the same signals, and burning out in the same ways.

That’s where SOC diversity stops being a poster slogan and starts looking like an operational control.

The gender and diversity gap in cybersecurity isn’t new news, and neither is the current skill shortage. What’s new (or at least newly obvious in 2026) is this: most organisations say they want to fix it, but their hiring systems still behave like it’s 2006: credential-led, network-driven, and allergic to anyone who didn’t take the “traditional” route.

The Gap, In Numbers

There’s an uneven baseline. ISC2 reports women account for 22% of security teams on average. That’s not “a little low”; that’s structurally limiting, especially in small SOC teams where one cloud engineer resignation changes the team’s entire perspective map. 

Then there’s the “we agree it’s an issue” problem. ISACA found 87% of IT professionals agree there’s a lack of gender diversity, yet only 41% of businesses have programmes in place to hire more women. In other words: we have consensus without execution. 

And by diversity I also mean more than gender diversity: think cultural, age, neurodiversity, socioeconomic background, career pathway, education route, and even diversity of technical discipline (from DevOps to data science to governance) because different lived experience produces different threat models. 

  • Cloverpop analysed 600 business decisions and found that inclusive teams make better decisions up to 87% of the time, and make them twice as fast with half as many meetings.
  • OECD research shows organisations with age-diverse workforces demonstrate stronger knowledge transfer and innovation capability, particularly when older and younger workers collaborate.
  • Boston Consulting Group found that companies with above-average diversity in their teams reported 19% higher innovation revenue.
  • The UK Government’s Department for Work and Pensions has highlighted that autistic individuals are significantly underrepresented in employment despite often excelling in pattern recognition and analytical roles, which are directly relevant to cybersecurity and SOC operations.
  • Harvard Business School research found that employees from lower socioeconomic backgrounds are often underrepresented in leadership, but when present contribute unique perspectives linked to risk sensitivity and problem-solving approaches.

And retention? The UK NCSC/KPMG “Decrypting Diversity” research reports 22% of cyber professionals experienced discrimination in the previous year, and it highlights significantly higher rates among women and other underrepresented groups. Underrepresented groups reported a lower sense of belonging, and inclusion directly impacted retention and workforce stability. That’s not just a moral failure; it’s a churn engine. 

If our SOC has hiring pressure plus attrition pressure, we’re not building capability, we’re running a conveyor belt.

Why SOC Diversity Pays Off (in security terms)

CISOs don’t get budget for being nice. They get budget for reducing risk, improving resilience, and not making the auditors laugh.

The business case for diversity is well established in the broader org. McKinsey’s longitudinal research (over multiple years) shows companies in the top quartile for ethnic diversity on executive teams are 39% more likely to outperform on profitability than bottom-quartile peers. 

Translate that into the security domain and the ROI looks like this:

  • Fewer blind spots in analysis. Incident response is pattern recognition under stress. Teams with more cognitive variety (which SOC diversity supports) are less likely to converge too early on the same “obvious” theory.
  • Better threat modelling. Especially in cloud and identity, where the attacker’s path is often “weird but allowed.” A wider set of mental models improves the chance someone asks, “Hang on… why does this workload identity have permission to do that?”
  • Lower operational churn. Attrition isn’t just a recruiting cost; it’s lost institutional memory and degraded coverage. Discrimination and poor inclusion accelerate exits. 

Putting bluntly: diversity isn’t an HR initiative. It’s how we reduce single-point-of-failure thinking. In cybersecurity, where threat modelling is essentially structured imagination, diversity of lived experience directly influences the risks a team is able to see.

Stop Blaming The Pipeline, Fix The System

The “pipeline problem” story is comforting: it implies the shortage is external, and our org is just unlucky. But a lot of the gap is produced by how we recruit, assess, and promote.

NIST’s NICE work is explicit about broadening the hiring pipeline and using frameworks to create job descriptions and assess skills. That’s not DEI rhetoric, it’s workforce engineering. 

For UK teams, the UK Cyber Security Council’s Cyber Career Framework maps specialisms and pathways, which helps you recognise legitimate skill routes that aren’t “10 years in a SOC.”

At Trustle we have a team incorporating people from Brazil, Ireland / the UK, and the US, with an age range of over 35 years, and colleagues identifying as neurodivergent. For us, this is an advantage. If you want SOC diversity, we have to stop hiring like we’re buying a pre-built SOC from a catalogue, and start hiring for demonstrable capability.

Recruiting Like It’s 2026: The Low-Friction Playbook

Here’s the part our cloud engineers will like, because it’s basically good systems design.

Use Skills-Led Roles, Not Credential-Led Roles

Replace “must have X years and Y certs” with “must be able to do these tasks.” NICE is there to help us define that work in a structured way. 

A practical SOC example:

  • Role goal: Tier 2 analyst who can handle identity-driven cloud incidents.
  • Work sample: Review a short bundle: Entra sign-in logs, an OAuth consent event, CloudTrail anomalies, and a suspicious service principal. Ask the candidate to prioritise, propose containment, and call out what evidence they’d pull next.

This is fairer and more predictive than CV keyword bingo. It also makes SOC diversity easier because we’re not filtering for pedigree, we’re filtering for competence.

Standardise Interviews (so you’re not hiring “confidence”)

Build structured questions with a scoring rubric. Same prompts, same scoring, multiple interviewers. This reduces bias and improves consistency. If we can write detection-as-code, we can write interview-as-code.

Build On-Ramps From Adjacent Roles

In an international labour market, cyber specialisms span governance/risk through to more technical domains, and many orgs already have people close to the work in IT ops, DevOps, SRE, and engineering. 

Create internal transfer pathways:

  • DevOps → cloud security engineering (policy, controls, CI/CD hardening)
  • IAM admin → identity security (least privilege, access reviews, conditional access design)
  • Data analyst → detection engineering (alert logic, tuning, false-positive reduction)
  • IT support / endpoint engineer → EDR analyst (endpoint telemetry triage, behavioural analysis, containment workflows)
  • QA / test automation engineer → security testing / adversary simulation (abuse-case modelling, edge-case testing, purple team automation)
  • Network engineer → cloud network security / zero trust architecture (VPC design, segmentation, private endpoints, micro-segmentation)

Internal mobility is one of the fastest ways to improve SOC diversity without fighting the whole external hiring market.

Make SOC Life Sustainable (or we’ll lose everyone we hire)

If our operating model relies on heroics, we’ll recruit people and then exhaust them. We can reduce toil with better runbooks, clearer severity definitions, and automation where it genuinely removes repetitive work (not where it just creates new failure modes). The inclusion/retention findings in NCSC/KPMG’s research should be read as an operational risk signal, not some “culture” footnote. 

The Thought Leadership Take

The organisations that win in 2026 won’t be the ones that “care about diversity” in the abstract. They’ll be the ones that treat SOC diversity like any other capability gap: measure it, design for it, and remove friction until improvement becomes the default.

Because the next time it’s 03:17, you don’t just want more hands on keyboards. You want more ways of thinking about the problem and to put more diverse experience to the task, before our attackers do.

Nik Hewitt

Industry

March 31, 2026

Read More Blogs

Don't fall behind the curve

Discover powerful features designed to simplify access management, track progress, and achieve frictionless JIT.

Book a Demo