All articles
Outsourced SOC Teams Are Abandoning Alerts the Moment They Hit Friction, Security Leaders Say
A growing number of enterprise security directors say their outsourced Tier 1 analysts routinely stop investigating alerts when they encounter obstacles, raising questions about the actual coverage organizations are paying for in a managed security services market worth $43 billion.

Enterprise security is facing a reality that nobody wants to put on record: the outsourced analysts staffing the first line of your security operations center aren't finishing the job. In conversations with security leaders at multiple mid-market and enterprise organizations, a consistent pattern has emerged. When outsourced Tier 1 analysts encounter a technical roadblock during alert investigation, they don't troubleshoot. They don't escalate. They simply document that they hit a friction point and move on to the next alert in the queue.
One director of security operations, speaking on condition that his employer not be identified due to active vendor relationships, described it bluntly: "If they hit a roadblock, they often just won't fix that roadblock. They'll just say I can't do this alert. And then it sits there."
The problem lands at a moment when SOC teams are already underwater. Trend Micro research found that 54% of SOC teams feel overwhelmed by alert volume, and analysts spend roughly 27% of their time handling false positives. The Tines Voice of the SOC Analyst report found that 71% of SOC analysts report experiencing burnout. And the SANS 2025 SOC Survey found that 70% of analysts with five years or less of experience leave within three years.
Into that environment, add the revelation that outsourced analysts are quietly abandoning the alerts that require the most effort. The picture of enterprise SOC coverage gets considerably darker.
The Staffing Model That Created the Problem
The pattern isn't new, but security leaders say it has worsened as organizations have scaled outsourced SOC arrangements to meet compliance and coverage requirements without proportionally investing in analyst quality.
The managed security services market is projected to reach roughly $43 billion in 2026, growing at a compound annual rate of over 12%. More than 72% of enterprises now outsource at least one security function, according to industry research. The economic model works at scale. MSSPs staff Tier 1 positions with junior analysts trained on specific tool interfaces and rigid runbooks.
When an investigation falls outside the runbook, which happens with increasing frequency as attack techniques evolve, the analyst has neither the training nor the incentive to improvise. "The economic model is volume," said one security engineering manager at a large institution. "They're measured on how many alerts they touch, not on how many they actually resolve. So when something takes effort, the rational move is to skip it."
The result is a dangerous feedback loop. Security directors who review ticket queues see activity and assume coverage. The alerts that required the most investigation, often the ones most likely to be genuine threats, are the ones most likely to be abandoned. Research by Osterman found that almost 90% of SOCs are overwhelmed by backlogs and false positives, while 80% of analysts report consistently feeling behind.
The Tooling Gap Compounds the Problem
Several security leaders pointed to tool complexity as an accelerant. Modern SOC environments require analysts to pivot between a SIEM, an endpoint detection platform, a vulnerability management system, a ticketing system, and often several additional enrichment sources. Forrester reported in 2020 that SOC teams receive an average of 11,000 alerts daily. Organizations deploy an average of 28 security monitoring tools, each generating its own alert stream.
Each pivot between tools is a potential friction point where an undertrained analyst can stall. "I just want to make sure there aren't too many roadblocks, that they're not going to get into the UI and be like, I'm confused where to even go, so I'm just not going to do anything," one security director said while evaluating a new agentic SOC platform. "That is literally what happens today."
Where AI Agents Enter the Conversation
The friction problem has become one of the primary drivers behind enterprise interest in agentic AI for security operations. Not because organizations want to eliminate human analysts, but because they've realized their human analysts aren't consistently doing the work.
AI-powered Tier 1 agents, now offered by several platform vendors, including Strike48, are designed to perform the exact workflow that outsourced analysts are abandoning: alert triage, false-positive verification, enrichment, correlation, and escalation. The agents don't hit roadblocks. They don't get confused by an unfamiliar interface. They don't skip an alert because it requires an extra pivot.
In one live enterprise demonstration, a single attack campaign that generated over 170 alerts was automatically triaged, correlated into a case, and escalated in under two minutes. The system produced an executive summary including observed indicators of compromise, executed playbooks, triage decisions, and recommended next steps. The entire process ran without human intervention.
Cybersecurity Insiders data showing that 76% of SOC teams cite alert fatigue as their top operational challenge suggests the transition from outsourced L1 analysts to AI agents is seemingly inevitable.
The Accountability Question
The deeper issue may be simple accountability.
Organizations that outsource Tier 1 operations are, in practice, outsourcing their ability to verify that investigations are being completed. The managed service provider reports that alerts were handled. The dashboard confirms activity. But the qualitative question, did anyone actually figure out what this alert meant, often goes unasked until an incident makes the gap visible.
Agentic SOC platforms create a verifiable record of every step taken during triage. Every enrichment query executed, every correlation made, every escalation decision and its reasoning. For security directors who have spent years wondering what their outsourced teams are actually doing with alerts, that audit trail alone may justify the evaluation.





