Kashyap Thimmaraju (TU Berlin)

The increasing complexity and criticality of cybersecurity operations have placed immense cognitive and emotional demands on Security Operation Center (SOC) practitioners. These demands frequently result in burnout, diminished wellbeing, and reduced engagement, which negatively impact both individual performance and overall SOC effectiveness. This paper envisions a transformative approach to SOC productivity and practitioner well-being through targeted interventions that prevent burnout, enhance well-being, and foster engagement. By addressing the psychological challenges inherent in high-stress cybersecurity roles, our work seeks to promote holistic resilience in SOC environments. This study focuses on evaluating the mental health landscape of SOC practitioners using validated psychological scales. Leveraging the Copenhagen Burnout Inventory (CBI), Secure Flourish Index (SFI), and Short Flow Scale (SFS), we quantitatively assess burnout, well-being, and flow states among 19 SOC practitioners. The results highlight alarmingly high levels of personal and work-related burnout among participants (approx. 31-36% of participants met the criteria for high burnout), with considerable deficiencies in mental and physical health, life satisfaction, and social connectedness compared to normative workplace benchmarks. Simultaneously, participants report a sense of meaning and purpose, high financial security and flow experiences, reflecting their ability to engage deeply with challenging tasks and derive intrinsic rewards, despite a reduced sense of control, concentration and increased self-consciousness. The findings underscore the dual-edged nature of SOC roles— practitioners find purpose and fulfillment in their tasks yet face significant risks to their well-being. Broader conclusions from this work reveal the urgent need for structured interventions tailored to SOC environments. Key recommendations include fostering work environments that support mental health, promoting psychological safety, and implementing systems to address chronic stressors and workload imbalances. Moreover, the study highlights the importance of leveraging flow states as a mechanism to enhance practitioner engagement and productivity.

View More Papers

coucouArray ( [post_type] => ndss-paper [post_status] => publish [posts_per_page] => 4 [orderby] => rand [tax_query] => Array ( [0] => Array ( [taxonomy] => category [field] => id [terms] => Array ( [0] => 118 [1] => 70 ) ) ) [post__not_in] => Array ( [0] => 19802 ) )

UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile...

Jiawei Li (Beihang University & National University of Singapore), Jiahao Liu (National University of Singapore), Jian Mao (Beihang University), Jun Zeng (National University of Singapore), Zhenkai Liang (National University of Singapore)

Read More

Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding

Chunjiang Che (The Hong Kong University of Science and Technology (Guangzhou)), Songze Li (Southeast University), Xuechao Wang (The Hong Kong University of Science and Technology (Guangzhou))

Read More

Tweezers: A Framework for Security Event Detection via Event...

Jian Cui (Indiana University), Hanna Kim (KAIST), Eugene Jang (S2W Inc.), Dayeon Yim (S2W Inc.), Kicheol Kim (S2W Inc.), Yongjae Lee (S2W Inc.), Jin-Woo Chung (S2W Inc.), Seungwon Shin (KAIST), Xiaojing Liao (Indiana University)

Read More

DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and...

Sofia Celi (Brave Software), Alex Davidson (NOVA LINCS & Universidade NOVA de Lisboa), Hamed Haddadi (Imperial College London & Brave Software), Gonçalo Pestana (Hashmatter), Joe Rowell (Information Security Group, Royal Holloway, University of London)

Read More

Privacy Starts with UI: Privacy Patterns and Designer Perspectives in UI/UX Practice

Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in Deceptive Multi-Stage CTF Challenges

Khalid Alasiri (School of Computing and Augmented Intelligence Arizona State University), Rakibul Hasan (School of Computing and Augmented Intelligence Arizona State University)

From Underground to Mainstream Marketplaces: Measuring AI-Enabled NSFW Deepfakes on Fiverr

Mohamed Moustafa Dawoud (University of California, Santa Cruz), Alejandro Cuevas (Princeton University), Ram Sundara Raman (University of California, Santa Cruz)