IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.
Sponsor Content
What does this mean?

Hiring Won’t Fix the Cyber Talent Gap: Building a Self-Improving Workforce Will

The whole-of-state model isn’t theory. It’s measurable cybersecurity defense and a cyber workforce that scales.

Teacher,Giving,Computer,Science,Lecture,To,Diverse,Multiethnic,Group,Of
Shutterstock
State agencies are fighting the same two battles: too many cyber threats and not enough analysts that they can afford or keep. States are losing trained analysts to private industry at 2–3x the salary rate. Most agencies reach for the same quick fixes — another tool, another pilot, another grant cycle. Louisiana decided to stop playing that game.

By blending measurable outcomes and continuous improvement into a single, sustainable cyber ecosystem, it created a better outcome. Job-ready cybersecurity analysts are the result. The solution doesn’t start with head count; it starts with design.

Every governor wants to show progress on both fronts: securing systems and creating skilled, high-wage jobs. Louisiana’s approach does both in one move.

THE WHOLE-OF-STATE PROGRAM: REWRITING THE PLAYBOOK FOR CYBERSECURITY WORKFORCE DEVELOPMENT

Most states handle cybersecurity staffing in a typical fashion: siloed agencies, expensive MSSPs, reliance on federal grants that expire. Louisiana’s approach began with a simple question: What if the next generation of analysts is already training just miles from the security operations center (SOC) that needs them? They demonstrate what’s possible when a state treats cybersecurity not as an IT project but as a public-private ecosystem. Through a partnership between Louisiana State University (LSU), Splunk, Amazon Web Services (AWS) and TekStream, the state is building a new kind of cyber workforce pipeline: one that delivers real security outcomes today while training the next generation of defenders for tomorrow.

Here’s what that looks like in practice. Starting as sophomores, students are hired to work in the SOC while they learn. Under guidance from TekStream, the training program consists of a six-week onboarding, training and evaluation period, followed by skill leveling as they begin actively working on alerts and incidents.

Learning isn’t theoretical; it’s backed by certifications. Each credential assessment in the program verifies that students can operate at enterprise-grade standards. Analysts follow a curated and customizable progression on an advancement timeline tailored to the institution and candidate pool. Assessments and practicum gate advancement between levels. Skills include advanced techniques like exposure management, GenAI-related security and cloud technology, and are included in a student transcript with activity metrics and a summary of the use cases they pursue.

WHERE OTHERS INTEGRATE, TekStream OPERATIONALIZES

Public-private partnerships are not new. But too many stop at tool implementation or curriculum design. That’s where this program is different — by moving beyond setup to sustained optimization. This approach transforms student-run SOCs from classroom exercises into measurable components of a state’s cyber defense posture.

Each semester, students inherit an improved set of dashboards, playbooks and performance baselines, and are expected to make them better. That rhythm of continual refinement is what keeps the model alive. It turns workforce development from a training pipeline into a living operations system that improves with every student, every incident, every data set.

A PUBLIC-PRIVATE PARTNERSHIP THAT SCALES

As other states replicate Louisiana’s success, TekStream is helping them build similar ecosystems that begin with trackable baselines and mature through continuous improvement cycles. Each new school that joins experiences shorter adoption timelines, decreased time to proficiency and productivity metrics everyone can be proud of.

TekStream’s approach treats every SOC not as a project but as a learning organism. Students learn Splunk search logic and incident triage; TekStream engineers keep the processes leaner and data cleaner. Splunk’s telemetry provides the common language for measurement and growth.

Shared threat intelligence is the kicker. As universities and states join the program, they become part of a virtual neighborhood watch. We structured the solution to give complete SIEM autonomy to each school (to set up their own use cases and detection rules specific to their security requirements) while leveraging best practices and templated searches, rules and automation across the entire neighborhood.

It all comes back to a dedicated multi-tenant security orchestration, automation and response (SOAR) platform which supports security analysts and student security analysts to perform incident response in an automated fashion. We are not just teaching students to input another IP into virus total; we want them to learn analysis and remediation through structured playbooks.

It’s also hosted entirely on AWS as a platform, because in addition to not wanting our analysts to become rote level 1 incident response task masters, we also don’t want them to be system administrators.

That’s how a student-led SOC evolves into a statewide cyber ecosystem. An ecosystem that improves itself in real time and proves that resilience isn’t static. The workforce pipeline is already in sight for state agencies and is ready to work immediately after graduation. And career development teams can brag about the talent development fostered in your state.

POLICY AND ECONOMIC IMPACT

Cybersecurity capacity can scale through higher-ed ecosystems. Traditional 24/7/365 SOC coverage can be expensive, even for a midsized state operation. By embedding trained student analysts under TekStream oversight, this program can offset hundreds of thousands of dollars in outsourced labor. That’s real taxpayer savings and an in-state investment in human capital. Legislators can fund one program that delivers both protection and workforce ROI.

Within 6–12 months, the state can show data to quantify detection, coverage and workforce outputs. Those are tangible wins for a legislative session or budget cycle. This public-private partnership matters because it replaces short-term fixes with a sustainable, data-driven model that governors can fund confidently, CIOs can measure and legislators can defend to taxpayers.

It’s a self-improving cyber workforce ecosystem that outlasts election cycles. Transparent, auditable and demonstrably cost-effective. Exactly the kind of initiative governors and legislators can champion as a legacy investment.

THE ECOSYSTEM APPROACH WORKS. HERE’S HOW STATES CAN REPLICATE IT

Louisiana’s experience shows that solving the cyber workforce shortage doesn’t require starting from scratch; it requires connecting what already exists. Every state has universities producing cyber talent, agencies in need of coverage and technology partners ready to enable them. What’s missing is the framework to link those assets into a shared ecosystem.

The blueprint is straightforward: Start with a university willing to operationalize its curriculum, a state CISO willing to federate data and policy, and a private-sector partner capable of engineering continuous improvement. Build shared telemetry, measure outcomes relentlessly and let students train on the same platforms that power enterprise SOCs. The result is a self-reinforcing cycle of security and talent growth. A model that strengthens both the workforce and the state’s resilience every semester.

Instead of treating universities as training grounds disconnected from operations, the model treats them as active nodes in the state’s cyber defense network. Through Splunk’s data platform and TekStream’s automation framework, the Student SOC can provide live monitoring for state assets, local governments and partner institutions. This gives policymakers a scalable, whole-of-state framework that grows stronger with every campus that joins.

TekStream’s work with LSU, Splunk and AWS proves this isn’t a concept; it’s a capability. By treating cybersecurity as an ecosystem, not a department, states can achieve 24/7 coverage, quantifiable improvement and a workforce pipeline built from within. Replication isn’t the issue anymore; urgency is. The real question is which state moves next.