FC Schalke vs Augsburg predicted XI: Suat Serdar’s return

Spanish midfielder Omar Mascarell runs with the ball during the German First division Bundesliga football match between RB Leipzig and Schalke 04 in Leipzig, on September 28, 2019. (Photo by Ronny Hartmann / AFP) / DFL REGULATIONS PROHIBIT ANY USE OF PHOTOGRAPHS AS IMAGE SEQUENCES AND/OR QUASI-VIDEO (Photo credit should read RONNY HARTMANN/AFP/Getty Images)
Spanish midfielder Omar Mascarell runs with the ball during the German First division Bundesliga football match between RB Leipzig and Schalke 04 in Leipzig, on September 28, 2019. (Photo by Ronny Hartmann / AFP) / DFL REGULATIONS PROHIBIT ANY USE OF PHOTOGRAPHS AS IMAGE SEQUENCES AND/OR QUASI-VIDEO (Photo credit should read RONNY HARTMANN/AFP/Getty Images) /
facebooktwitterreddit
Prev
3 of 4
Next
FC Schalke 04, Omar Mascarell
(Photo by TF-Images/Getty Images) /

Midfield

It’s always hard to predict what kind of formation David Wagner will run with, since he’s tried so many different ones out, but given the opposition, I’m thinking that this is a match where he will aim to have a beefy midfield to maintain dominion in that theater. He has a swath of options here, but it’s hard to imagine Omar Mascarell ever getting sat, so count him in.

More from Release The Knappen

Next to him, I’d hope to see Weston McKennie returned to his spot in the starting XI after returning from injury. He’s another guy that’s hard to drop, though Wagner has done so at times this season.

Since this is a 4-4-2, let’s round off this midfield by placing Daniel Caligiuri where he always is, holding down that right side of the midfield and pairing well with Jonjoe Kenny. While I would personally love to see Alessandro Schopf in the starting XI, I just can’t count it as likely yet. He’s playing midweek for a reason.

On the left side, Suat Serdar will see his return to the starting XI, giving David Wagner a midfield that carries the strength and the mobility that he needs to take the fight to the opposition. This is an engine room right here.

Next up, the enigma that is this attack.