Implementation considerations

Organizational maturity

Security operations teams must review their current capabilities and maturity levels before considering threat hunting

Core capabilities must be in place before looking into threat hunting, such as:

  • log management

  • threat detection

  • security monitoring

  • incident response (IR)

Technologies that support traditional monitoring and response functions should also be in place

Are there internal resources available, or funds available for external resources?

Key components

People: Threat hunters with the following skill sets and experience are required to build mature hunt capabilities

Skill sets

  • Domain knowledge

  • Analytical mindset

  • Log analysis

  • Knowledge of network architecture

  • Attack life cycles

  • Security tools

  • Attack methods

Experience in security monitoring or incident response would position an analyst well within threat hunting

Leverage internal or external resources, based on your circumstances

Last updated