TOM Series Article Banner

Your SOC's Dirty Secret: They Aren't Actively Hunting for Silent Threats

Most security leaders believe their 24/7 Security Operations Center (SOC) constantly hunts for threats. They don't. They watch dashboards.

This isn't a criticism of your security team or their capabilities. This is a harsh reality about how security operations design modern models. Your SOC provider, whether internal or outsourced, built its structure to respond to alerts, rather than actively search for threats that haven't announced themselves yet.

And sophisticated adversaries? They know this.

The Alert-First Trap

Here is how most security operations work: An alert fires. An analyst investigates. They determine if it's real or false. They respond or close the ticket: report and repeat.

But a dangerous assumption lies here: that every meaningful threat will generate an alert in the first place.

Modern attackers operate in the gaps. They use stolen credentials. They move laterally with legitimate tools. They blend into everyday operations, generating no patterns or breaking a threshold that triggers detection rules.

Ask your security provider: When did your analysts last discover a threat that didn't generate an alert first? The silence tells you everything.

Why Your SOC Can't Hunt (Even Though You're Paying Them To)

This isn't about competence. It's about design.

Most SOCs operate under a Target Operating Model (TOM) that is built around reaction speed. Their key performance indicators measure how quickly they acknowledge alerts, investigate incidents, and close tickets. Their analysts evaluate performance based on throughput, as in how many events they process per shift.

This business model works brilliantly for its design purpose: detecting and responding to known threats in a scalable manner. After all, the SOC is a business that makes profits while monitoring its customers' environments.

But proactive threat hunting? That requires an entirely different operating model. Hunting means starting with a hypothesis, then methodically investigating logs and telemetry to prove or disprove that theory. You can't do that while simultaneously responding to a queue of 200 alerts that require triage by the end of the shift.

The math doesn't work. The incentives don't align. And frankly, your Managed Security Service Provider (MSSP) contract probably doesn't even include hunting hours. Check, then come back to finish this article.

The Uncomfortable Reality Check

Here is how SOC analysts typically break down their time:

  • 60-70% triaging alerts (mostly false positives)
  • 20-30% documenting tickets and administrative work
  • <5-10% conducting a deep investigation
  • 0% performing hypothesis-driven threat hunting

If your detection rules only catch known attacks, and analysts spend 80% of their time managing alerts, what percentage of your actual risk are you addressing?

This gap is where advanced threats reside for months, where ransomware operators establish footholds long before encryption day, and where data exists unnoticed.

A Different Approach: Hunting as a Specialized Discipline

Threats don't only work during business hours, but hunting doesn't need to be continuous to be effective. What if, instead of expecting your reactive SOC to somehow also become proactive hunters, you complemented them with specialists who do nothing but hunt?

Independent hunting teams operate differently: they experience no alert fatigue, maintain a deep focus on hypothesis threads, offer a fresh investigative perspective, and possess specialized expertise, as hunting is their craft and not a side responsibility.

These two models complement rather than compete with one another. Your SOC continues to monitor and provide a rapid response. The hunting team identifies threats without detection rules, validates your controls, and provides feedback to enhance your monitoring.

The Question You Should Be Asking

Don't ask your security provider if they are hunting. Instead, ask them to show you evidence of what they are not seeing. Can they prove you aren't currently compromised? Can they tell you which of your controls have blind spots? Can they hunt for threats using techniques that generate no alerts?

If the answer is "that's not in our scope," then you have just identified the gap between what you are paying for and what modern threats actually require.

What Comes Next

Understanding that your SOC isn't hunting is just the first step. The next question is more important: When was the last time anyone assessed whether your security operating model still matches your actual threat landscape?

Most organizations operate on assumptions that they built years ago, before adversaries evolved their tradecraft with modern technology, before cloud environments became the norm, and before living-off-the-land attacks became standard procedure.

That gap between your delivery model and your threat reality is what we call a Target Operating Model (TOM) assessment. And almost nobody is doing it.

About the Series: This is Part 1 of a six-part series that examines the gap between how security operations deliver their service and how modern threats actually operate. We will explore why most organizations stick with reactive security models and what you can do about it without ripping out your existing investments.

The team at Focused Hunts specializes in one thing: threat hunting. No alert triage. No vendor partnerships. Just a focused investigation to find what your monitoring hasn't. Learn more at focusedhunts.com

← Back to Articles