Chapter 11
Hamlet Builds a Threat-Hunting Program at Denmark Cyber Defense
Hamlet, Threat Hunter at Denmark Cyber Defense, has been promoted to lead the firm's newly chartered detection-engineering and hunting program. The catalyst was an eleven-night insider incident he identified last quarter through behavioral anomaly scoring — an event that none of the standing detection rules had triggered on. The board read his post-incident write-up and decided the SOC needed to operate proactively, not just reactively.
Hamlet inherits a SIEM that ingests roughly 14 billion events per day from endpoints, firewalls, identity, cloud, and email — but whose detection rules were largely copied from the original vendor templates and have not been measured for false-positive rate in years. The SOC analyst queue receives over 500 alerts per shift, most of which get acknowledged without investigation because the analysts simply do not have time. Threat intelligence is being collected from three commercial feeds, two ISAC memberships, and CISA's automated indicator-sharing program, but indicators are being applied directly to the perimeter firewall blocklist with no scoring or aging — and last month a major SaaS provider's IP range got blocked for six hours because of a stale entry.
Hamlet's six-month plan must rebuild the data pipeline, modernize detection, formalize threat hunting, and bring threat-intelligence consumption under control.
Complete Hamlet's program plan by selecting the correct option for each blank.