Description
Development of custom threat-hunting queries aligned to client environment and attacker behavior.
Includes:
-
5–10 custom SPL hunts
-
False-positive reduction logic
-
Analyst usage guidance
-
MITRE technique mapping
Ideal for SOC L2 / L3 teams.




