Key Takeaways:
- Recorded Future deployed Autonomous Threat Operations within its own SOC before customer release, ensuring real-world effectiveness and identifying critical capabilities.
- Autonomous Threat Operations reduced analyst-dependent, inconsistent processes, creating standardized hunts that deliver the same input, output, and expectations every time.
- Team members now run 15-20 threat hunts weekly—work that previously required days or weeks of manual research, coordination, and planning.
- During the Salt Typhoon campaign, Recorded Future’s CISO launched a comprehensive network-wide threat hunt in five minutes between meetings, enabling immediate risk mitigation.
- A single pane of glass eliminates context-switching across multiple tools, allowing analysts to hunt threats and research IOCs within one platform.
Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team
The ultimate test of any cybersecurity solution Recorded Future builds? Using it to defend our own network.
That’s exactly what we did with Autonomous Threat Operations. Before rolling it out to customers, we became Customer Zero, deploying the technology within our security operations organization to see if it could truly transform the way security teams hunt for threats.
The results exceeded our expectations. What we discovered wasn’t just incremental improvement; it was a fundamental shift in what our security team could accomplish.
The challenge: Inconsistent and analyst-dependent threat hunting
Prior to implementing Autonomous Threat Operations, we faced the same threat hunting challenges many security teams struggle with today. As Josh Gallion, Recorded Future’s Incident Response Manager, explains: “Before using Autonomous Threat Operations, our approach to threat hunting was more piecemeal and unique to each analyst. It varied based on whatever they were comfortable with and however they were trained on the tooling.”
This inconsistency meant that the quality and thoroughness of our threat hunts varied significantly by analyst. And since each team member had different strengths, different levels of experience, and different comfort levels with our security tools, we struggled to standardize the process.
The transformation: Unified, repeatable threat hunting
Autonomous Threat Operations leveled the playing field immediately. “It unifies the hunting capability and makes it so that every time analysts run a hunt, it’s the same,” says Gallion. “We get the same input, we get the same output, and we know what to expect.”
The implementation was remarkably straightforward. “When we turned it on, it just was a simple connection to our Splunk environment,” he says. “And once the team started using it, we could see an increase in the number of threat hunts each user would do.”
Perhaps most importantly, Autonomous Threat Operations enabled our team to shift from reactive, manual hunting to proactive, automated operations. “Now we can schedule hunts that will continuously run over time, update with the threat actor TTPs, and give us a more holistic view,” Gallion says. “Before, we had to have an analyst get back into the product and look for new IOCs to run. Now it just runs it automatically and we know that that’s taken care of.”
Real-world impact: Upskilling junior analysts and enabling rapid response
According to Recorded Future’s CISO, Jason Steer, the true value of Autonomous Threat Operations became clear through two significant outcomes.
First, the technology dramatically upskilled our junior staff. In traditional manual workflows, preparing to run a single threat hunt could take days or even weeks—requiring extensive research, coordination, and planning.
Today, our junior analysts are running 15–20 threat hunts each week to identify high-priority threats. This isn’t just about quantity; it’s about empowering less experienced team members to contribute meaningfully to our defense posture while accelerating their professional development.
Gallion sees this impact firsthand. “We have newer analysts who can do more advanced hunting based on IOCs, and it does it for them automatically in the background,” he says. “We get our results, and then they can do research in the app to shore up the findings.”
Second, the speed and accessibility of automated threat hunting has proven invaluable during critical moments. When Steer read about Salt Typhoon making its way into corporate networks, he didn’t need to schedule a meeting, assemble a team, or wait for the next sprint cycle. In the five minutes between meetings, he was able to launch a comprehensive threat hunt across Recorded Future’s entire network to identify and mitigate associated risks to our systems.
That kind of rapid response would have been impossible with manual processes—and in today’s threat landscape, that speed can mean the difference between containment and catastrophe.
The advantage of a single pane of glass
Another key benefit emerged around workflow efficiency. “Having a single pane of glass makes it a lot easier for an analyst to do not just the threat hunt, but also to see the meaning behind the IOCs that they’re pulling back into the app,” says Gallion. “Analysts don’t like to have to get into a whole bunch of different applications. If we don’t have to, it speeds things up and we can add context from inside the app.”
This unified approach has eliminated the context-switching and tool-juggling that had often slowed down our security team and led to missed findings.
Why the Customer Zero experience matters
Serving as Customer Zero validated what we believed Autonomous Threat Operations could deliver to every customer: consistent, repeatable threat hunting that empowers analysts of all skill levels to defend their organizations more effectively. By testing the new solution within our own security operations first, we were able to identify what works, refine the capabilities that matter most, and prove that Autonomous Threat Operations isn’t just a theoretical improvement—it’s a practical solution that transforms daily security operations.
Gallion sums it up this way: “Some of the aspects of Autonomous Threat Operations that’ll have the biggest impact are the repeatability, the scheduling of threat hunts to happen over time, and the single pane of glass that allows analysts to research IOCs in the app without having to go into multiple tools.”
We saw a need for Autonomous Threat Operations, so we built it. Being Customer Zero enabled us to test it, refine it, and ensure that it’s the best possible solution to help our customers enter the era of the autonomous SOC.
Learn more about Autonomous Threat Operations by clicking here, or start operationalizing your threat intelligence now by booking a custom demo.






