During my 24 years in security operations, from Air Force information warfare to tier-3 SOC work, I’ve watched hundreds of organizations chase the same impossible dream: becoming the team that discovers the next major threat group, like APT1. Teams pour resources into threat hunting programs, hire expensive consultants, and build elaborate procedures to track advanced persistent threats. Yet most of them never progress beyond procedural hunting that follows someone else’s playbook.
The irony? While they’re hunting for nation-state adversaries, their environment is full of missed signals:
- Locked-out service accounts that suddenly unlock at 3 AM.
- New administrative accounts created without change tickets.
- That legacy application mysteriously updated itself over the weekend.
- Shadow IT sprawl that nobody’s tracking.
These aren’t sexy Active Persistent Threat (APT) indicators, but they’re the organizational anomalies that matter for most security teams.
The problem isn’t that organizations lack hunting ambition. The problem is they’re stuck in what David Bianco’s Cyber Hunting Maturity Model describes as HMM1 (Hunting Maturity Model 1) or HMM2 (Hunting Maturity Model 2), capable of searching for known indicators or following published procedures, but unable to develop the contextual understanding needed to hunt effectively in their own environment. And that’s because they’re missing something fundamental: The ability to understand what “normal” looks like in their specific organizational context.
The Maturity Trap: Why Most Organizations Get Stuck at HMM2
The Cyber Hunting Maturity Model, originally developed by Sqrrl’s David Bianco (who also co-created the PEAK framework at Splunk), defines five levels of hunting capability. Most organizations with active hunting programs operate at HMM2,the procedural level. They can follow analysis procedures created by others, they collect substantial amounts of data, but they haven’t developed the capability to create new hunting methodologies tailored to their environment.
Here’s what that looks like in practice:
- At HMM0 (Initial), organizations rely entirely on automated alerting. They’re not hunting at al, they’re waiting for their EDR or SIEM to tell them something’s wrong.
- At HMM1 (Minimal), teams start incorporating threat intelligence. When a new report about credential dumping techniques drops, analysts search their historical data for those specific indicators. It’s hunting, but just barely.
- At HMM2 (Procedural), organizations implement published hunting procedures. They’re running the playbooks they find on GitHub, following frameworks from vendor blogs, executing searches based on MITRE ATT&CK techniques. This is where most “mature” hunting programs actually live.
- The jump to HMM3 (Innovative) requires creating novel analysis procedures specific to your environment.
- And HMM4 (Leading) means automating those successful hunts so they run continuously without manual intervention.
What prevents organizations from progressing beyond HMM2?
It’s not lack of tools or data. It’s lack of organizational context. You can’t create effective hunting procedures for your environment if you don’t understand what normal behavior looks like in that environment. And you can’t automate hunts if you can’t distinguish signal from noise.
The PEAK Problem: Great Framework, Missing Foundation
Splunk’s PEAK framework (Prepare, Execute, Act with Knowledge) provides an excellent structure for conducting hunts. It defines three hunt types:
- Hypothesis-Driven: Form a theory about potential threats and test it
- Baseline: Establish normal behavior and hunt for deviations
- Model-Assisted (M-ATH): Use machine learning to identify anomalies
The framework is solid. The challenge is the “Knowledge” component that’s supposed to inform every phase. PEAK assumes you have deep understanding of your organizational context, business processes, normal user behavior, expected system interactions, legitimate administrative patterns. For most organizations, that knowledge exists only in the heads of senior analysts who’ve been there for years. It’s not encoded, not searchable, and walks out the door when they do.
This is where baseline hunting, the foundation of the PEAK framework, breaks down in practice. You’re supposed to establish what’s normal and hunt for deviations. But how do you define “normal” across thousands of users, hundreds of applications, and constantly changing business processes? How do you distinguish between “unusual” and “malicious” when you lack the organizational context to make that judgment?
Hunting Beyond Threat Actors: The Visibility Gap Nobody Talks About
Here’s the uncomfortable truth: most organizations don’t have an APT problem. They have a basic visibility problem. While security teams are searching for sophisticated adversary tactics, their environment is generating organizational signals that never get investigated:
- Identity sprawl: Service accounts that haven’t been used in months, suddenly authenticating. New accounts created outside the provisioning system. Privilege escalations that don’t match any approval workflow.
- Configuration drift: Applications updating without change tickets. Firewall rules modified by unknown processes. Group policy changes that nobody authorized.
- Operational anomalies: Users locked out repeatedly at unusual times. File shares suddenly accessible to broader audiences. Database connections from unexpected sources.
- Shadow IT: Cloud services nobody knew existed. Third-party integrations bypassing security review. Data exports to unfamiliar destinations.
These aren’t advanced persistent threats. They’re organizational reality, the things happening in your environment that should trigger investigation but never do because nobody has time to look, nobody has context to interpret them, and nobody has a way to distinguish genuine anomalies from everyday variation.
Traditional threat hunting focuses on adversary behavior. But there’s a whole category of hunting that’s equally important: organizational hunting. Understanding what’s actually happening in your environment, identifying changes that matter, and surfacing the operational signals that indicate problems before they become incidents.
The Missing Piece: Business Context as a Hunting Accelerator
The jump from HMM2 to HMM3 requires developing analysis procedures specific to your organization. But you can’t create those procedures without understanding organizational context. This is where Command Zero’s approach transforms the hunting paradigm.
Command Zero’s new business context feature allows teams to encode organizational knowledge directly into their investigations. Instead of treating every login from an unusual location as equally suspicious, you can incorporate context about business travel, remote work patterns, or expected geographic presence. Instead of flagging every new account creation, you can reference onboarding schedules, contractor patterns, or seasonal hiring cycles.
This is more than just metadata tagging. Its encodes the institutional knowledge that senior analysts carry in their heads into a queryable, shareable form that makes investigations faster and more accurate.
Here’s a concrete example from a customer engagement: Their security team was investigating credential stuffing attempts and kept getting distracted by legitimate password failures. Users traveling internationally, VPN misconfigurations, SSO integration issues, all generating “suspicious” authentication failures that required manual review to dismiss.
By encoding business context about expected travel patterns, known VPN issues, and legitimate authentication variation, they transformed their hunting capability. Suddenly the real credential stuffing attempts stood out clearly because the noise was contextualized and filtered appropriately. They progressed from running someone else’s credential stuffing detection procedure (HMM2) to developing a custom hunt specific to their organization’s authentication patterns (HMM3).
Table Filters: Turning Baseline Hunting Into Something Usable
The PEAK framework’s baseline hunting approach makes perfect sense in theory: establish normal behavior, then hunt for deviations. In practice, this is where most hunting programs fail. The volume of “unusual but legitimate” activity overwhelms the handful of genuinely suspicious events.
Command Zero’s table filters solve this by allowing teams to save and apply organizational context directly to their hunt results. You’re not just filtering out noise, you’re building a persistent understanding of what “normal” looks like in your specific environment.
Say you’re hunting for unusual administrative account usage. You pull all accounts with elevated privileges that authenticated in the last 24 hours. The list has 847 entries. Most are legitimate, service accounts, administrative tasks, scheduled maintenance. But somewhere in there might be an actual compromise.
With table filters, you can encode that organizational knowledge:
- Filter out service accounts that authenticate every Tuesday for scheduled backup
- -Exclude administrative users who regularly work third shift
- Surface accounts that have never authenticated from this IP range before
- Highlight privilege escalations that don’t correlate with approved change tickets
The filters persist. Next time you run this hunt, those 847 entries become 23 items requiring investigation. The legitimate baseline is encoded and reusable. You’re not rediscovering what “normal” means every time you hunt.
This is how you progress from HMM2 to HMM3. You’re not just following a published procedure for hunting unusual administrative access, you’re creating a customized hunt that incorporates your organizational context, making it repeatable and progressively more refined.
From Reactive Searching to Proactive Investigation
Traditional hunting programs focus on threat actor tactics: “Let’s hunt for lateral movement techniques,” “Let’s search for credential dumping,” “Let’s look for persistence mechanisms.” These are valid hunts, but they’re reactive. You’re searching for things adversaries have already done in other environments.
Organizational hunting flips this model. Instead of asking “What might an adversary do?”, you ask “What’s changing in my environment that I don’t understand?” This surfaces:
- Locked accounts that unlock themselves
- New privileged users appearing outside provisioning workflows
- Legacy applications suddenly updating without patching schedules
- File shares with permission changes nobody authorized
- Database access patterns that don’t match known applications
These signals exist in every environment. Most organizations never investigate them because they lack the context to distinguish signal from noise and the tooling to make such investigation efficient.
Command Zero’s federated investigation approach combined with business context and table filters makes this organizational hunting practical. You can query across identity providers, application logs, and infrastructure systems simultaneously. You can apply organizational context to filter expected behavior. You can save those filters as reusable procedures that get progressively more refined.
This is the path from HMM2 to HMM3 to HMM4. You start by following published hunting procedures. You add organizational context to customize those procedures for your environment. You encode that context into table filters that make the hunts repeatable. Eventually, you automate the highest-value hunts so they run continuously, surfacing organizational anomalies without manual intervention.
The Maturity Accelerator: Encoding Knowledge into Investigation Patterns
Most organizations get stuck at HMM2 because progression to HMM3 requires institutional knowledge that isn’t documented anywhere. Senior analysts know that certain accounts always authenticate at odd hours. They understand which applications generate expected failed login attempts. They recognize legitimate administrative patterns versus suspicious privilege escalation.
That knowledge exists as tacit expertise. When those analysts leave, it walks out with them.
Command Zero’s approach encodes that knowledge into investigation patterns that persist and improve over time:
- Business context captures organizational reality: travel patterns, work schedules, legitimate system behavior
- Table filters encode filtering logic: what’s expected, what’s unusual, what requires investigation
- Questions represent investigation methodology: how expert analysts approach specific scenarios
This transforms hunting from an individual skill into an organizational capability. New analysts aren’t starting from zero—they’re building on encoded expertise from their predecessors. Hunts become progressively more refined as organizational context accumulates and filters become more sophisticated.
Practical Maturity Progression for Hunting
The Cyber Hunting Maturity Model and PEAK framework both describe what advanced hunting looks like. Command Zero provides the mechanism to actually achieve it:
From HMM1 to HMM2: You can execute published hunting procedures across federated data sources. Questions give you pre-built investigation patterns that work across multiple systems simultaneously.
From HMM2 to HMM3: Business context and table filters let you customize those procedures for your specific environment. You’re not just following someone else’s playbook—you’re adapting it to your organizational reality.
From HMM3 to HMM4: As you identify high-value hunts, you can encode them into automated investigations that run continuously. Table filters that started as manual noise reduction become automated baseline enforcement.
The progression isn’t theoretical. It’s a practical path enabled by tooling that makes organizational context queryable and investigation patterns reusable.
Redefining What Hunting Actually Means
Threat hunting has become synonymous with APT detection. Everyone wants to be the team that discovers the next major campaign. But for most organizations, that’s not where the value lies.
The real value is in organizational visibility. Understanding what’s changing in your environment. Identifying unauthorized modifications before they become incidents. Surfacing the operational anomalies that indicate problems: accounts created outside process, applications updated outside change control, permissions modified without authorization.
This isn’t less sophisticated than APT hunting—it’s differently sophisticated. It requires deep understanding of your specific organizational context, the ability to distinguish legitimate variation from genuine anomalies, and the tooling to make such investigation efficient rather than overwhelming.
Command Zero’s business context and table filters transform this from aspirational to achievable. You can encode organizational knowledge, build reusable investigation patterns, and progressively refine your understanding of what “normal” looks like in your environment.
That’s how you progress up the maturity curve. Not by chasing advanced persistent threats you’ll probably never encounter, but by building the organizational visibility that lets you hunt effectively for the things that actually matter in your specific environment.
And sometimes—when you have that foundation of organizational context and investigation capability—you’ll be ready when the APT actually shows up.






