Authors: Mark Thomas, Sr. Cyber Security Analyst — Threat Hunter, and Sandeep Bachhas, Sr. Cyber Threat Hunter — When many companies think about network security, they usually think in terms of firewalls, anti-virus software, intrusion detection systems, and multi-factor authentication (MFA). Once these preventative measures are in place, companies often centralize their monitoring and response processes by standing up a security operations center (SOC) that respond to alerts…