TL;DR

We started Dropzone AI with a single AI SOC Analyst. Three years and 300+ deployments later, we're expanding the team. AI Threat Hunter and AI Threat Intel Analyst join the Dropzone agent team this summer. Our philosophy hasn't changed: 100% software, no hidden humans, execute your strategy at machine scale.

I started Dropzone AI three months after OpenAI released the public beta of ChatGPT in November 2022. I saw what LLMs could do and knew immediately that this technology could add much-needed cognitive capacity to the SOC. 

Today, I want to share what we've learned and where we're going. We're announcing two new agents joining the Dropzone team: AI Threat Hunter and AI Threat Intel Analyst, both of which are currently in testing with beta customers and will be generally available this summer. But this post isn't just about new products. It's about the product philosophy behind them, why we waited until now to expand the team, and why the choices we've made will matter more as this market matures.

What's Changed Since We Started Building the Agentic SOC?

At the beginning of 2023, the idea of an AI agent that could investigate a security alert end-to-end sounded ambitious, to say the least. Three years later, our AI SOC Analyst is deployed at more than 300 organizations, investigating alerts around the clock, with the consistent depth and rigor that a senior analyst would apply.

We first coined the term "AI SOC Analyst," and now it's everywhere. Gartner recognized the category in its 2025 Hype Cycle for Security Operations, naming Dropzone AI a sample vendor for AI SOC agents. Competitors adopted the language. The concept isn't new anymore.

But while a single AI SOC analyst is immensely valuable, we know that much more is possible. We’ve only begun to scratch the surface of what LLMs can do to help SOCs adapt and respond to increasingly AI-driven attacks. That’s why our new AI Threat Intel Analyst and AI Threat Hunter are built to collaborate with each other and with the AI SOC Analyst. They’re a team of agents that executes human strategy round the clock, at machine scale. 

Why Now? AI Is Changing Both Sides of the Fight

The Agentic SOC vision that we’re pursuing meets an urgent need. Anthropic's Frontier Red Team published findings this year showing that AI models can now discover real zero-day vulnerabilities, write working exploits, and execute multistage attacks across networks with dozens of hosts using standard tools. In one collaboration with Mozilla, Anthropic’s Claude model found 22 previously unknown Firefox vulnerabilities in two weeks.

Increasingly, attackers are less constrained by skill or time, and more by the inference tokens they can afford.

On the defensive side, most SOCs are still fundamentally operating the same way they did five years ago. The agentic SOC model is the only way to keep pace. That's why we're expanding the Dropzone agent team now. 

Why Does 100% Software Matter?

Every Dropzone AI agent is 100% software. No offshore analysts reviewing escalations behind the scenes. Some vendors use low-cost human analysts to touch up what their AI produces. You could call this "artificial artificial intelligence." And while it does work at a small scale, it doesn't work when you have 10,000 customers. You can't hire your way to consistency, and you can't scale a service that depends on human review for every edge case.

Our approach is different. We build AI agents that execute consistently, with zero variance between the 3 AM shift and the Monday morning shift. Every investigation is fully transparent: every tool queried, every reasoning step exposed, every decision traceable.

The human role in this model is strategic, and it breaks down into three parts:

  • Scope of work. You decide which alert types the agents investigate, which hunts they run, and how frequently. The agents execute; you set the priorities.
  • Authorization. You control what systems agents can access and their level of privilege, whether they can interview users, and when they're allowed to take automated containment actions. 
  • Context. You give agents the knowledge they need about your business, your operations, your environment, and your policies. This tribal knowledge is shared across agents. 

This is how the agentic SOC will execute your strategy at machine scale. 

How Do the New Agents Work Together?

Dropzone is known for our AI SOC Analyst. We selected threat intel analysis and threat hunting as the next disciplines to tackle because of the synergies that the three agents bring when working together. 

Here’s an all-to-common scenario that these agents can solve: A critical zero-day is discovered in an ubiquitous open-source library on Sunday night along with reports that an exploit is in the wild. Normally, you’d arrive on Monday morning to dozens of unread Slack messages asking about your exposure. Are we compromised? Do we see signs of exploitation attempts? What about past exploit attempts before the zero-day vulnerability was announced? 

This is why you need a team of AI agents working round the clock to help you adapt and respond. 

AI Threat Intel Analyst monitors hundreds of threat sources, tracks relevant TTPs and IOCs for your industry, and creates hunt packs for emerging threats. When it detects a new CVE or a trending attacker campaign, it automatically builds a hunt pack containing various behavioral signatures and hands it directly to the AI Threat Hunter.

AI Threat Hunter executes hypothesis-driven, federated threat hunts across your SIEM, EDR, and cloud tools:

  • 250+ pre-built hunt packs, including coverage for every MITRE ATT&CK technique
  • Custom hunting objectives on demand, described in natural language
  • Compresses up to 40 hours of human analyst work into roughly an hour of agent work
  • Vendor-agnostic across Microsoft Sentinel, Splunk ES, CrowdStrike, and any connected platform
The Dropzone AI Threat Hunter automates hypothesis-driven threat hunts using your existing security tools.
The Dropzone AI Threat Hunter automates hypothesis-driven threat hunts using your existing security tools. 

As Andrew Marsh, Director of Information Security at Indiana Farm Bureau Insurance, put it: "Dropzone's AI Threat Hunter performs federated hunts in 1 hour that would take humans up to 40 hours."

These agents work together without anyone telling them to. 

So, getting back to our zero-day vulnerability announced on Sunday night:

  1. AI Threat Intel Analyst detects an emerging threat and builds a hunt pack
  2. AI Threat Hunter runs the hunt across your entire stack
  3. AI SOC Analyst investigates unexplainable anomalies found in your environment and delivers a complete report
  4. Monday morning, your team walks in to a finished hunt report with findings, evidence, and recommended actions

No human initiated any of that. You gave the agents the scope of work and the authorization and they did the rest. That closed loop is the real differentiator. In the agentic SOC, agents autonomously task each other, share context, and compound capability as the team grows. 

FAQs

What is Dropzone AI's vision for the Agentic SOC?
The agentic SOC is a model where specialized AI agents collaborate across the full spectrum of detection and response. We're building a team of agents that investigate alerts, hunt threats, and operationalize intelligence, all 100% software. Each new agent extends the team's capability within the same collaboration framework. The goal: execute your human strategy at machine scale.
How is Dropzone AI different from competitors using human-augmented AI?
We're 100% software with no hidden humans in the investigation path. Some vendors use offshore analysts to verify AI outputs, which limits scalability and consistency. Our AI agents execute with zero variance, 24/7. Every investigation is fully transparent, with a complete audit trail of every decision, tool query, and reasoning step.
When will AI Threat Hunter and AI Threat Intel Analyst be available?
Both agents will be generally available in Summer 2026. AI Threat Hunter executes hypothesis-driven hunts across your SIEM, EDR, and cloud tools, compressing what would take humans up to 40 hours into roughly an hour. AI Threat Intel Analyst monitors threat sources and autonomously creates hunt packs for emerging threats.
How will the agentic SOC model change security operations?
The agentic SOC model shifts analyst work from reactive triage to strategic oversight. Instead of investigating every alert manually, your team directs AI agents that handle investigation, hunting, and intelligence at machine scale. As more agents join the team, each one compounds the capability of the others. The result is a SOC that scales with software, not headcount.
A man wearing glasses and a blue shirt.
Edward Wu
Founder + CEO

Edward is an AI/ML tech leader and has built and commercialized cutting-edge AI products end-to-end from scratch. He is also an expert in applied AI/ML for cybersecurity and next-gen cyber defense, including behavioral attack detection, automated security operation, network/application monitoring, and cloud workload security. Edward holds over 30 patents in ML and cybersecurity and is a contributor to the MITRE ATT&CK framework. He previously worked on attack detection using wire data at ExtraHop Networks, and automated binary analysis and software defenses at University of Washington Seattle and UC Berkeley.

Self-Guided Demo

Test drive our hands-on interactive environment. Experience our AI SOC analyst autonomously investigate security alerts in real-time, just as it would in your SOC.
Self-Guided Demo
A screenshot of a dashboard with a purple background and the words "Dropzone AI" in the top left corner.