Definition
- Mean Time to Detect
- Mean Time to Detect (MTTD) measures the average elapsed time between when a security incident begins and when the SOC identifies it. It is a critical indicator of detection capability and monitoring effectiveness.
How Mean Time to Detect Works
MTTD is calculated by averaging the time difference between incident start (estimated from forensic artifacts or attacker timestamps) and detection time (first alert or analyst identification) across all incidents in a measurement period. Industry benchmarks show average MTTD for confirmed breaches is measured in days to weeks, highlighting significant room for improvement.
Factors that reduce MTTD: comprehensive log collection, well-tuned correlation rules, low false-positive rates, 24/7 monitoring, threat hunting, and rapid threat intelligence integration.
Factors that increase MTTD: log coverage gaps, alert fatigue from high false-positive rates, limited monitoring hours, lack of behavioral detection, and no threat hunting program.
Every minute of MTTD delay translates to additional attacker dwell time and potential impact expansion.
Mean Time to Detect in SOC Operations
Reducing MTTD is a primary SOC operational goal. SOCSimulator tracks response times within scenarios to help you understand personal triage speed benchmarks and identify workflow bottlenecks. Improving MTTD at the individual level, through faster tool proficiency, better false-positive pattern recognition, and efficient investigation playbooks, contributes directly to the team's overall metric.
Practice Mean Time to Detect in a Real SOC
SOCSimulator provides hands-on training with realistic SIEM, XDR, and Firewall interfaces. Build real analyst skills investigating mean time to detect scenarios with zero consequences — free forever.
Related Terms
Security Information and Event Management (SIEM) is a platform that aggregates, normalizes, and corr...
Alert triage is the structured process of reviewing, prioritizing, and investigating security alerts...
In SOC operations, triage is the initial assessment where analysts rapidly evaluate an alert to dete...
Threat hunting is the proactive, human-led process of searching through security telemetry to find h...
Incident response (IR) is the structured process for preparing for, detecting, containing, eradicati...
More Processes Terms
Related SOC Training Resources
SOC Analyst (Tier 1) Career Guide — Salary & Skills
Tier 1 SOC Analysts are the front line. You monitor alert queues, triage incoming detections, classify them as true or f…
Read more Career PathIncident Responder Career Guide — Salary & Skills
Incident Responders lead the technical response when confirmed breaches happen. You coordinate containment, run forensic…
Read more Career PathDFIR Analyst Career Guide — Salary & Skills
DFIR Analysts combine forensic investigation with incident response. You collect and analyze digital evidence from compr…
Read more ComparisonSOCSimulator vs LetsDefend — Comparison
SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…
Read more ComparisonSOCSimulator vs Security Blue Team — Comparison
SOCSimulator provides continuous operational training that keeps your skills sharp between shifts. Security Blue Team pr…
Read more ToolSIEM Training Console — SOCSimulator
The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…
Read more ToolXDR Training Console — SOCSimulator
The XDR console in SOCSimulator replicates the investigation workflow of platforms like CrowdStrike Falcon, Microsoft De…
Read more TechniqueMITRE ATT&CK Techniques — Detection Training Library
Browse all MITRE ATT&CK techniques with detection strategies and example alerts.
Read more Career PathCybersecurity Career Paths — 2026 Guide
Explore SOC analyst career paths with salary data, required skills, and certification roadmaps.
Read more PlaybookSOC Investigation Playbooks — Step-by-Step Guides
Practitioner investigation playbooks with decision trees and real SIEM queries.
Read more FeatureShift Mode — Real-Time SOC Simulation
Practice alert triage under realistic time pressure with SLA timers and noise injection.
Read more FeatureOperations — Guided Training Rooms
Structured CTF-style investigation rooms covering real-world attack scenarios.
Read more