If you've done a good job building bridges and relationships for your incident response center or SOC, you will receive intelligence/indicators of compromise from time to time. Once you receive them, what do you do with them? If you search back in your logs a few weeks or months to see if you've got any hits, that's a good start. But what if an attack hits tomorrow, after you've already run your search and (likely) "discarded" that intelligence?
That's where a robust intelligence analysis function and process can help. Joining information sharing groups, purchasing intelligence from vendors, working collaboratively with peer organizations, and building bridges and trusted relationships can all net you decent intelligence. Once you collect it, it should be vetted. In other words, given the context (which is extremely important) of a particular piece of intelligence (e.g., is it a payload delivery site, C2 site, malicious email sender, etc.), is it reliable as an indicator of compromise? Does it produce a large number of false positives, or is the noise relatively tame (making it more useful/reliable as an indicator of compromise)?
Once an indicator has been vetted and deemed reliable, it should be retained. I've seen a number of organizations use some sort of an intelligence repository to retain the vetted, reliable, high fidelity, actionable intelligence they have. Once it's retained, of course, it should be fully leveraged. This includes writing alerts to check the intelligence repository regularly and run the data against recent logging.
I'm sure that this sounds conceptually simple, but it's amazing how many organizations don't properly retain and leverage the intelligence they receive. Take a look within your own organization -- if you can better retain and leverage intelligence, it will serve you well in the long run!