Threat hunting is an effective way of searching out persistent and stealthy adversaries on your network. Once you have an established SOC programme and good incident response processes in place, this could be the next logical step to improving your security posture. Ideally, you should be able to leverage the tools you already have deployed as a platform for threat hunting.
It's a bit of a cliche, but nonetheless true - security is a journey, and while threat hunting is not the place you should start, it's an important part of a maturing security programme.
If you haven't implemented a cyber threat hunting capability yet, 2018 is the time to start. Anyone who has paid attention to recent data breaches will know that attackers have become dangerously good at breaking into and hiding on enterprise networks for long periods of time. Often organisations do not realise they have been breached for months, and in some cases years, after an initial intrusion and even then only when informed of it by a third party.