Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1146

Threat Hunter

What is Threat Hunter?

Threat HunterA senior defender who proactively searches enterprise telemetry for adversary activity that has bypassed existing detections, using hypothesis-driven queries, threat intelligence, and behavioral analytics.


A Threat Hunter is a senior defender who proactively searches for malicious activity that has eluded automated detections. The work is hypothesis-driven: starting from MITRE ATT&CK techniques, threat-intelligence reporting, or anomalies in baselines, the hunter pivots through EDR, SIEM, identity, cloud, and network telemetry to confirm or rule out adversary presence. Hunters partner closely with detection engineers to convert successful hunts into durable detections and with incident responders when a hunt becomes an investigation. The role typically sits inside the SOC or a dedicated cyber-defense group, reporting to a SOC manager or head of detection. Common qualifications include several years of Tier 2/3 SOC or DFIR experience and certifications such as GCFA, GCDA, GCIH, or CRTO.

Examples

  1. 01

    Hunt for living-off-the-land binaries abused by ransomware affiliates across the EDR fleet.

  2. 02

    Search cloud audit logs for unusual cross-account assume-role chains tied to recent Cozy Bear TTPs.

Frequently asked questions

What is Threat Hunter?

A senior defender who proactively searches enterprise telemetry for adversary activity that has bypassed existing detections, using hypothesis-driven queries, threat intelligence, and behavioral analytics. It belongs to the Roles & Careers category of cybersecurity.

What does Threat Hunter mean?

A senior defender who proactively searches enterprise telemetry for adversary activity that has bypassed existing detections, using hypothesis-driven queries, threat intelligence, and behavioral analytics.

How does Threat Hunter work?

A Threat Hunter is a senior defender who proactively searches for malicious activity that has eluded automated detections. The work is hypothesis-driven: starting from MITRE ATT&CK techniques, threat-intelligence reporting, or anomalies in baselines, the hunter pivots through EDR, SIEM, identity, cloud, and network telemetry to confirm or rule out adversary presence. Hunters partner closely with detection engineers to convert successful hunts into durable detections and with incident responders when a hunt becomes an investigation. The role typically sits inside the SOC or a dedicated cyber-defense group, reporting to a SOC manager or head of detection. Common qualifications include several years of Tier 2/3 SOC or DFIR experience and certifications such as GCFA, GCDA, GCIH, or CRTO.

How do you defend against Threat Hunter?

Defences for Threat Hunter typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Threat Hunter?

Common alternative names include: Cyber threat hunter, Adversary hunter.

Related terms