Skip to main content

Threat Hunting

Definition of Threat Hunting

Ability to proactively and iteratively search through log data to detect and isolate security issues. This requires familiarity with typical log and processing flows and what constitutes abnormal or suspicious behavior. Proficiency in this area entails helping discover security breaches or attempted breaches as early as possible and helping tune and write automated alerts based on known malicious behavior.

Assistant / Associate:

Analysis of automated alerts
Analysis of manual threat hunting or other intel data
Raise observations as potential threats

Senior Associate / Professional:

Validation of threat observations as actual incidents or false positives
Creation and updates to automated alerting and security monitoring dashboards

Senior Professional / Principal:

Integration of new log sources and data types
Works with security engineering to improve visibility and reduce detection time of new incidents

How to Develop Threat Hunting

Training Courses:

· SANS SEC511 – Continuous Monitoring and Security Operations

· SANS FOR572 – Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response

Online Videos:

· https://www.youtube.com/watch?v=dYoYMsJ5aIc

· https://www.slideshare.net/RyanKazanciyan/hunting-in-the-dark-htcia-2015-52389487

· https://www.youtube.com/watch?t=1&v=MUUseTJp3jM

Experiences:

· Look at log streams from applications or systems you have access to and consider how the patterns in those logs might change if the application or system was under attack or had been breached.

How to Demonstrate Threat Hunting

DO:Describe what you did in completing / achieving your development plan

· Spend time looking through log data, typically in a log correlation engine like Humio or ELK.

· Look for abnormal traffic patterns or signs of attach or breach

ASSESS:Share, if applicable, any assessments that were taken / provided related to your activities

· Review trends in incidents over time

· Examine time spent performing work for customers vs other activities

· Review customer feedback and share insights with your team

LEARN:Explain what you felt that you were able to learn during your journey / experiences

· Study best practices for threat hunting in different types of data

· Observe customer-facing processes in other university departments

· Describe how the mission/vision of your department contributes to customer satisfaction

APPLY:Give specifics examples where you have / plan to make direct application to your work

· Share how you might streamline the threat hunting process.

· Create procedures and documentation for others to follow to use with the same log/intel log streams in the future.

REFLECT:Review / consider things you would have done differently had you had this experience earlier

· What types of threats will you watch most closely for?

· How does learning more change your view of threat hunting?