Academy

Module 7 Β· Threat Hunting Workflow πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 19, 2026
3 min read

Threat hunting is proactive β€” actively searching for adversary activity that automated detection missed. Unlike SOC triage (reactive, works from alerts), hunting starts with a hypothesis and tests it against available data. This module covers the workflow, the hypothesis-driven method, and practical queries to start hunting tonight.

Why hunt

  • Automated detections catch KNOWN patterns; hunts find novel/unknown
  • Hunting surfaces detection gaps β€” feedback loop improves detection
  • APT groups dwell for months; hunting shortens dwell time
  • Proactive discipline aligned with MITRE ATT&CK

The hypothesis-driven workflow

  1. Form hypothesis β€” a specific, testable statement. “Attackers are persisting via scheduled tasks in our fleet”
  2. Identify data sources β€” where evidence would live if hypothesis is true
  3. Query β€” write SIEM / EDR queries to surface matching events
  4. Triage results β€” differentiate benign from suspicious
  5. Escalate or close β€” real finding β†’ incident; false β†’ document hypothesis tested
  6. Feedback β€” if hypothesis was good but data was missing, improve logging. If hypothesis produced many false positives, refine future queries.

Hunt pyramid (Sqrrl)

Pyramid of hunt maturity:

  1. Hash indicators β€” trivial to match, trivial for attacker to change
  2. IP addresses β€” simple, easy to rotate
  3. Domain names β€” moderate effort to change
  4. Network / host artifacts β€” specific tool signatures
  5. Tools β€” attackers use finite tools; detect tool usage patterns
  6. TTPs (Tactics, Techniques, Procedures) β€” most difficult for attacker to change; most valuable for defenders

Mature hunts target the top of the pyramid β€” TTPs. Hunts for “svchost.exe with unusual parent process” find adversary behaviour regardless of specific tool.

πŸ” Intermediate Module Β· Basic Tier

Continue reading with Basic tier (β‚Ή499/month)

You've read 60% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.

99+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn