Day in a Life of Threat Hunter
Chapter 01: Security Tools and Basics of Security Analyst
Threat hunting is when cybersecurity experts actively search through networks, computers, and data to find hidden dangers before they become big problems. As the world of cybersecurity gets more complicated with smarter threats, the job of these threat hunters becomes very important. They don’t just wait for attacks to happen; they look for them ahead of time to stop them. Think of threat hunters as the proactive protectors who are always on the lookout, trying to be one step ahead of any possible cyber attacks.
Our story is about Joe, a recent graduate who wants to become a skilled threat hunter in cybersecurity. Fresh from college and full of drive, Joe dives into the challenging yet exciting world of hunting cyber threats. We’ll follow his journey, learning the tricks of the trade, overcoming obstacles, and celebrating his wins. Join us to see how Joe grows from a beginner to an expert in this vital field, making each step an adventure in protecting the digital world.

Scene 1 — Joe’s First Day: Beginning the Journey in Cybersecurity
Joe, who recently finished studying computers science, woke up quickly when his alarm rang. For a moment, he thought he was late for school. But then he smiled, remembering he had finished school and today was special — it was his first day at a new job. Feeling excited, he took a quick shower, ate his breakfast, and made sure he had all the papers his new boss needed. Then, he got into his car, feeling happy and a bit nervous, and drove off to the big building where he would work, ready to start his new journey.
Scene 2 — New Beginnings: Joe’s Orientation Day at the Office
When Joe first saw the big office building where he would work, he felt a wave of excitement wash over him. He thought about all the late nights studying and hard work he had put in during his four years in college. It all felt worth it now. Joe parked his car and walked into the three-story building, his steps quick with anticipation. At the front desk, a friendly face asked why he was there. “I’m here for my orientation day,” Joe said with a smile. The person at the desk nodded and pointed him toward a group of people who were also starting their first day. As Joe walked over, he noticed a large sign that said “Welcome New Hire.” He felt a sense of belonging as he approached and sat down with the others. Suddenly, someone asked if he would stand for a picture. Joe walked over and gave a proud smile, thinking about how this moment was a new beginning full of possibilities.

He then sat down again and started talking to the person next to him, whose name was Garry. They chatted about what departments they were joining. Joe was excited to share that he would be a Security Analyst. Just as they were getting to know each other, an announcement filled the hall. It was time for all the new employees to head to the conference room for a long orientation and training session. After three hours of learning about his new role and what was expected of him, Joe felt ready and eager to see his desk and meet the rest of his team. He knew this was the start of something big, and he couldn’t wait to get started.
Scene 3 — First Steps Up: Joe Meets the Team and Settles In
Cassy, the orientation lead, guided Joe up to the third floor where his new department was located. As he walked, Joe recognized some faces from his interview and waved to them. He hadn’t even reached his team when he heard a warm, welcoming voice. It was his manager, Justin, stepping out of his office to greet him. “Welcome, Joe! We’ve been looking forward to having you join us,” Justin said with a smile. Joe greeted him back, “Hello Sir, how are you?” They exchanged pleasantries, and Justin asked about Joe’s orientation and if he had discovered all the interesting spots in the building. Justin offered to give Joe a personal tour the next day to show him around, which Joe happily accepted.

While they were talking, another person approached them. “Meet David, our team lead,” Justin introduced. David extended his hand, welcoming Joe with enthusiasm. After exchanging greetings, David led Joe to his new desk. “This is your space, Joe. Make it your own, bring in anything that makes you comfortable,” David encouraged, assuring him that they would start training soon. Joe sat down, adjusting his chair, and took in his new workspace — a desk with four monitors and a set-up for his laptop. He placed his bag under the desk and started organizing his things, feeling a mix of excitement and anticipation for what was to come.
Scene 4 — Intro to Cybersecurity: Understanding SOC, PhishER, and Proofpoint”
“Alright, let’s dive into your training,” David began with a friendly nod. “First, we’ll explore how cybersecurity works here and in other companies, including the different teams involved.” He pulled up a chart showing the cybersecurity department’s structure, detailing the specialized teams within.
David explained that the cybersecurity department is made up of sub-teams, each focusing on a specific aspect of security. The Security Operation Center (SOC) is like the frontline, he said. They’re the first to respond to any security issues, coordinating efforts across teams during a cyberattack and constantly hunting for vulnerabilities. A big part of their job is to monitor emails for phishing attempts — tricky emails trying to get sensitive information.

For this, David mentioned two important tools: PhishER and Proofpoint. He described PhishER as a bridge between employees and security teams. Employees can use it to report suspicious emails, which then appear on the security analyst’s dashboard for further investigation. PhishER is also used for conducting fake phishing attacks to test and train employees, making everyone sharper in spotting these threats. David chuckled, recalling some of the humorous templates they’ve used in the past for training.
Proofpoint, on the other hand, acts like a scanner, looking out for malicious emails. David assured Joe that this tool would be particularly useful in his role as a threat hunter, giving him a broad view of email traffic that could be analyzed for threats. He mentioned that integrating this data into a SIEM tool like ELK enhances threat-hunting capabilities by providing a comprehensive dashboard of all the data collected.
Joe, looking a bit overwhelmed, asked about ELK. David reassured him, “Don’t worry, Joe. We’ll get into all the details during your training. Think of ELK as a big board where we display and analyze data from various sources. It’ll make more sense as you learn the ropes.” With a smile, David concluded, “This is just the beginning. There’s a lot to learn, but we’ll take it step by step. You’ll be catching those cyber threats in no time! But that’s it for today. You’ve been bombarded with a lot of information during the orientation, so this is a good point to stop. We’ll continue with the training tomorrow. Take rest and enjoy the rest of your day.”
In Chapter 2, we’ll dive deeper into the different cybersecurity departments and the tools that SOC analysts and threat hunters use every day. It’s a great guide for anyone wanting to learn more about the field of cybersecurity. Thanks for joining us for the first chapter of “The Day in the Life of a Threat Hunter,” and stay tuned as Joe’s journey into becoming a skilled professional continues, offering insights into the exciting world of cybersecurity. For the latest content please follow Secure Nutshell.
Comments
Post a Comment