Threat Hunters & Security Analysts: A Dynamic Duo

Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.

Rick Costanzo, CEO, RANK Software

October 12, 2018

4 Min Read
Dark Reading logo in a gray background | Dark Reading

Take a look at the job listings on LinkedIn, Indeed, or any of the major sites, and you'll find hundreds of openings for threat hunters, something you wouldn't have seen just a few years ago. Many of these listings are from big banks, global telecoms, and defense contractors, institutions where data security is of primary importance and signaling others will follow.

As the pace, scale and harm-quotient of cyberthreats continue to grow, companies will increasingly shift thinking and resources to finding attackers before they cause problems. Clearly, the typical breach scenario — where internal teams discover an attack has taken place well after the fact, and then go into damage control — is frustrating for security professionals, customers, and shareholders. If you consider that the dollar amount of damage caused by a data breach is typically about commensurate with the cost of bad publicity resulting from the attack, having your CEO making a public mea culpa is neither a good strategy or investment.  

As a result of this changing dynamic, companies are hiring threat hunters to work alongside security analysts to create a continuum of protection — some on the offense, digging for vulnerabilities, others playing defense, protecting assets and patching holes.

Threat Hunter vs. Security Analyst
Threat hunters are, first of all, experienced security analysts. Because the role is to anticipate problems, it's critical for candidates to have a history of dealing with ransomware, phishing schemes, and cryptojacking. Good threat hunters, who are born from security analysts, maintain their education, and keep close watch on cybersecurity information and research, such as the nonprofit, federally funded research and development centers, known as MITRE, which include cybersecurity among its specialties. 

Successful threat hunters also must have a broad knowledge of network topology in order to assemble disparate signals into comprehensive views. Combined with a hacker's curiosity, threat hunters are armed to take educated hunches and explore the internal network, within the perimeter, to look for weaknesses and anomalies.

Threat-hunting teams, like hackers, undertake exploratory missions of their networks. They proactively look for specific malware intrusions as they are produced, maintain a steady eye on their organizations most sensitive data silos, and routinely patrol those areas of the network. They also develop a sixth sense for what is normal behavior at endpoints, the better to question subtle changes.

Threat hunters' analytical and technical expertise is complemented by other skill sets, like persuasive communication. Threat hunters often find themselves explaining the hypothetical to stakeholders who may still be stuck in a mindset of dealing with cyberattacks after they happen. That's in contrast to traditional cybersecurity analysts, who are tilted toward intrusion analysis, digital forensics, damage control, and repair. One role complements the other.

A Brave New World
Threat hunters thrive in places where top management understands the flip side of convenience. For example, cloud-based systems and connected devices are great for employees, contractors, and partners to communicate and share information. But this also creates porosity — or holes. The threat landscape is further complicated by today's more sophisticated breed of hacker who is profit-driven and, in some cases, handsomely paid by hostile governments, a trend we expect to accelerate in the next 24 months as the scale, complexity, and persistence of today's modern cyber threats increases. Organizationally, this means that security operations center teams will place a greater focus on dedicated threat hunting.

Furthermore, as part of the threat hunters' new role in identifying bad actors while they are still in reconnaissance mode, they need to write rules to map and detect TTPs (tactics, techniques, and procedures) that will identify who their adversaries are. From malicious pranksters to nation-sponsored attackers, threat hunters can spot emerging problems by knowing and continually mapping their favored TTPs.

The bottom line: Organizations need to adopt an aggressive, threat-hunting posture to compete with the proliferating threat universe. No longer is it sufficient to rely solely on incident-response teams that are already stretched thin and approaching problems after the fact. Threat hunters fight spying with spying, which will bring the proactive mindset of network reconnaissance and repair to protect an enterprise's vital data assets.

Related Content:

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

About the Author

Rick Costanzo

CEO, RANK Software

Rick Costanzo is an executive who has stoked a start-up mentality at some of the world's biggest companies, and a leader bringing new technologies from the theoretical to practical, everyday use.

As CEO of RANK Software, Rick helps companies with one of the most critical challenges of business today: handling the unpredictable, unrelenting pace of cybersecurity. As the scale of data—and threats—continue to grow, companies must determine bad actors from false positives in real-time. RANK Software is pioneering the use of machine learning, including intuitive, deep learning, to find the anomalies among the billion-plus events some companies receive each day.  Rick is well-versed in the world of cybersecurity, and dedicated to helping enterprises remain secure and threat-free.

Rick has held a series of senior leadership roles that put him at the forefront of major technological change at some of the world's biggest companies. As Executive Vice President of Global Sales and Regional Marketing at BlackBerry, Rick introduced the smartphone maker to Europe. Within three years, he grew the business in the European market from virtually nothing to $1 billion in sales. BlackBerry then had him do it again for the Latin American market, with similar, high-growth success.

As an executive vice president and general manager at global software giant, SAP, Rick was tasked with turning around a newly acquired enterprise-mobility-software business. Rick steered SAP toward implementing cost-efficient cloud-based solutions, taking the desktop-focused SAP to a new way of nimble thinking, where people access office systems from their smartphones.

Through Rick's vision heading Kodak Alaris Information Management, a global imaging company, he quickly refocused the company from declining core markets toward ambitious, new growth opportunities. Rick helped the company leverage important yet underutilized intellectual property into high growth business in the emerging field of image recognition.

A native of Canada and graduate of the University of Toronto, Rick holds a bachelor of arts degree, with honors. He traces his affinity for technology back to his early teenage years. Growing up in Stratford, Ontario, , Rick worked from the age of 14 through university  as a network operator supporting the mainframe computing infrastructure of one of Canada's largest financial institutions.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights