Cyber Threat Hunter

Cybersecurity is the practice of protecting systems and data from attacks. Often used

situationally, the term cybersecurity can be extended to protect a range from individual attacks to

attacks on government infrastructure. Morten Bay (2016) found in his research that

cybersecurity, as a concept, incorporates theory from philosophy and sociology to create a

multifaceted approach to the protection of assets. One job within the cybersecurity field that

depends on social science is that of a cyber threat hunter. Cyber threat hunters proactively search

across all aspects of a system to hunt for malicious or suspicious activities that evade detection

by existing tools (Delaney 2025). By combining social science and cybersecurity practices, cyber

threat hunters can identify and neutralize potential risks.

Cyber threat hunters use behavioral analysis, social network analysis, and cognitive

psychology in their quest to root out malicious or suspicious activity. Behavioral analysis allows

cyber threat hunters to analyze the behavior of hackers and malicious actors. Understanding the

motives can lead to the discovery of patterns that distinguish regular network activity from signs

of an attack. Social network analysis examines the relationships among individuals or groups

within cybercriminal organizations. These relationships can identify how threat actors

collaborate and recruit members. Lastly, cyber threat hunters rely on principles from cognitive

psychology, studying how people make decisions and perceive risk. By understanding cognitive

biases such as overconfidence and confirmation bias, cyber threat hunters can train an

organization’s employees to recognize social engineering attempts, thereby strengthening the

human firewall (Klimburg-Witjes & Wentland, 2021).

While the main work of cyber threat hunters is protecting systems, assets, and

information, it also affects marginalized groups. Many cyber attacks target vulnerable

populations. Low income communities, minorities, the elderly, and LGBTQ+ individuals are

often targeted through social engineering and other scams. Cyber threat hunters stop the

proliferation of such scams, thereby protecting those who may not have the knowledge and

resources to defend themselves. However, cyber threat hunters can also pose privacy risks to

marginalized groups as their work can be seen as a form of digital surveillance, especially when

done by the government or other organizations without transparency. There is a need for ethical

guidelines to ensure threat hunting does not cross the line into unintentionally violating privacy

rights.

Cyber threat hunters affect society by protecting the digital infrastructure that plays a

large role in the day to day lives of many people. Cyber threat hunters identify and neutralize

threats before they cause harm, helping the public maintain trust in digital systems ranging from

personal communication to more sensitive sectors such as healthcare or banking (Carley, 2020).

The field of cyber threat hunting raises ethical questions about privacy and surveillance, which in

turn influence corporate policies and laws. Cyber threat hunters apply social science ethics to

ensure that cybersecurity practices respect civil liberties while still maintaining safety (Yan,

2022).

In conclusion, cyber threat hunters combine social sciences and cybersecurity practices to

identify and neutralize potential risks. The job is deeply rooted in social sciences, applying

principles of behavioral analysis, social network analysis, and cognitive psychology to

understand the human side of cyber risk and root out malicious or suspicious activity. Their work

protects marginalized groups such as low income communities, minorities, the elderly, and

LGBTQ+ individuals by stopping the spread of social engineering and scams. It also raises

ethical questions related to privacy and surveillance. Cyber threat hunters also impact society by

maintaining public trust through their work, protecting digital infrastructure, and influencing

corporate policies and laws. Cyber threat hunters combine technical expertise with social

sciences to shape a cybersecurity landscape that is not only more secure but also more in tune

with its human side.

References

Bay, M. (2016, June). What is cybersecurity? In search of an encompassing definition for the

post-Snowden era.

Computational and

Carley, K. M. (2020). Social cybersecurity: an emerging science. Mathematical Organization Theory26(4), 365–381. https://doi.org/10.1007/s10588-020-09322-9

Delaney, R. (2025, May 28). What Is Cyber Threat Hunting? Trellix.com.

Klimburg-Witjes, N., & Wentland, A. (2021). Hacking Humans? Social Engineering and the

Construction of the “Deficient User” in Cybersecurity Discourses. Science, Technology,

& Human Values46(6), 1316–1339. https://doi.org/10.1177/0162243921992844

Yan, Z. (2022). The Dual Foundation of Cybersecurity Legislation. Social Sciences in

China43(3), 4–20. https://doi.org/10.1080/02529203.2022.2093065

Leave a Reply

Your email address will not be published. Required fields are marked *