Statements (23)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Company
|
gptkbp:analyzes |
Security incidents
Anomalous activities |
gptkbp:canBe |
Internal or external resources
Open-source_intelligence_(OSINT) |
gptkbp:collaboratedWith |
Incident response teams
|
gptkbp:conducts |
Threat assessments
|
gptkbp:createdBy |
Detection rules
|
gptkbp:developer |
Hunting hypotheses
|
gptkbp:employs |
Behavioral analysis
|
gptkbp:focusesOn |
Identifying and mitigating cyber threats
|
https://www.w3.org/2000/01/rdf-schema#label |
Threat Hunters
|
gptkbp:investmentFocus |
Machine learning tools
|
gptkbp:is_used_in |
Forensic_analysts
|
gptkbp:monitors |
Network traffic
|
gptkbp:participatedIn |
Threat hunting exercises
|
gptkbp:reportsTo |
Findings and recommendations
|
gptkbp:requires |
Strong analytical skills
Knowledge of attack vectors |
gptkbp:training |
Cyber threat frameworks
|
gptkbp:uses |
Advanced analytics
|
gptkbp:utilizes |
Threat intelligence
|
gptkbp:worksWith |
Security operations teams
|