Hunters favicon

Hunters

PaidHiring
Hunters screenshot
Click to visit website
Feature this AI

About

Hunters is an AI-driven Next-Generation Security Information and Event Management (SIEM) platform designed to automate many of the repetitive tasks in security operations. It functions as a centralized SOC platform that ingests data from across an organization's entire infrastructure—including cloud providers, identity systems, and endpoint security tools—to provide a unified view of potential threats. Unlike traditional SIEM systems that often require significant manual effort for detection engineering and constant alert tuning, Hunters provides pre-built detections managed by an internal research team called Team Axon. By utilizing AI and automation, the platform correlates disparate signals into contextual "attack stories," aiming to reduce the noise and fatigue common in high-volume security environments. The functionality of the platform centers on its automated triage and investigation capabilities. It uses AI to perform continuous scoring, enrichment, and correlation, allowing analysts to examine multiple alerts simultaneously. Specific tools within the platform, such as Pathfinder AI and graph-based attack stories, help security personnel understand the progression of a potential threat, from the initial point of entry to subsequent lateral movements. This automated approach is designed to help smaller security operations (SecOps) teams maintain comprehensive threat coverage without requiring a large staff or specialized internal expertise in detection logic. Hunters is optimized for organizations that use modern data lakes, offering deep integrations and specific configurations for platforms like Snowflake and AWS. It serves a variety of roles, from mid-sized companies with limited security resources to larger enterprises seeking to replace legacy SIEM systems that may be overly complex or expensive. Managed Security Service Providers (MSSPs) also employ Hunters to facilitate automated detection and response for their clients. By transitioning from manual log management to automated threat identification and investigation, the platform acts as a force multiplier for a company's existing security stack. A key distinction of Hunters compared to traditional SIEM solutions is its "out-of-the-box" implementation and its transparent pricing models. Instead of the unpredictable costs of ingestion-based pricing, Hunters provides options based on either data volume or entity count. Additionally, the involvement of Team Axon—who manages and tunes detection logic on behalf of the user—removes much of the maintenance burden. The platform’s capability to transform raw security data into prioritized and investigated incidents makes it a functional option for teams working toward an autonomous security operations center.

Pros & Cons

Includes pre-built detections managed and tuned by Team Axon to eliminate manual detection engineering.

Correlates data 24/7 using AI to automatically generate contextual attack stories.

Offers flexible pricing models based on either ingestion volume or entity count.

Integrates directly with OCSF security data lakes like Snowflake and AWS.

Recognized as a leader in SIEM and Autonomous SOC solutions by GigaOm analyst reports.

The Essential plan is limited to only 90 days of data retention.

Advanced AI investigation and explainability features are not available on the entry-level Essential plan.

The Essential plan is restricted to business hours support and does not include 24x7 coverage.

The entry-level plan supports a maximum of only 5 users, which may limit growing teams.

Use Cases

Small SecOps teams can use Hunters to automate alert triage and investigation, allowing a few analysts to handle the workload of a larger SOC.

Enterprises looking to replace legacy SIEMs can leverage Hunters' pre-built detectors and data lake integrations to reduce management overhead.

MSSPs can utilize the multi-tenant deployment and automated response features to efficiently manage security for multiple clients simultaneously.

Platform
Web
Task
threat detection

Features

ai-powered triage

response automation

pathfinder ai

managed detectors

ocsf data lake integration

ueba models

graph-based attack stories

automated detection

FAQs

What is the difference between Hunters and a traditional SIEM?

Traditional SIEMs often require significant manual effort for detection engineering and alert tuning. Hunters provides pre-built detections managed by Team Axon and uses AI to automate triage and investigation, acting as a force multiplier for smaller teams.

How does Hunters handle data ingestion and storage?

Hunters supports various ingestion methods, including self-serve and custom ingestion, and integrates deeply with OCSF security data lakes like Snowflake and AWS. Depending on the plan, data can be hosted by Hunters or through partner connections.

What is Pathfinder AI?

Pathfinder AI is Hunters' agentic and co-pilot AI solution designed to supercharge security teams during investigation. It assists in complex tasks by providing automated enrichment and explainability, helping analysts understand the full context of potential threats.

Is there a limit to how many users can access the platform?

User limits depend on the selected plan level, ranging from small teams to enterprise-scale environments. The Essential plan supports 5 users, the Complete plan supports up to 25 users, and the Complete XL plan allows for an unlimited number of users.

Pricing Plans

Essential
Unknown Price

90 days data retention

50 Managed Detectors

10-minute detector interval

3-day general search window

Unified SOC Queue

Support for 5 users

Business hours support

OOTB Integration Library

Self-serve ingestion

Hunters Hosted storage

Complete
Unknown Price

1 year+ data retention

250 Managed Detectors

5-minute detector interval

AI-powered investigation

Graph-based attack stories

Support for 25 users

24x7 Support

Named CSM availability

UEBA Models

1-month search window

Complete XL
Unknown Price

1 year+ data retention

Unlimited Managed Detectors

1-minute detector interval

3-month search window

Unlimited users

24x7 Support

Axon Security Expert access

Response Automation

AI JIT Playbooks

Multi-tenant deployment

Job Opportunities

Hunters favicon
Hunters

Security Researcher

Streamline security operations with AI-powered detection and automated investigation, enabling small SecOps teams to identify and respond to threats faster.

scienceonsiteTel Aviv-Yafo, ILfull-time

Experience Requirements:

  • A background of at least 5 years in defensive and/or offensive Cyber Security

Other Requirements:

  • Red Teaming / Penetration Testing

  • Blue Teaming / Threat Hunting

  • OS internals and Windows domain environments

  • Cloud technologies such as AWS, Microsoft Azure and GCP

  • Experience with Python, SQL or similar data analysis capabilities

Responsibilities:

  • Threat Analysis and Research: Dive deep into terabytes of data to identify new attack vectors

  • Incident Investigation: Utilize technical prowess to investigate complex security incidents

  • False Positive Reduction: Leverage expertise in data analysis to fine-tune detection rules

  • Thought Leadership and Community Engagement: Drive thought leadership initiatives through technical blog posts

  • Work closely with Hunters customers regarding cyber security investigations

Show more details

Technical Account Manager - Portugal

Streamline security operations with AI-powered detection and automated investigation, enabling small SecOps teams to identify and respond to threats faster.

Benefits:

  • Competitive pay with equity in a growth startup

  • A generous PTO package that emphasizes a work-life balance

  • Swag that makes sure you can represent and make your friends jealous

  • Employee Referral Bonus

Experience Requirements:

  • At least 3 years of experience in a cyber-security-oriented customer-facing technical role

Other Requirements:

  • Experience with cyber security products (Network, Endpoint, and Cloud security)

  • Experience with endpoint and server operating systems (Linux, Windows, MacOs)

  • Experience with SQL and relational databases

  • Strong written and verbal communication skills

  • Presentation skills, Self-motivated, and independent

Responsibilities:

  • Plan, organize, and execute customer onboarding process post-sale

  • Build customer relationships & serve as technical lead on accounts

  • Understand customers’ business goals/challenges to provide tailored technical solutions

  • Manage implementation of technical solutions throughout customer lifecycle

  • Develop deep understanding of Hunters’ products and technical aspects of implementation

Show more details

Technical Account Manager - US

Streamline security operations with AI-powered detection and automated investigation, enabling small SecOps teams to identify and respond to threats faster.

Benefits:

  • Competitive pay with equity in a growing startup

  • A generous PTO package that emphasizes a work-life balance

  • Robust health, dental, and vision plans

  • 401k with a company match!

  • Swag that makes sure you can represent and make your friends jealous

Experience Requirements:

  • At least 3 years of experience in a cyber-security-oriented customer-facing technical role

Other Requirements:

  • Experience with cyber security products (Network, Endpoint, and Cloud security)

  • Experience with endpoint and server operating systems (Linux, Windows, MacOs)

  • Experience with SQL and relational databases

  • Strong written and verbal communication skills

  • Presentation skills, Self-motivated, and independent

Responsibilities:

  • Plan, organize, and execute customer onboarding process post-sale

  • Build customer relationships & serve as technical lead on accounts

  • Understand customers’ business goals/challenges to provide tailored technical solutions

  • Manage implementation of technical solutions throughout customer lifecycle

  • Develop deep understanding of Hunters’ products and technical aspects of implementation

Show more details

Explore AI Career Opportunities

Social Media

Ratings & Reviews

No ratings available yet. Be the first to rate this tool!

Alternatives

Tagmata favicon
Tagmata

Tagmata is a cybersecurity company offering Red Team operations, vulnerability assessments, and incident response services. They focus on integrating cyber tactics for business and brand risk reduction.

View Details
reactions.ai favicon
reactions.ai

Protect sensitive organizational data and monitor employee performance using AI-driven behavioral analytics and deep learning to identify insider threats.

View Details
NML Project favicon
NML Project

Protect networks from evolving cyber threats using deep learning and big data analysis to automate incident detection and assist security administrators.

View Details
HyperSpectral favicon
HyperSpectral

Detect invisible threats and contaminants in real-time with AI-powered spectral data analysis for healthcare diagnostics, food safety, and industrial quality.

View Details
Logpoint favicon
Logpoint

Protect enterprise assets with a sovereign-ready SecOps platform that integrates SIEM, SOAR, and NDR to automate threat detection and response without data-volume costs.

View Details
ROC favicon
ROC

Protect communities and secure digital identities with NIST-ranked multimodal biometrics and real-time video intelligence designed for defense and FinTech.

View Details
SeeTrue favicon
SeeTrue

Increase security throughput and accuracy for airports and seaports by automating prohibited item detection in X-ray and CT scans using AI technology.

View Details
Skylark Labs favicon
Skylark Labs

Automate threat detection and facility security with self-learning AI that enables machines to think independently and adapt in real-time for defense and safety.

View Details
MixMode favicon
MixMode

Stop advanced cyberattacks in real-time with self-learning AI that helps enterprise security teams detect unknown threats without needing historical data.

View Details
Alpha Mountain AI favicon
Alpha Mountain AI

Alpha Mountain AI offers threat intelligence APIs, feeds, and tools like threatYeti for visualizing host risks and a9 Web Protection browser extension for stronger cybersecurity.

View Details
hCaptcha favicon
hCaptcha

Block bot attacks and human fraud while maintaining strict user privacy with a compliant, low-friction security platform designed for global enterprises and apps.

View Details
Ambient.ai favicon
Ambient.ai

Transform reactive video monitoring into proactive prevention using AI-powered vision intelligence that detects threats and reduces false alarms in real time.

View Details

Featured Tools

adly.news favicon
adly.news

Connect with engaged niche audiences or monetize your subscriber base through an automated marketplace featuring verified metrics and secure Stripe payments.

View Details
Salespeak favicon
Salespeak

Provide founder-level sales expertise across web, email, and LLM search with AI agents that learn your product in minutes to capture intent and convert buyers.

View Details
GPT Image 2 favicon
GPT Image 2

Transform text prompts and reference uploads into high-quality visuals with a streamlined browser-based generator designed for marketing and design workflows.

View Details
Seedance 2.0 favicon
Seedance 2.0

Generate 2K cinematic videos with multi-shot storytelling and synchronized audio in under 60 seconds to transform text or images into professional-grade content.

View Details
Happy Horse AI favicon
Happy Horse AI

Produce cinematic AI videos with native audio and consistent characters by combining text, images, and clips into beat-synced content for filmmakers and creators.

View Details
RemoveFrom.Video favicon
RemoveFrom.Video

Eliminate watermarks, subtitles, and unwanted objects from videos in seconds using AI-powered restoration that maintains high-quality footage and natural textures.

View Details