Hunters

Click to visit website
About
Hunters is an AI-driven Next-Generation Security Information and Event Management (SIEM) platform designed to automate many of the repetitive tasks in security operations. It functions as a centralized SOC platform that ingests data from across an organization's entire infrastructure—including cloud providers, identity systems, and endpoint security tools—to provide a unified view of potential threats. Unlike traditional SIEM systems that often require significant manual effort for detection engineering and constant alert tuning, Hunters provides pre-built detections managed by an internal research team called Team Axon. By utilizing AI and automation, the platform correlates disparate signals into contextual "attack stories," aiming to reduce the noise and fatigue common in high-volume security environments. The functionality of the platform centers on its automated triage and investigation capabilities. It uses AI to perform continuous scoring, enrichment, and correlation, allowing analysts to examine multiple alerts simultaneously. Specific tools within the platform, such as Pathfinder AI and graph-based attack stories, help security personnel understand the progression of a potential threat, from the initial point of entry to subsequent lateral movements. This automated approach is designed to help smaller security operations (SecOps) teams maintain comprehensive threat coverage without requiring a large staff or specialized internal expertise in detection logic. Hunters is optimized for organizations that use modern data lakes, offering deep integrations and specific configurations for platforms like Snowflake and AWS. It serves a variety of roles, from mid-sized companies with limited security resources to larger enterprises seeking to replace legacy SIEM systems that may be overly complex or expensive. Managed Security Service Providers (MSSPs) also employ Hunters to facilitate automated detection and response for their clients. By transitioning from manual log management to automated threat identification and investigation, the platform acts as a force multiplier for a company's existing security stack. A key distinction of Hunters compared to traditional SIEM solutions is its "out-of-the-box" implementation and its transparent pricing models. Instead of the unpredictable costs of ingestion-based pricing, Hunters provides options based on either data volume or entity count. Additionally, the involvement of Team Axon—who manages and tunes detection logic on behalf of the user—removes much of the maintenance burden. The platform’s capability to transform raw security data into prioritized and investigated incidents makes it a functional option for teams working toward an autonomous security operations center.
Pros & Cons
Includes pre-built detections managed and tuned by Team Axon to eliminate manual detection engineering.
Correlates data 24/7 using AI to automatically generate contextual attack stories.
Offers flexible pricing models based on either ingestion volume or entity count.
Integrates directly with OCSF security data lakes like Snowflake and AWS.
Recognized as a leader in SIEM and Autonomous SOC solutions by GigaOm analyst reports.
The Essential plan is limited to only 90 days of data retention.
Advanced AI investigation and explainability features are not available on the entry-level Essential plan.
The Essential plan is restricted to business hours support and does not include 24x7 coverage.
The entry-level plan supports a maximum of only 5 users, which may limit growing teams.
Use Cases
Small SecOps teams can use Hunters to automate alert triage and investigation, allowing a few analysts to handle the workload of a larger SOC.
Enterprises looking to replace legacy SIEMs can leverage Hunters' pre-built detectors and data lake integrations to reduce management overhead.
MSSPs can utilize the multi-tenant deployment and automated response features to efficiently manage security for multiple clients simultaneously.
Platform
Task
Features
• ai-powered triage
• response automation
• pathfinder ai
• managed detectors
• ocsf data lake integration
• ueba models
• graph-based attack stories
• automated detection
FAQs
What is the difference between Hunters and a traditional SIEM?
Traditional SIEMs often require significant manual effort for detection engineering and alert tuning. Hunters provides pre-built detections managed by Team Axon and uses AI to automate triage and investigation, acting as a force multiplier for smaller teams.
How does Hunters handle data ingestion and storage?
Hunters supports various ingestion methods, including self-serve and custom ingestion, and integrates deeply with OCSF security data lakes like Snowflake and AWS. Depending on the plan, data can be hosted by Hunters or through partner connections.
What is Pathfinder AI?
Pathfinder AI is Hunters' agentic and co-pilot AI solution designed to supercharge security teams during investigation. It assists in complex tasks by providing automated enrichment and explainability, helping analysts understand the full context of potential threats.
Is there a limit to how many users can access the platform?
User limits depend on the selected plan level, ranging from small teams to enterprise-scale environments. The Essential plan supports 5 users, the Complete plan supports up to 25 users, and the Complete XL plan allows for an unlimited number of users.
Pricing Plans
Essential
Unknown Price• 90 days data retention
• 50 Managed Detectors
• 10-minute detector interval
• 3-day general search window
• Unified SOC Queue
• Support for 5 users
• Business hours support
• OOTB Integration Library
• Self-serve ingestion
• Hunters Hosted storage
Complete
Unknown Price• 1 year+ data retention
• 250 Managed Detectors
• 5-minute detector interval
• AI-powered investigation
• Graph-based attack stories
• Support for 25 users
• 24x7 Support
• Named CSM availability
• UEBA Models
• 1-month search window
Complete XL
Unknown Price• 1 year+ data retention
• Unlimited Managed Detectors
• 1-minute detector interval
• 3-month search window
• Unlimited users
• 24x7 Support
• Axon Security Expert access
• Response Automation
• AI JIT Playbooks
• Multi-tenant deployment
Job Opportunities
Security Researcher
Streamline security operations with AI-powered detection and automated investigation, enabling small SecOps teams to identify and respond to threats faster.
Experience Requirements:
A background of at least 5 years in defensive and/or offensive Cyber Security
Other Requirements:
Red Teaming / Penetration Testing
Blue Teaming / Threat Hunting
OS internals and Windows domain environments
Cloud technologies such as AWS, Microsoft Azure and GCP
Experience with Python, SQL or similar data analysis capabilities
Responsibilities:
Threat Analysis and Research: Dive deep into terabytes of data to identify new attack vectors
Incident Investigation: Utilize technical prowess to investigate complex security incidents
False Positive Reduction: Leverage expertise in data analysis to fine-tune detection rules
Thought Leadership and Community Engagement: Drive thought leadership initiatives through technical blog posts
Work closely with Hunters customers regarding cyber security investigations
Show more details
Technical Account Manager - Portugal
Streamline security operations with AI-powered detection and automated investigation, enabling small SecOps teams to identify and respond to threats faster.
Benefits:
Competitive pay with equity in a growth startup
A generous PTO package that emphasizes a work-life balance
Swag that makes sure you can represent and make your friends jealous
Employee Referral Bonus
Experience Requirements:
At least 3 years of experience in a cyber-security-oriented customer-facing technical role
Other Requirements:
Experience with cyber security products (Network, Endpoint, and Cloud security)
Experience with endpoint and server operating systems (Linux, Windows, MacOs)
Experience with SQL and relational databases
Strong written and verbal communication skills
Presentation skills, Self-motivated, and independent
Responsibilities:
Plan, organize, and execute customer onboarding process post-sale
Build customer relationships & serve as technical lead on accounts
Understand customers’ business goals/challenges to provide tailored technical solutions
Manage implementation of technical solutions throughout customer lifecycle
Develop deep understanding of Hunters’ products and technical aspects of implementation
Show more details
Technical Account Manager - US
Streamline security operations with AI-powered detection and automated investigation, enabling small SecOps teams to identify and respond to threats faster.
Benefits:
Competitive pay with equity in a growing startup
A generous PTO package that emphasizes a work-life balance
Robust health, dental, and vision plans
401k with a company match!
Swag that makes sure you can represent and make your friends jealous
Experience Requirements:
At least 3 years of experience in a cyber-security-oriented customer-facing technical role
Other Requirements:
Experience with cyber security products (Network, Endpoint, and Cloud security)
Experience with endpoint and server operating systems (Linux, Windows, MacOs)
Experience with SQL and relational databases
Strong written and verbal communication skills
Presentation skills, Self-motivated, and independent
Responsibilities:
Plan, organize, and execute customer onboarding process post-sale
Build customer relationships & serve as technical lead on accounts
Understand customers’ business goals/challenges to provide tailored technical solutions
Manage implementation of technical solutions throughout customer lifecycle
Develop deep understanding of Hunters’ products and technical aspects of implementation
Show more details
Ratings & Reviews
No ratings available yet. Be the first to rate this tool!
Alternatives
Tagmata
Tagmata is a cybersecurity company offering Red Team operations, vulnerability assessments, and incident response services. They focus on integrating cyber tactics for business and brand risk reduction.
View Detailsreactions.ai
Protect sensitive organizational data and monitor employee performance using AI-driven behavioral analytics and deep learning to identify insider threats.
View DetailsNML Project
Protect networks from evolving cyber threats using deep learning and big data analysis to automate incident detection and assist security administrators.
View DetailsHyperSpectral
Detect invisible threats and contaminants in real-time with AI-powered spectral data analysis for healthcare diagnostics, food safety, and industrial quality.
View DetailsLogpoint
Protect enterprise assets with a sovereign-ready SecOps platform that integrates SIEM, SOAR, and NDR to automate threat detection and response without data-volume costs.
View DetailsROC
Protect communities and secure digital identities with NIST-ranked multimodal biometrics and real-time video intelligence designed for defense and FinTech.
View DetailsSeeTrue
Increase security throughput and accuracy for airports and seaports by automating prohibited item detection in X-ray and CT scans using AI technology.
View DetailsSkylark Labs
Automate threat detection and facility security with self-learning AI that enables machines to think independently and adapt in real-time for defense and safety.
View DetailsMixMode
Stop advanced cyberattacks in real-time with self-learning AI that helps enterprise security teams detect unknown threats without needing historical data.
View DetailsAlpha Mountain AI
Alpha Mountain AI offers threat intelligence APIs, feeds, and tools like threatYeti for visualizing host risks and a9 Web Protection browser extension for stronger cybersecurity.
View DetailshCaptcha
Block bot attacks and human fraud while maintaining strict user privacy with a compliant, low-friction security platform designed for global enterprises and apps.
View DetailsAmbient.ai
Transform reactive video monitoring into proactive prevention using AI-powered vision intelligence that detects threats and reduces false alarms in real time.
View DetailsFeatured Tools
adly.news
Connect with engaged niche audiences or monetize your subscriber base through an automated marketplace featuring verified metrics and secure Stripe payments.
View DetailsSalespeak
Provide founder-level sales expertise across web, email, and LLM search with AI agents that learn your product in minutes to capture intent and convert buyers.
View DetailsGPT Image 2
Transform text prompts and reference uploads into high-quality visuals with a streamlined browser-based generator designed for marketing and design workflows.
View DetailsSeedance 2.0
Generate 2K cinematic videos with multi-shot storytelling and synchronized audio in under 60 seconds to transform text or images into professional-grade content.
View DetailsHappy Horse AI
Produce cinematic AI videos with native audio and consistent characters by combining text, images, and clips into beat-synced content for filmmakers and creators.
View DetailsRemoveFrom.Video
Eliminate watermarks, subtitles, and unwanted objects from videos in seconds using AI-powered restoration that maintains high-quality footage and natural textures.
View Details