Threat Hunter: Implications of an Active Cyber Defense