<ul data-eligibleForWebStory="true">Critical infrastructure, vital for our world, faces growing cyber threats targeting life-sustaining systems.Passive defense strategies are insufficient against sophisticated adversaries.Threat hunters play a crucial role in proactively identifying and thwarting attacks.Key drivers include creativity and precision in threat hunting.Techniques such as Time Drift Detection and Firmware Integrity Validation are deployed.ICS Command Frequency Heatmaps and Out-of-Band Wireless Scanning are used to detect anomalies.USB Device Traps are employed to identify insider threats or malicious activities.Threat hunting in critical infrastructure is a multi-tiered strategy to protect lives.ICS threat hunters are more than technicians - they are strategists and scientists.Global policy should mandate proactive threat detection in infrastructure.Threat hunters face challenges in ICS/OT environments and play a vital role in defending civilization.