The Threat Hunting Reference Model Part 2: The Hunting Loop