Design of Cyber Threat Hunting Games: A Case Study