No, they are not part of the same pipeline for the reasons I explain in this article. They certainly can work together and benefit from each other. There are many functions within information security that share many characteristics with threat hunting but teams with good processes in place know where each of their responsibilities start and where they end.