As a Threat Intelligence Analyst at Abnormal Security, you will perform threat hunting in Cloud/SaaS environments, analyze large datasets for cloud-based email threats, and collaborate with R&D teams to enhance security measures against phishing and account takeovers.
About the Role
Abnormal Security is looking for a Threat Intelligence Analyst with expertise in threat hunting, detection engineering, and operational intelligence to combat cloud-based phishing attacks, account takeovers (ATO), and business email compromise (BEC). In this role, you will perform threat hunts in Cloud/SaaS environments, extract actionable intelligence, and collaborate with R&D and Engineering teams to enhance security detections and counter evolving adversary tactics.
Who you are
- Deeply experienced in Threat Intelligence & Threat Hunting, with a focus on Cloud/SaaS threats.
- Strong understanding of phishing, cloud-native threats, and adversary TTPs targeting identity and email security.
- Data-driven mindset, with experience analyzing large datasets using SQL, PySpark, and other query-based analysis tools.
- Skilled at bridging threat intelligence with engineering teams, ensuring insights translate into effective security controls.
- Comfortable working in agile, cross-functional teams, driving threat research into practical security improvements.
- Proven ability to present complex technical concepts to both technical and non-technical audiences.
- Results-driven, highly collaborative, self-motivated, and adaptable in fast-paced environments.
What you will doThreat Hunting & Threat Intelligence
- Perform threat hunting and investigative research in Cloud/SaaS environments, focusing on email security, phishing, and account takeovers.
- Identify MFA bypass techniques, phishing infrastructure, and cloud-native attack methods targeting enterprise SaaS environments.
- Fuse internal telemetry, OSINT, and third-party intelligence sources to uncover and disrupt evolving threat actor campaigns.
- Develop threat models and attack hypotheses to identify new cloud-focused attack vectors.
- Conduct incident triage and investigative support for escalated incidents, providing internal teams with expertise on threat actors’ tools, techniques, and procedures (TTPs).
Detection Engineering
- Collaborate with R&D and Engineering teams to translate threat intelligence into scalable detections and mitigations.
- Design and refine cloud threat detection logic, hunting queries, and behavioral analytics to identify attacker activity.
- Analyze phishing toolkits, adversary infrastructure, and cloud-native attack methodologies to enhance proactive defenses.
- Work with product security teams to improve email security and identity protection mechanisms in Cloud/SaaS platforms.
Security Research
- Track and analyze threat actor groups, phishing campaigns, and cloud-based attack methodologies.
- Provide technical intelligence briefings to R&D and Engineering teams to inform security product improvements.
- Partner with internal stakeholders to evaluate emerging threats and recommend security enhancements for SaaS environments.
Must Haves
- Deep Expertise: 5+ years in cyber threat intelligence, threat hunting, or security research.
- 3+ years of experience in threat hunting and threat research within cloud ecosystems.
- Expertise in cloud security, SaaS-based attacks, and email security threats (ATO, BEC, phishing, MFA bypass, etc.).
- Strong data analysis skills with experience using SQL, PySpark, or other query languages to investigate large-scale threats.
- Deep understanding of MITRE ATT&CK, phishing tactics, and adversary infrastructure analysis.
- Hands-on experience with email security platforms, cloud threat analytics, and security automation
- Collaborative Mindset: Ability to work cross-functionally with other departments such as R&D, Engineering, and Operations to achieve comprehensive cybersecurity coverage.
Nice to Have
- Security certifications (GCTI, GCFA, CISSP, or similar).
- Experience in security engineering, cloud-native security, or advanced detection development.
- Background in threat modeling, adversary emulation, or attacker TTP analysis.
- Experience working in high-scale SaaS environments, analyzing large security datasets.
#LI-LB3
Top Skills
Cloud Security
Email Security Platforms
Mitre Att&Ck
Pyspark
SQL
Similar Jobs
Cloud • Security • Software • Cybersecurity • Automation
Manage the Security Log Engineering team to enhance security logging, oversee log workflows, and collaborate with cross-functional teams.
Top Skills:
AnsibleAWSCi/CdDevoElasticGCPPythonRubySIEMSplunkTerraform
Artificial Intelligence • Cloud • Information Technology • Machine Learning • Natural Language Processing • Software
The Information Security Compliance Analyst manages compliance with regulations like PCI-DSS and HIPAA, assists with audits, prepares documentation, and leads security investigations.
Top Skills:
Atlassian ProductsEncryption TechnologiesFirewallsHipaaHitrustIntrusion Detection SystemsIso 27001Pci-DssSecurity Monitoring PlatformsSoc 2SplunkVulnerability Assessment Tools
Cloud • eCommerce • Enterprise Web • Information Technology • Software
The Business Consultant will engage with clients to drive adoption of Quantum Metric, analyze data for insights, and provide tailored training to enhance digital experiences while ensuring customer satisfaction and account retention.
Top Skills:
Adobe AnalyticsAdobe TargetCSSGoogle AnalyticsHeapHTMLJavaScriptMaxymiserOptimizelyQuantum MetricTealeaf
What you need to know about the Belfast Tech Scene
If asked to name the birthplace of the RMS Titanic, you might not say Belfast. Similarly, if asked to name Europe's leading destination for foreign direct investment in new software development, Belfast might not come to mind. Yet, both are true. The city has emerged as a tech powerhouse, recently ranked among the best in the U.K. for tech careers — especially for software developers. It also leads the U.K. with the highest percentage of software development jobs advertised.