As a Threat Intelligence Analyst at Abnormal Security, you will perform threat hunting in Cloud/SaaS environments, analyze large datasets for cloud-based email threats, and collaborate with R&D teams to enhance security measures against phishing and account takeovers.
About the Role
Abnormal Security is looking for a Threat Intelligence Analyst with expertise in threat hunting, detection engineering, and operational intelligence to combat cloud-based phishing attacks, account takeovers (ATO), and business email compromise (BEC). In this role, you will perform threat hunts in Cloud/SaaS environments, extract actionable intelligence, and collaborate with R&D and Engineering teams to enhance security detections and counter evolving adversary tactics.
Who you are
- Deeply experienced in Threat Intelligence & Threat Hunting, with a focus on Cloud/SaaS threats.
- Strong understanding of phishing, cloud-native threats, and adversary TTPs targeting identity and email security.
- Data-driven mindset, with experience analyzing large datasets using SQL, PySpark, and other query-based analysis tools.
- Skilled at bridging threat intelligence with engineering teams, ensuring insights translate into effective security controls.
- Comfortable working in agile, cross-functional teams, driving threat research into practical security improvements.
- Proven ability to present complex technical concepts to both technical and non-technical audiences.
- Results-driven, highly collaborative, self-motivated, and adaptable in fast-paced environments.
What you will doThreat Hunting & Threat Intelligence
- Perform threat hunting and investigative research in Cloud/SaaS environments, focusing on email security, phishing, and account takeovers.
- Identify MFA bypass techniques, phishing infrastructure, and cloud-native attack methods targeting enterprise SaaS environments.
- Fuse internal telemetry, OSINT, and third-party intelligence sources to uncover and disrupt evolving threat actor campaigns.
- Develop threat models and attack hypotheses to identify new cloud-focused attack vectors.
- Conduct incident triage and investigative support for escalated incidents, providing internal teams with expertise on threat actors’ tools, techniques, and procedures (TTPs).
Detection Engineering
- Collaborate with R&D and Engineering teams to translate threat intelligence into scalable detections and mitigations.
- Design and refine cloud threat detection logic, hunting queries, and behavioral analytics to identify attacker activity.
- Analyze phishing toolkits, adversary infrastructure, and cloud-native attack methodologies to enhance proactive defenses.
- Work with product security teams to improve email security and identity protection mechanisms in Cloud/SaaS platforms.
Security Research
- Track and analyze threat actor groups, phishing campaigns, and cloud-based attack methodologies.
- Provide technical intelligence briefings to R&D and Engineering teams to inform security product improvements.
- Partner with internal stakeholders to evaluate emerging threats and recommend security enhancements for SaaS environments.
Must Haves
- Deep Expertise: 5+ years in cyber threat intelligence, threat hunting, or security research.
- 3+ years of experience in threat hunting and threat research within cloud ecosystems.
- Expertise in cloud security, SaaS-based attacks, and email security threats (ATO, BEC, phishing, MFA bypass, etc.).
- Strong data analysis skills with experience using SQL, PySpark, or other query languages to investigate large-scale threats.
- Deep understanding of MITRE ATT&CK, phishing tactics, and adversary infrastructure analysis.
- Hands-on experience with email security platforms, cloud threat analytics, and security automation
- Collaborative Mindset: Ability to work cross-functionally with other departments such as R&D, Engineering, and Operations to achieve comprehensive cybersecurity coverage.
Nice to Have
- Security certifications (GCTI, GCFA, CISSP, or similar).
- Experience in security engineering, cloud-native security, or advanced detection development.
- Background in threat modeling, adversary emulation, or attacker TTP analysis.
- Experience working in high-scale SaaS environments, analyzing large security datasets.
#LI-LB3
Top Skills
Cloud Security
Email Security Platforms
Mitre Att&Ck
Pyspark
SQL
Similar Jobs
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Analyst I role involves monitoring security alerts, handling incidents, conducting malware analysis, and improving incident response processes while providing high-quality communication to customers.
Top Skills:
CC#LinuxmacOSPerlPowershellPythonRuby On Rails,.NetVbWindows
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Sr. Analyst will monitor security alerts, manage incident response, perform malware analysis, and mentor lower-level analysts to improve security processes.
Top Skills:
CC#LinuxmacOSPerlPowershellPythonRuby On Rails,.NetVbWindows
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Join CrowdStrike as an Analyst I where you'll conduct security monitoring, incident analysis, and malware remediation while improving incident response processes.
Top Skills:
.NetCC#Crowdstrike PlatformCybersecurity Incident Response ToolsLinuxmacOSPerlPowershellPythonRuby On RailsVbWindows
What you need to know about the London Tech Scene
London isn't just a hub for established businesses; it's also a nursery for innovation. Boasting one of the most recognized fintech ecosystems in Europe, attracting billions in investments each year, London's success has made it a go-to destination for startups looking to make their mark. Top U.K. companies like Hoptin, Moneybox and Marshmallow have already made the city their base — yet fintech is just the beginning. From healthtech to renewable energy to cybersecurity and beyond, the city's startups are breaking new ground across a range of industries.