Summary
Join Abnormal Security as a Threat Intelligence Analyst to combat cloud-based threats. You will perform threat hunts in cloud/SaaS environments, extract actionable intelligence, and collaborate with R&D and Engineering teams to improve security. This role requires deep experience in threat intelligence and hunting, focusing on cloud/SaaS threats. You will analyze large datasets, translate threat intelligence into scalable detections, and present complex technical concepts to various audiences. The ideal candidate possesses strong data analysis skills and a collaborative mindset. The position offers the opportunity to contribute to a fast-paced, dynamic security team.
Requirements
- Possess 5+ years of experience in cyber threat intelligence, threat hunting, or security research
- Have 3+ years of experience in threat hunting and threat research within cloud ecosystems
- Possess expertise in cloud security, SaaS-based attacks, and email security threats (ATO, BEC, phishing, MFA bypass, etc.)
- Have strong data analysis skills with experience using SQL, PySpark, or other query languages to investigate large-scale threats
- Possess a deep understanding of MITRE ATT&CK, phishing tactics, and adversary infrastructure analysis
- Have hands-on experience with email security platforms, cloud threat analytics, and security automation
- Possess the ability to work cross-functionally with other departments such as R&D, Engineering, and Operations to achieve comprehensive cybersecurity coverage
Responsibilities
- Perform threat hunting and investigative research in Cloud/SaaS environments, focusing on email security, phishing, and account takeovers
- Identify MFA bypass techniques, phishing infrastructure, and cloud-native attack methods targeting enterprise SaaS environments
- Fuse internal telemetry, OSINT, and third-party intelligence sources to uncover and disrupt evolving threat actor campaigns
- Develop threat models and attack hypotheses to identify new cloud-focused attack vectors
- Conduct incident triage and investigative support for escalated incidents, providing internal teams with expertise on threat actorsβ tools, techniques, and procedures (TTPs)
- Collaborate with R&D and Engineering teams to translate threat intelligence into scalable detections and mitigations
- Design and refine cloud threat detection logic, hunting queries, and behavioral analytics to identify attacker activity
- Analyze phishing toolkits, adversary infrastructure, and cloud-native attack methodologies to enhance proactive defenses
- Work with product security teams to improve email security and identity protection mechanisms in Cloud/SaaS platforms
- Track and analyze threat actor groups, phishing campaigns, and cloud-based attack methodologies
- Provide technical intelligence briefings to R&D and Engineering teams to inform security product improvements
- Partner with internal stakeholders to evaluate emerging threats and recommend security enhancements for SaaS environments
Preferred Qualifications
- Possess security certifications (GCTI, GCFA, CISSP, or similar)
- Have experience in security engineering, cloud-native security, or advanced detection development
- Have a background in threat modeling, adversary emulation, or attacker TTP analysis
- Have experience working in high-scale SaaS environments, analyzing large security datasets
Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.