Abnormal Security Logo

Abnormal Security

Threat Intelligence Analyst

Posted 5 Days Ago
Be an Early Applicant
Remote
Hiring Remotely in UK
Senior level
Remote
Hiring Remotely in UK
Senior level
The Threat Intelligence Analyst will perform threat hunting and investigative research in Cloud/SaaS to combat phishing, account takeovers, and other attacks. Responsibilities include data analysis, developing threat models, collaborating with teams for detection logic, and tracking threat actor groups.
The summary above was generated by AI

About the Role

Abnormal Security is looking for a Threat Intelligence Analyst with expertise in threat hunting, detection engineering, and operational intelligence to combat cloud-based phishing attacks, account takeovers (ATO), and business email compromise (BEC). In this role, you will perform threat hunts in Cloud/SaaS environments, extract actionable intelligence, and collaborate with R&D and Engineering teams to enhance security detections and counter evolving adversary tactics.

Who you are

  • Deeply experienced in Threat Intelligence & Threat Hunting, with a focus on Cloud/SaaS threats.
  • Strong understanding of phishing, cloud-native threats, and adversary TTPs targeting identity and email security.
  • Data-driven mindset, with experience analyzing large datasets using SQL, PySpark, and other query-based analysis tools.
  • Skilled at bridging threat intelligence with engineering teams, ensuring insights translate into effective security controls.
  • Comfortable working in agile, cross-functional teams, driving threat research into practical security improvements.
  • Proven ability to present complex technical concepts to both technical and non-technical audiences.
  • Results-driven, highly collaborative, self-motivated, and adaptable in fast-paced environments.

What you will doThreat Hunting & Threat Intelligence

  • Perform threat hunting and investigative research in Cloud/SaaS environments, focusing on email security, phishing, and account takeovers.
  • Identify MFA bypass techniques, phishing infrastructure, and cloud-native attack methods targeting enterprise SaaS environments.
  • Fuse internal telemetry, OSINT, and third-party intelligence sources to uncover and disrupt evolving threat actor campaigns.
  • Develop threat models and attack hypotheses to identify new cloud-focused attack vectors.
  • Conduct incident triage and investigative support for escalated incidents, providing internal teams with expertise on threat actors’ tools, techniques, and procedures (TTPs).

Detection Engineering

  • Collaborate with R&D and Engineering teams to translate threat intelligence into scalable detections and mitigations.
  • Design and refine cloud threat detection logic, hunting queries, and behavioral analytics to identify attacker activity.
  • Analyze phishing toolkits, adversary infrastructure, and cloud-native attack methodologies to enhance proactive defenses.
  • Work with product security teams to improve email security and identity protection mechanisms in Cloud/SaaS platforms.

Security Research

  • Track and analyze threat actor groups, phishing campaigns, and cloud-based attack methodologies.
  • Provide technical intelligence briefings to R&D and Engineering teams to inform security product improvements.
  • Partner with internal stakeholders to evaluate emerging threats and recommend security enhancements for SaaS environments.

Must Haves 

  • Deep Expertise: 5+ years in cyber threat intelligence, threat hunting, or security research.
  • 3+ years of experience in threat hunting and threat research within cloud ecosystems.
  • Expertise in cloud security, SaaS-based attacks, and email security threats (ATO, BEC, phishing, MFA bypass, etc.).
  • Strong data analysis skills with experience using SQL, PySpark, or other query languages to investigate large-scale threats.
  • Deep understanding of MITRE ATT&CK, phishing tactics, and adversary infrastructure analysis.
  • Hands-on experience with email security platforms, cloud threat analytics, and security automation
  • Collaborative Mindset: Ability to work cross-functionally with other departments such as R&D, Engineering, and Operations to achieve comprehensive cybersecurity coverage.

Nice to Have 

  • Security certifications (GCTI, GCFA, CISSP, or similar).
  • Experience in security engineering, cloud-native security, or advanced detection development.
  • Background in threat modeling, adversary emulation, or attacker TTP analysis.
  • Experience working in high-scale SaaS environments, analyzing large security datasets.


#LI-LB3

Top Skills

Adversary Tactics
Cloud/Saas
Detection Engineering
Email Security
Mfa Bypass
Mitre Att&Ck
Operational Intelligence
Phishing
Pyspark
Security Automation
Security Research
SQL
Threat Hunting
Threat Intelligence

Similar Jobs

8 Hours Ago
Remote
Hybrid
2 Locations
Mid level
Mid level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The role involves analyzing security alerts, conducting incident response, performing malware analysis, and improving security processes. Candidates need technical skills in incident handling and communication abilities.
Top Skills: .NetCC#LinuxmacOSPerlPowershellPythonRuby On RailsVbWindows
11 Hours Ago
Remote
Hybrid
6 Locations
Senior level
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Sr. Cloud Red Team Engineer emulates threat actors in cloud environments to enhance CrowdStrike's security capabilities and conducts security assessments.
Top Skills: .NetAWSAzureC/C++GCPGdbGhidraGoIdaRustWindbg
13 Hours Ago
Remote
Hybrid
6 Locations
Mid level
Mid level
Artificial Intelligence • Cloud • Software • Cybersecurity
As a Threat Detection Engineer, you will develop detection content for cloud-native technologies, collaborate across teams, and improve processes using automation.
Top Skills: AWSAzureDockerGCPGoKubernetesPythonTerraform

What you need to know about the Edinburgh Tech Scene

From traditional pubs and centuries-old universities to sleek shopping malls and glass-paneled office buildings, Edinburgh's architecture reflects its unique blend of history and modernity. But the fusion of past and future isn't just visible in its buildings; it's also shaping the city's economy. Named the United Kingdom's leading technology ecosystem outside of London, Edinburgh plays host to major global companies like Apple and Adobe, as well as a growing number of innovative startups in fields like cybersecurity, finance and healthcare.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account