Himalayas logo
Abnormal SecurityAS

Embedded Detection Analyst

Abnormal Security is an AI-native email security platform that uses behavioral data science to protect enterprises from the widest range of email attacks.

Abnormal Security

Employee count: 501-1000

Salary: 165k-195k USD

United States only

Stay safe on Himalayas

Never send money to companies. Jobs on Himalayas will never require payment from applicants.

About the Role

Abnormal AI is looking for an Embedded Detection Analyst to join our Threat Intelligence team. The Embedded Detection Program partners directly with our highest-value customers to rapidly identify, resolve, and demonstrate measurable improvements in detection performance. This role combines the investigative mindset of a SOC analyst with the customer-focused approach of a detection engineer—you'll own end-to-end customer outcomes by understanding pain points, using our detection analysis platform to identify root causes, implementing tuning solutions, and validating improvement. The ideal candidate will bring SOC or security operations experience, strong analytical skills, hypothesis-driven investigation approaches, and the ability to work systematically with established tools and processes.

You'll work at the intersection of security operations, customer success, and detection quality, using our suite of analysis tools and AI-powered productivity enhancers to drive measurable customer value while contributing to the operational playbook that scales this program.

Scope and scale: Own detection performance outcomes for 3-5 strategic customer accounts, with responsibility for measurable detection KPIs, cross-customer tuning patterns, and contributions to the programs playbook.

As an Embedded Detection Analyst, you are a trusted technical partner for our strategic customers. You are highly motivated to understand what attackers are doing, why detections are behaving unexpectedly, and how to systematically improve customer outcomes.

  • You're driven to stop email attackers and understand email security attack modes, TTPs, and threat patterns.
  • You like to dive into the details of complex detection systems, understand their behavior, and analyze root causes. When detection output is unexpected, you investigate systematically until the issue is identified.
  • You approach technical challenges methodically, following established playbooks while identifying opportunities for improvement and automation.
  • You document your investigations clearly, maintaining comprehensive notes that can be used for future reference and team learning.
  • You are a clear communicator who can explain technical detection issues to both technical and non-technical audiences, particularly customers and GTM stakeholders.
  • You remain calm and responsive during high-pressure situations, including customer escalations and critical misclassifications
  • You are a trusted team member—when you take on tasks, there is confidence they will be completed on time and to specification, with appropriate escalation when needed
  • You primarily operate behind the scenes, partnering closely with GTM and customer-facing teams. While you may occasionally join customer discussions to explain detection findings, your core focus is investigation, tuning, and measurable detection improvement rather than ongoing account management.

You measure your success by quantified detection improvements (for example, reduction in false positives/negative,improved precision/recall) across your portfolio of accounts and the entire system, not just by closing individual investigations.

What you will do

  • Own detection performance outcomes for 3-5 strategic customer accounts, ensuring the AI engine maintains high efficacy aligned to each customer’s risk tolerance and priorities.
  • Become a reliable resource for customer detection issues, handling high-priority false positive and false negative escalations, often using investigation outputs from Email Security Analysts and other Threat Intel inputs.
  • Monitor and analyze misclassification patterns using internal detection analysis dashboards and tools.
  • Perform incident triage and alert correlation to systematically diagnose why detections produce false positives or miss threats, using IOCs and TTPs.
  • Design and implement detection tuning strategies based on customer-specific signals, attack patterns, threat intelligence, and behavioral characteristics, following established methodologies.
  • Fine-tune detection thresholds and configurations to optimize precision while maintaining coverage against emerging threats, balancing detection efficacy with customer experience.
  • Generate and present impact reports that demonstrate measurable improvement in detection improvement to both customers, and internal stakeholders, in close partnership with GTM teams.
  • Maintain close alignment with Sales and Customer Success leads to understand customer pain points, renewal risks, and what matters most for securing deals, without taking on primary account management responsibilities.
  • Document detection issues, investigation findings, and tuning approaches in a structured, reusable format to enable team learning and program improvement.
  • Review audit logs and analyze system interactions using internal and external tools, including AI-based analytical tools, to identify root causes, and tuning opportunities.
  • Identify cross-customer patterns and contribute tuning methodologies to the operational playbook that can be leveraged across the program.
  • Submit D360 CFN reports and AISM submissions to improve global detection coverage based on customer findings.
  • Provide feedback to tooling team on analysis gaps, needed capabilities, and opportunities for automation, helping shape the roadmap for detection analysis and tuning tools.
  • Support training of other team members by sharing investigation insights and developing repeatable methodologies, including leveraging outputs from Email Security Analysts to scale tuning impact.
  • Leverage AI tools (ChatGPT, Claude, Claude Code, etc.) in established workflows and investigations to accelerate research, automate routine tasks, enhance documentation, and improve problem-solving efficiency

Must Haves

  • 2-5 years of experience in SOC operations, detection engineering, incident response, email security analysis, or related cybersecurity role.
  • Experience with security monitoring and detection platforms such as SIEM, EDR, email security tools, or similar technologies (experience with Abnormal Security is a plus).
  • Experience in email attack analysis, with ability to identify and leverage IOCs and TTPs to understand and remediate threats.
  • Deep understanding of precision/recall metrics (true/false negatives, true/false positives) and their business impact on security operations and customer experience.
  • Proven experience triaging security alerts, performing root cause analysis following established procedures, and tuning detection logic to reduce false positives while maintaining coverage.
  • Ability to perform standardized data analysis procedures, effectively following established runbook methodologies and debugging analysis workflows as needed
  • Demonstrated proficiency with AI tools (ChatGPT, Claude, Claude Code, Copilot, or similar) to enhance productivity, automate tasks, and accelerate problem-solving in both routine workflows and ad-hoc investigations.
  • Experience in technical writing that effectively communicates complex issues, with ability to adapt communications for audiences of varying technical expertise, particularly in customer-facing contexts.
  • Proven ability to work directly with customers or stakeholders on technical security issues, in collaboration with Customer Success and Sales, translating findings into business value without owning management.
  • Demonstrated ability to remain calm and responsive during high-pressure situations, including customer escalations and active cybersecurity incidents.
  • Outcome-oriented mindset that measures success by customer impact and detection improvement rather than activities completed.
  • Strong ownership mentality with ability to work within established processes while identifying improvement opportunities—trusted to complete tasks on time and to specification with appropriate escalation when needed.

Nice to Have

  • Background in email security, phishing detection, anti-abuse systems, spam analysis, or email threat containment.
  • Basic SQL knowledge with ability to write simple queries, perform data filtering, and understand data structures.
  • Familiarity with Python, data analysis scripting, or notebook environments (e.g. Databricks, Jupyter, Splunk)
  • Understanding of threat intelligence, IOCs (Indicators of Compromise), and threat hunting concepts.
  • Familiarity with the MITRE ATT&CK framework and common email attack vectors (phishing, BEC, credential harvesting, malware, account takeover)
  • Security certifications such as Security+, Network+, GIAC (GCIA, GCIH), CISSP, CEH, or similar
  • Previous experience in technical account management, customer success engineering, or customer-facing security roles
  • Examples of using AI tools and automation to solve security problems or accelerate learning in technical domains
  • Experience documenting investigation methodologies and training team members

At Abnormal AI, certain roles are eligible for a bonus, restricted stock units (RSUs), and benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications and other job-related reasons.

Base salary range:
$165,000—$195,000 USD

Abnormal AI is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by law. For our EEO policy statement please click here. If you would like more information on your EEO rights under the law, please click here.

About the job

Apply before

Posted on

Job type

Full Time

Experience level

Mid-level

Salary

Salary: 165k-195k USD

Location requirements

Hiring timezones

United States +/- 0 hours

About Abnormal Security

Learn more about Abnormal Security and their company culture.

View company profile

At Abnormal Security, we are at the forefront of cybersecurity innovation, pioneering a revolutionary approach to protect the modern enterprise from the most sophisticated and damaging email attacks. Through our groundbreaking, AI-native human behavior security platform, we are fundamentally transforming how organizations defend against threats that exploit human vulnerability. Our core technology leverages advanced machine learning and behavioral data science to create a precise, identity-based understanding of every individual within and outside an organization. This allows us to detect subtle anomalies in communication patterns, relationships, and business processes that signal a potential attack, stopping threats that traditional security solutions miss. We are not just building another security product; we are engineering a new paradigm of defense that is autonomous, adaptive, and capable of anticipating and neutralizing never-before-seen attacks in real-time.

Our commitment to innovation extends beyond our core detection engine. We are building a comprehensive security platform that provides complete protection across the entire cloud email environment. This includes inbound email security to block phishing, malware, and social engineering attacks; robust protection against internal and external account takeovers; and full security operations center (SOC) automation to streamline threat response and reduce manual effort. By integrating seamlessly with major cloud platforms like Microsoft 365 and Google Workspace via a simple API, we provide immediate value without disrupting email flow. The team at Abnormal Security is composed of industry veterans and bright minds from leading technology companies like Google, Twitter, and Amazon, all driven by a shared passion for solving the most critical challenges in cybersecurity. We are dedicated to building a future where organizations can operate securely and confidently in an increasingly complex digital world, empowered by the intelligence and autonomy of our AI-driven platform.

Employee benefits

Learn about the employee benefits and perks provided at Abnormal Security.

View benefits

Mental Health Resources

Access to mental health resources.

401K

Abnormal Security offers a 401K plan.

Virtual lunch budget

Monthly virtual lunch budget for employees.

Flexible PTO

All regular salaried team members enjoy unlimited PTO.

View Abnormal Security's employee benefits
Claim this profileAbnormal Security logoAS

Abnormal Security

View company profile

Similar remote jobs

Here are other jobs you might want to apply for.

View all remote jobs

114 remote jobs at Abnormal Security

Explore the variety of open remote roles at Abnormal Security, offering flexible work options across multiple disciplines and skill levels.

View all jobs at Abnormal Security

Remote companies like Abnormal Security

Find your next opportunity by exploring profiles of companies that are similar to Abnormal Security. Compare culture, benefits, and job openings on Himalayas.

View all companies

Find your dream job

Sign up now and join over 100,000 remote workers who receive personalized job alerts, curated job matches, and more for free!

Sign up
Himalayas profile for an example user named Frankie Sullivan