<h3><strong>About the Role</strong></h3><p>We at Abnormal AI are looking for a hands-on Security Operations/ Cyber Defense Analyst who thrives in a fast-paced, engineering-driven environment. You’ll be responsible for monitoring, investigating, and responding to security alerts across cloud, endpoint, identity, and application layers. You’ll work closely with detection engineers, cloud security, and IT teams to protect our hybrid environment from threats in real time.</p><p>This is <strong>not</strong> a “click-through-the-console” SOC role — we’re looking for someone who can think critically, automate relentlessly, and own incidents end-to-end.</p><h3><strong>Key Responsibilities</strong></h3><ul><li><strong>Detection & Triage:</strong><strong><br><br></strong></li><ul><li>Monitor alerts from tools like SIEM, EDR, IAM, CSPM, CDR etc.<br><br></li><li>Perform initial triage, enrichment, and correlation across multiple data sources.<br><br></li><li>Identify false positives and fine-tune rules with detection engineering.<br><br></li></ul><li><strong>Incident Response:</strong><strong><br><br></strong></li><ul><li>Lead containment, eradication, and recovery for endpoint, cloud, and identity incidents.<br><br></li><li>Document and communicate incidents through SOAR/Jira/ServiceNow workflows.<br><br></li><li>Perform root cause analysis and propose permanent preventive controls.<br><br></li></ul><li><strong>Threat Hunting & Analysis:</strong><strong><br><br></strong></li><ul><li>Proactively hunt using hypotheses mapped to MITRE ATT&CK.<br><br></li><li>Investigate anomalies across CloudTrail, Okta, GitHub, and other telemetry sources.<br><br></li><li>Collaborate with threat intelligence to identify emerging TTPs.<br><br></li></ul><li><strong>Automation & Process Improvement:</strong><strong><br><br></strong></li><ul><li>Build or enhance playbooks in SOAR (Torq or equivalent).<br><br></li><li>Create custom enrichment scripts and automations (Python, Bash, etc.).<br><br></li><li>Suggest new detection logic and operational improvements.<br><br></li></ul><li><strong>Reporting & Metrics:</strong><strong><br><br></strong></li><ul><li>Track and report operational metrics (MTTD, MTTR, incident categories).<br><br></li><li>Maintain documentation and lessons learned.<br><br></li></ul></ul><h3><strong>Required Skills & Qualifications</strong></h3><ul><li>5-7 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment.<br><br></li><li>Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs.<br><br></li><li>Experience with <strong>EDR (CrowdStrike preferred)</strong>, <strong>SIEM (Splunk preferred)</strong>, and <strong>SOAR (Torq, XSOAR, or Phantom)</strong>.<br><br></li><li>Familiarity with <strong>AWS</strong>, <strong>Okta</strong>, and <strong>SaaS platforms</strong>.<br><br></li><li>Proficiency in writing queries and automations using Python, SPL, or equivalent.<br><br></li><li>Excellent analytical and investigative skills — capable of operating independently with minimal hand-holding.<br><br></li><li>Strong documentation and communication skills for technical and executive audiences.<br><br></li></ul><h3><strong>Nice to Have</strong></h3><ul><li>Experience with CSPM/CDR/VM tools.<br><br></li><li>Knowledge of Containers and Kubernetes security.<br><br></li><li>Relevant certifications like <strong>CEH, Security+,</strong> <strong>GCIH, GCIA, or AWS Security Specialty</strong>.<br><br></li></ul><h3><strong>What Success Looks Like</strong></h3><ul><li>You consistently deliver high-quality triage with minimal false positives.<br><br></li><li>You automate repetitive tasks instead of manually doing them twice.<br><br></li><li>You can take a vague alert and turn it into a well-documented case with actionable findings.<br><br></li></ul><p>#LI-EM5</p><ul><li>You make measurable improvements to detection coverage, response time, or tooling maturity.</li></ul><div class="content-pay-transparency"><div class="pay-input"><div class="description"><hr><p><br>At Abnormal AI, certain roles are eligible for a bonus, restricted stock units (RSUs), and benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications and other job-related reasons. </p></div><div class="title">Base salary range:</div><div class="pay-range"><span>$144,500</span><span class="divider">—</span><span>$170,000 USD</span></div></div></div><div class="content-conclusion"><p><br>Abnormal AI is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by law. For our EEO policy statement please <a href="https://abnormal.ai/aap-eeoc-statement" target="_blank"><span style="text-decoration: underline;"><em>click here</em></span></a>. If you would like more information on your EEO rights under the law, please <em><span style="text-decoration: underline;"><a href="https://abnormal.ai/eeoc-poster" target="_blank">click here</a></span></em>.</p></div>