Sr. Embedded Detection Analyst

Abnormal AI · Vertical AI · United States · Remote · Threat Intelligence

This role focuses on optimizing the performance of an AI detection engine for enterprise customers by analyzing misclassification patterns, implementing tuning strategies, and demonstrating measurable improvements in detection KPIs. It involves working with security operations, customer success, and detection engineering, leveraging AI-powered tools to drive customer value and contribute to the program's operational playbook.

What you'd actually do

  1. Own detection performance outcomes for 3-5 strategic customer accounts, ensuring the AI engine maintains high efficacy aligned to each customer’s risk tolerance and priorities.
  2. Become a reliable resource for customer detection issues, handling high-priority false positive and false negative escalations, often using investigation outputs from Email Security Analysts and other Threat Intel inputs.
  3. Monitor and analyze misclassification patterns using internal detection analysis dashboards and tools.
  4. Perform incident triage and alert correlation to systematically diagnose why detections produce false positives or miss threats, using IOCs and TTPs.
  5. Design and implement detection tuning strategies based on customer-specific signals, attack patterns, threat intelligence, and behavioral characteristics, following established methodologies.

Skills

Required

  • SOC operations experience
  • detection engineering experience
  • incident response experience
  • email security analysis experience
  • strong analytical skills
  • hypothesis-driven investigation approaches
  • systematic work with established tools and processes
  • understanding of attacker TTPs and threat patterns
  • ability to dive into complex detection systems and analyze root causes
  • methodical approach to technical challenges
  • clear communication skills (technical and non-technical audiences)
  • ability to remain calm and responsive in high-pressure situations
  • documentation skills

Nice to have

  • customer-focused approach
  • experience with AI-powered productivity enhancers
  • experience with internal detection analysis dashboards and tools
  • experience with IOCs
  • experience with threat intelligence
  • experience with AI tools (ChatGPT, Claude, Claude Code, etc.)

What the JD emphasized

  • 7+ years of experience in SOC operations, detection engineering, incident response, email security analysis, or related cybersecurity role.

Other signals

  • customer outcomes
  • detection performance
  • AI engine efficacy
  • tuning strategies
  • measurable improvement