Abnormal Security Logo

Abnormal Security

Threat Researcher

Job Posted 18 Days Ago Reposted 18 Days Ago
Be an Early Applicant
Remote
29 Locations
Senior level
Remote
29 Locations
Senior level
The Threat Researcher will analyze Microsoft cloud security threats, adversary techniques, and misconfigurations. Responsibilities include conducting research on APT threats, developing threat models, enhancing security posture, and collaborating with R&D and Engineering teams to improve security products for Microsoft cloud environments.
The summary above was generated by AI

About the Role

Abnormal Security is looking for a Threat Researcher with expertise in Microsoft cloud security, threat research, and SaaS Security Posture Management (SSPM). In this role, you will conduct deep-dive research on Microsoft cloud threats, adversary techniques, and misconfigurations, while also contributing to security posture improvements and mitigation strategies. You will work closely with R&D and Engineering teams to enhance security product capabilities, refine detections, and develop configuration playbooks for Azure, Microsoft 365, Defender Suite, and Entra ID.

Who you are

  • Experienced in threat research, with a deep understanding of Microsoft cloud ecosystems, SaaS security, and identity-based threats.
  • Strong knowledge of Microsoft security tools, including Defender for Office 365, Defender for Identity, Defender for Cloud Apps, and Sentinel.
  • Proficient in adversary TTP analysis, phishing attack research, misconfiguration risks, and security posture hardening.
  • Data-driven researcher, with experience using SQL, PySpark, KQL, and other query-based tools to analyze large datasets.
  • Skilled at bridging security research with engineering, ensuring insights lead to practical security improvements.
  • Comfortable working in agile, cross-functional teams, driving security posture improvements across Microsoft cloud environments.
  • Strong communicator, able to deliver detailed research findings to both technical and non-technical stakeholders.

What you will doThreat Research & Adversary Tracking

  • Conduct in-depth research on Microsoft cloud security threats, phishing techniques, and identity-based attack vectors.
  • Track APT groups, financially motivated actors, and cloud-native threat campaigns targeting Azure and Microsoft 365 environments.
  • Analyze MFA bypass techniques, token theft, session hijacking, and adversary tactics used against Microsoft authentication mechanisms.
  • Reverse-engineer phishing kits, adversary infrastructure, and cloud-native attack methodologies to enhance security insights.
  • Develop threat models and in-depth attack reports to inform Microsoft-focused threat intelligence.

SSPM & Security Posture Research

  • Research misconfigurations, security posture risks, and SaaS security gaps in Microsoft Entra ID, Azure AD, and M365 security settings.
  • Develop SSPM research insights and contribute to configuration playbooks to improve Microsoft cloud security posture.
  • Identify misconfiguration-driven threats and work with Engineering to enhance detection and mitigation strategies.
  • Analyze security posture deviations that could expose Microsoft environments to account takeovers, phishing, and privilege escalation attacks.

Security Research & Cross-Functional Collaboration

  • Provide deep-dive research into Microsoft cloud attack methodologies to help enhance security product capabilities.
  • Work with R&D and Engineering teams to ensure research findings translate into practical security enhancements.
  • Deliver technical briefings and intelligence reports on Microsoft threat trends, attacker tactics, and detection opportunities.
  • Partner with internal stakeholders to evaluate emerging threats and recommend security improvements for Microsoft cloud environments.

Must Haves 

  • 5+ years in threat research, cyber threat intelligence, or adversary tracking.
  • 3+ years focused on Microsoft cloud security (Azure, M365, Defender, Entra ID, or Sentinel).
  • Expertise in Microsoft cloud security architecture, identity protection, SaaS security, and misconfiguration risks.
  • Strong data analysis skills with experience using SQL, PySpark, KQL, or similar tools to analyze cloud-based threats.
  • Deep knowledge of MITRE ATT&CK, Microsoft attack techniques, and adversary tradecraft.
  • Hands-on experience with Microsoft Defender for Office 365, Defender for Identity, and Microsoft Sentinel.

Nice to Have 

  • Experience working with or building SSPM solutions for Microsoft cloud security posture management.
  • Security certifications (GCTI, GCFA, CISSP, or Microsoft security-related).
  • Experience in cloud-native security research, attack simulations, or misconfiguration exploitation analysis.
  • Background in SaaS security posture analysis and cloud security hardening.


#LI-LB3

Similar Jobs

3 Days Ago
Easy Apply
Remote
28 Locations
Easy Apply
Mid level
Mid level
Artificial Intelligence • Cloud • Information Technology • Machine Learning • Natural Language Processing • Software
The Information Security Compliance Analyst manages compliance with regulations like PCI-DSS and HIPAA, assists with audits, prepares documentation, and leads security investigations.
Top Skills: Atlassian ProductsEncryption TechnologiesFirewallsHipaaHitrustIntrusion Detection SystemsIso 27001Pci-DssSecurity Monitoring PlatformsSoc 2SplunkVulnerability Assessment Tools
7 Days Ago
Easy Apply
Remote
29 Locations
Easy Apply
Senior level
Senior level
Cloud • Security • Software • Cybersecurity • Automation
The Staff Security Engineer will focus on product security risk metrics, develop KRIs and data collection systems, and drive cross-functional alignment for risk reduction initiatives.
Top Skills: AsanaData VisualizationDevsecopsGitlabJIRAPower BITableau
Senior level
Big Data • Food • Hardware • Machine Learning • Retail • Automation • Manufacturing
Design and implement secure IAM cloud architectures, conduct security assessments, develop security policies, and lead incident response efforts. Mentor junior engineers and ensure compliance with industry standards.
Top Skills: Active DirectoryAWSAzureBashCloud EngineeringGCPGdprIamIsoLdapLinuxNistOauthOidcPamPowershellPythonSsoWindows

What you need to know about the Seattle Tech Scene

Home to tech titans like Microsoft and Amazon, Seattle punches far above its weight in innovation. But its surrounding mountains, sprinkled with world-famous hiking trails and climbing routes, make the city a destination for outdoorsy types as well. Established as a logging town before shifting to shipbuilding and logistics, the Emerald City is now known for its contributions to aerospace, software, biotech and cloud computing. And its status as a thriving tech ecosystem is attracting out-of-town companies looking to establish new tech and engineering hubs.

Key Facts About Seattle Tech

  • Number of Tech Workers: 287,000; 13% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Amazon, Microsoft, Meta, Google
  • Key Industries: Artificial intelligence, cloud computing, software, biotechnology, game development
  • Funding Landscape: $3.1 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Madrona, Fuse, Tola, Maveron
  • Research Centers and Universities: University of Washington, Seattle University, Seattle Pacific University, Allen Institute for Brain Science, Bill & Melinda Gates Foundation, Seattle Children’s Research Institute
By clicking Apply you agree to share your profile information with the hiring company.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account