Author jeshua bratman

Jeshua Bratman

Former Head of Machine Learning

Jeshua Bratman is an expert in applied machine learning with over 10 years of experience developing ML products and ML platforms. He is a founding engineer of Abnormal Security and the former Head of Machine Learning. Prior to starting Abnormal, Jeshua built Twitter’s machine learning platform and developed models to detect and prevent abusive behavior on Twitter. Prior to Twitter, Jeshua built the AI engine that powered TellApart’s predictive marketing products. His academic background is in theoretical reinforcement learning and deep learning from the University of Michigan where he worked on his PhD.

B 01 20 22 Calibrating Classifiers
Abnormal's fundamental job is to detect malicious emails like phishing and business email compromise attacks and other malicious events, such as suspicious sign-ins that indicate an account has been hacked.
Read More
Blog podcast green cover
Over the last three years building our ML-based cybersecurity products at Abnormal Security, I’ve benefitted enormously from discussions with colleagues in the ML space. This podcast aims to make some of those conversations available. In our second episode of Abnormal Engineering Stories...
Read More
Blog purple black ai
It’s one thing to add machine learning and artificial intelligence features to an existing software platform. It’s quite another to build an entire company like Abnormal Security around machine learning technology, and to provide practical, everyday value to enterprise organizations.
Read More
Blog black white arrows
Machine learning engineering is hard, especially when developing products at high velocity, as is the case for us at Abnormal Security. Typical software engineering lifecycles often fail when developing ML systems.
Read More
Blog ai algorithm
Developing a machine learning product for cybersecurity comes with unique challenges. For a bit of background, Abnormal Security’s products prevent email attacks—think credential phishing, business email compromise, and malware—and also...
Read More
Blog blue circles algorithm
At the core of all Abnormal’s detection products sits a sophisticated web of prediction models. For any of these models to function, we need deep and thoughtfully engineered features, careful modeling of sub-problems, and the ability to join data from a set of databases. For example, one type of email attack...
Read More
Blog earth lights
Sophisticated social engineering email attacks are on the rise and getting more advanced every day. They prey on the trust we put in our business tools and social networks, especially when a message appears to be from someone on our contact list, or even...
Read More