5 Observations of Designing at Abnormal

October 28, 2021
Abnormal stickers photo

Nearly six months ago, I joined Abnormal as a Product Designer, doubling the size of our Product Design team from one to two. In this time, we've shipped products that protect people against email threats, updated our design system, launched a new brand, and improved many processes. It’s been an exciting time to be at Abnormal, and the experience has made me a better designer.

Looking back, I'd like to reflect on five observations.

1. Abnormal is Truly Customer Obsessed

During onboarding week, I was encouraged to sit in a handful of customer meetings, which I continue to attend at regular intervals. Why? Customer feedback is invaluable. Seeing people using our applications firsthand allows us to capture moments of frustration that otherwise might be lost. Learnings from these sessions have informed our designs and translated to system enhancements, ultimately improving the product for our customers.

On my third day at work, I met with a machine learning engineer to talk about my first project. He opened the conversation with “How will our customers use this feature?” In the next project, my engineering counterpart asked me to sit in on user interviews. At weekly engineering, product, and data science demos, every presentation ends with an explanation of “why this is good for our customers,” encouraging us to always keep that customer need in everything we do. The company-wide focus on customers and their experience with Abnormal aligns teams, making it easier for designers to prioritize user experience.

2. Fast Growing Start-Ups are Fun

It’s exciting to grow with a start-up. The company and products are nimble and adaptive—we ship products, learn from them, and then iterate to provide an even better experience. Team members brainstorm improvements and jump into solving problems instead of waiting for others to address them. The challenges we face will change over time, from how to deliver high-quality design with one or two designers to how to scale the design organization.

The flip side includes the challenges of working with ambiguity, competing priorities, changing landscapes, and tight deadlines. After five months, my decision-making tendencies went from “measuring twice and cutting once” to “just do it,” highlighting how valuable velocity is at a small company. While this type of environment can be difficult for those who prefer stability and certainty, I enjoy the opportunities that present themselves in this fast-paced environment, and I know that I’m always making an impact with everything I do.

3. A Collaborative Design Team is Key

Even though I was only the second product designer at Abnormal, our team has continued to grow in the past few months. Collaborating with others in my field has been one of the highlights of working at Abnormal. It is a magic combination to have talented designers who care deeply about the products but also understand and respect other perspectives. We have passionate debates about visuals and workflows, but discussions are always underscored by the desire to understand each others' viewpoints in order to provide the best user experience.

And despite a 400% growth of the design team while working virtually, we stay connected through weekly planning meetings, asynchronous daily standups in Slack, regular critique sessions, and laughter-filled retrospectives. We are shaping the future of the design organization—from standardizing our Figma naming conventions and updating the design system, to optimizing collaboration with engineering and streamlining bug tracking. We also use regular design operation meetings to hone our crafts, by sharing the Figma tips, exploring new tools, and inviting speakers from other organizations to present on interesting topics.

4. A Remote-First Approach is Important

I joined during the COVID-19 pandemic, as did over half the company. Immediately, I felt connected to colleagues through virtual activities such as the GIF-filled weekly town hall meetings, highly anticipated weekly personal talent demos, fun Slack channels (#pets, #workout, #anime, and #bookclub, to name a few), virtual social events, and exercise challenges. For people who want to safely collaborate in person, Abnormal has offices and shared workspaces wherever the employees are, as well as informal team gatherings.

This remote-first approach enables the company to hire the best talent wherever they are. Having talented employees worldwide enables diversity in experiences and perspectives, which shows in our company culture and in the products we provide to our customers. As for me, I appreciate the flexibility of working from home, and I do not miss long commutes.

5. Supportive Leadership is a Must

One benefit of joining a startup early is that I have more opportunities to work closely with great leaders and thinkers. In my experience, the leadership team at Abnormal has been approachable and communicative. Even though some of them have decades of experience and have managed large corporate teams, they share their perspectives with respect and solicit feedback with open minds. They care about employees’ goals and aspirations, and they are open to investing in training and mentoring.

And since a good number of colleagues are aspiring start-up founders, Abnormal started a monthly “Abnormal Business School” fireside chat, which brings in outside experts to talk about leadership, management, and entrepreneurship. Moreover, the general organizational culture is transparent and positive, evident through the weekly company status emails, town halls with frank Q&As, accessible meeting notes, as well as daily company-wide shoutouts from peers and leadership.

Overall, my time at Abnormal has been incredibly enjoyable, and I've already learned so much. As the team grows, I'm looking forward to adding additional people to our team, so we can grow, learn, and provide the best possible experience for our customers, together.

Interested in working at a fast-growing startup? We’d love to have you! Check out the Careers page for open roles, and feel free to reach out to me with any questions.

Related Posts

B 12 03 22 SIEM
Learn about Abnormal’s enhanced SIEM export schema, which provides centralized visibility into email threats
Read More
Blog phishing cover
The phishing email is one of the oldest and most successful types of cyberattacks. Attackers have long used phishing as a common attack vector to steal sensitive information or credentials from their victims. While most phishing emails are relatively simple to spot, the number of successful attacks has grown in recent years.
Read More
Blog brand cover
For those of you who have visited the Abnormal website over the last month, you’ve seen something different—a redesigned brand focused on precision. It’s new and innovative, and different from any other cybersecurity company, because it was created with one thing in mind: our customers.
Read More
B 11 22 21 AAA
At Abnormal, our customers have always been our biggest priority. Customer obsession is one of our five company values, and we live this every single day as we provide the best email security protection available for the hundreds of companies who entrust us to protect their mailboxes.
Read More
Blog microsoft abnormal cover
Before we jump into modern threats, I think it’s important to set the stage ​​since email has been around. Since email existed, threat actors targeted email users with malicious messages, general spam, and different ways to take advantage of the platform. Then of course, more dangerous attacks started to come up… things like malware and other viruses.
Read More
Blog black friday scam cover
While cybersecurity awareness is a year-round venture, it is especially important to be mindful during certain times of the year. With Thanksgiving here in the United States on Thursday, our thoughts will likely be on our family and friends and everything we have to be thankful for this holiday season.
Read More
Blog automation workflows cover
Our newest platform capabilities help customers streamline critical security workflows, like triaging phishing mailbox submissions or triggering tickets to investigate account takeovers, through automated playbooks. Doing so can decrease mean time to respond (MTTR) to incidents, further reducing any potential risk to the organization and eliminating manual workflows to save time and increase the efficiency of IT and security teams.
Read More
Blog tsa scam cover
On November 9, 2021, we identified an unusual phishing email that claimed to be from “Immigration Visa and Travel,” inviting the recipient to renew their membership in the TSA PreCheck program. The email wasn’t sent from a .gov domain, but the average consumer might not immediately reject it as a scam, particularly because it had the term “immigrationvisaforms” in the domain. The email instructed the user to renew their membership at another quasi-legitimate-looking website.
Read More
Blog pyspark cover
At Abnormal Security, we use a data science-based approach to keep our customers safe from the most advanced email attacks. This requires processing huge amounts of data to train machine learning models, build datasets, and otherwise model the typical behavior of the organizations we’re protecting.
Read More
Blog tiktok attack cover
As major social media platforms have expanded the ability of creators to monetize their content in the last few years, they and their users have increasingly found themselves the targets of malicious activity. TikTok is now no exception.
Read More
Blog ransomware guide cover
While various state agencies and the private sector keep track of ransomware attacks and related tactics worldwide, malicious actors change and evolve their ransomware strategies all the time. We’ve put together a comprehensive guide that will define ransomware, how to detect it, and what steps to take if you’ve fallen victim to a ransomware virus attack.
Read More
Blog detection efficacy cover
One of the key objectives of the Abnormal platform is to provide the highest precision detection to block all never-before-seen attacks. This ranges from socially-engineered attacks to account takeovers to everyday spam, and the platform does it without customers needing to create countless rules like with traditional secure email gateways.
Read More