Keep your team informed when a risky email is caught. The flow alerts the affected employee in Slack and opens a Jira issue only when the email was already opened. It reduces confusion and speeds up security follow up.
An incoming alert from your email security tool triggers a webhook in n8n. The flow pulls message details, then looks up the recipient’s Slack account by their mailbox address. If a Slack user is found, a direct message explains why the email is missing and what to do next. The logic also checks if the email was opened using the read at field. If true, a code step prepares a table of flagged rules and a Jira issue is created with a clear summary and description. If the user is not in Slack or the email was not opened, the flow exits without noise.
Set up needs API access to the email security platform, a Slack app with users read email and im write scopes, and a Jira project with the right issue type. Expect faster response, fewer help desk tickets, and cleaner handoffs to incident response. Good fits include IT and security teams that quarantine suspicious emails and want direct user alerts plus a ticket only when risk is higher.