Analyze realistic security events, alerts, and incident cases to evaluate AI-generated responses. Assess impact, root cause, and appropriate remediation steps across a range of threat scenarios. Provide structured feedback that directly improves AI reasoning in security contexts.
Key Highlights
Key Responsibilities
Technical Skills Required
Benefits & Perks
Nice to Have
Job Description
Incident Response Analyst (AI Training)
About The Role
We're partnering with leading AI research labs to build the next generation of AI-powered security tools — and we need experienced incident responders to make it happen. Your real-world expertise in threat detection, alert triage, and digital investigations will directly shape how AI understands and responds to modern security incidents.
This is a unique opportunity to move beyond the day-to-day grind of the SOC and contribute to something bigger: AI systems that could transform how security teams operate at scale.
- Organization: Alignerr
- Type: Hourly Contract
- Location: Remote
- Commitment: 10–40 hours/week (flexible)
- Analyze realistic security events, alerts, and incident cases to evaluate AI-generated responses
- Assess impact, root cause, and appropriate remediation steps across a range of threat scenarios
- Review and validate detection rules, alerting pipelines, and investigative playbooks
- Identify gaps where AI analysis diverges from how real security teams think and operate
- Provide structured feedback that directly improves AI reasoning in security contexts
- Work independently and asynchronously on your own schedule
Interested in remote work opportunities in IT & Network Engineering? Discover IT & Network Engineering Remote Jobs featuring exclusive positions from top companies that offer flexible work arrangements.
- 2+ years of hands-on experience in SOC operations, incident response, or security investigations
- Comfortable working with SIEM platforms, alert queues, and investigation tooling
- Strong instinct for separating signal from noise in high-volume alert environments
- Able to articulate the why behind triage and response decisions clearly and concisely
- Detail-oriented and self-motivated in a remote, async work environment
Browse our curated collection of remote jobs across all categories and industries, featuring positions from top companies worldwide.
- Experience with threat hunting, forensic analysis, or red/blue team operations
- Familiarity with frameworks like MITRE ATT&CK, NIST, or SANS incident response methodology
- Prior exposure to AI evaluation, annotation, or data labeling workflows
- Work on cutting-edge AI projects alongside top-tier research labs
- Fully remote and flexible — work when and how much suits you
- Freelance perks: autonomy, variety, and collaboration with a global expert community
- Put your security expertise to work on problems that matter beyond the alert queue
- Potential for ongoing work and contract extension
Similar Jobs
Explore other opportunities that match your interests
Haystack
MRJ Recruitment