Incident Response Analyst (AI Training) - Hourly Contract

Alignerr United Kingdom
Remote
Apply
AI Summary

Analyze realistic security events, alerts, and incident cases to evaluate AI-generated responses. Assess impact, root cause, and appropriate remediation steps across a range of threat scenarios. Provide structured feedback that directly improves AI reasoning in security contexts.

Key Highlights
Analyze AI-generated responses
Assess impact and root cause of security incidents
Provide structured feedback to improve AI reasoning
Key Responsibilities
Analyze realistic security events, alerts, and incident cases
Assess impact, root cause, and appropriate remediation steps
Provide structured feedback that directly improves AI reasoning in security contexts
Technical Skills Required
SIEM platforms Alert queues Investigation tooling
Benefits & Perks
Flexible work arrangement
Remote work
Potential for ongoing work and contract extension
Nice to Have
Threat hunting
Forensic analysis
Red/blue team operations

Job Description


Incident Response Analyst (AI Training)

About The Role

We're partnering with leading AI research labs to build the next generation of AI-powered security tools — and we need experienced incident responders to make it happen. Your real-world expertise in threat detection, alert triage, and digital investigations will directly shape how AI understands and responds to modern security incidents.

This is a unique opportunity to move beyond the day-to-day grind of the SOC and contribute to something bigger: AI systems that could transform how security teams operate at scale.

  • Organization: Alignerr
  • Type: Hourly Contract
  • Location: Remote
  • Commitment: 10–40 hours/week (flexible)

What You'll Do

  • Analyze realistic security events, alerts, and incident cases to evaluate AI-generated responses
  • Assess impact, root cause, and appropriate remediation steps across a range of threat scenarios
  • Review and validate detection rules, alerting pipelines, and investigative playbooks
  • Identify gaps where AI analysis diverges from how real security teams think and operate
  • Provide structured feedback that directly improves AI reasoning in security contexts
  • Work independently and asynchronously on your own schedule

Who You Are

  • 2+ years of hands-on experience in SOC operations, incident response, or security investigations
  • Comfortable working with SIEM platforms, alert queues, and investigation tooling
  • Strong instinct for separating signal from noise in high-volume alert environments
  • Able to articulate the why behind triage and response decisions clearly and concisely
  • Detail-oriented and self-motivated in a remote, async work environment

Nice to Have

  • Experience with threat hunting, forensic analysis, or red/blue team operations
  • Familiarity with frameworks like MITRE ATT&CK, NIST, or SANS incident response methodology
  • Prior exposure to AI evaluation, annotation, or data labeling workflows

Why Join Us

  • Work on cutting-edge AI projects alongside top-tier research labs
  • Fully remote and flexible — work when and how much suits you
  • Freelance perks: autonomy, variety, and collaboration with a global expert community
  • Put your security expertise to work on problems that matter beyond the alert queue
  • Potential for ongoing work and contract extension

Similar Jobs

Explore other opportunities that match your interests

Visa Sponsorship Relocation Remote
Job Type Contract
Experience Level Mid-Senior level

Haystack

United Kingdom
Visa Sponsorship Relocation Remote
Job Type Contract
Experience Level Mid-Senior level

MRJ Recruitment

United Kingdom

VMware Telco Consultant

Networking
19h ago
Visa Sponsorship Relocation Remote
Job Type Part-time
Experience Level Mid-Senior level

apps it limited

United Kingdom

Subscribe our newsletter

New Things Will Always Update Regularly