Incident Response Analyst for AI Training

Alignerr Canada
Remote
Apply
AI Summary

We're seeking an Incident Response Analyst to work with AI research labs, analyzing security events and shaping AI-driven analysis. This role requires 2+ years of SOC analysis experience and proficiency in SIEM platforms.

Key Highlights
Analyze realistic security events and alerts
Assess impact and determine root cause
Shape AI-driven analysis for cybersecurity threats
Key Responsibilities
Analyze realistic security events, alerts, and incident cases
Assess impact, determine root cause, and identify remediation strategies
Review and validate AI-generated incident analysis
Technical Skills Required
SIEM platforms Alert queues Common investigation tooling
Benefits & Perks
Fully remote work
Freelance autonomy
Potential for ongoing work and contract extension
Nice to Have
Threat hunting
Digital forensics
Malware analysis

Job Description


Incident Response Analyst (AI Training)

About The Role

We're partnering with leading AI research labs to build the next generation of cybersecurity AI — and we need real security professionals to make it credible. As an Incident Response Analyst, you'll work with realistic incident data, security alerts, and investigation scenarios to ensure AI-driven analysis reflects how actual response teams think and operate.

This is a unique opportunity to directly influence how AI handles threat detection, incident triage, and digital investigations — work that matters well beyond any single engagement.

  • Organization: Alignerr
  • Type: Hourly Contract
  • Location: Remote
  • Commitment: 10–40 hours/week

What You'll Do

  • Analyze realistic security events, alerts, and incident cases drawn from modern environments
  • Assess impact, determine root cause, and identify appropriate remediation strategies
  • Evaluate detection rules, alerting pipelines, and investigative playbooks for quality and accuracy
  • Review and validate AI-generated incident analysis to ensure it reflects real-world SOC operations
  • Provide structured, expert feedback that directly shapes how AI models reason about cybersecurity threats

Who You Are

  • 2+ years of hands-on experience in SOC analysis, incident response, or security operations
  • Proficient with SIEM platforms, alert queues, and common investigation tooling
  • Skilled at distinguishing meaningful threats from background noise
  • Detail-oriented and able to communicate technical findings clearly in writing
  • Self-motivated and comfortable working independently on task-based assignments

Nice to Have

  • Experience with threat hunting, digital forensics, or malware analysis
  • Familiarity with frameworks such as MITRE ATT&CK or NIST IR
  • Background in writing or reviewing detection logic and response playbooks
  • Prior exposure to AI evaluation or data annotation workflows

Why Join Us

  • Work on frontier AI systems alongside top-tier research teams
  • Fully remote and async — work on your own schedule, from anywhere
  • Freelance autonomy with meaningful, intellectually engaging work
  • Contribute to AI that will shape how cybersecurity investigations are conducted globally
  • Potential for ongoing work and contract extension as projects evolve

Similar Jobs

Explore other opportunities that match your interests

IT Support Specialist

Networking
3d ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Entry level

agility pr solutions

Canada
Visa Sponsorship Relocation Remote
Job Type Contract
Experience Level Entry level

Alignerr

Canada

Senior Database Administrator

Networking
6d ago
Visa Sponsorship Relocation Remote
Job Type Contract
Experience Level Mid-Senior level

tekstaff it solutions

Canada

Subscribe our newsletter

New Things Will Always Update Regularly