We're seeking an Incident Response Analyst to work with AI research labs, analyzing security events and shaping AI-driven analysis. This role requires 2+ years of SOC analysis experience and proficiency in SIEM platforms.
Key Highlights
Key Responsibilities
Technical Skills Required
Benefits & Perks
Nice to Have
Job Description
Incident Response Analyst (AI Training)
About The Role
We're partnering with leading AI research labs to build the next generation of cybersecurity AI — and we need real security professionals to make it credible. As an Incident Response Analyst, you'll work with realistic incident data, security alerts, and investigation scenarios to ensure AI-driven analysis reflects how actual response teams think and operate.
This is a unique opportunity to directly influence how AI handles threat detection, incident triage, and digital investigations — work that matters well beyond any single engagement.
- Organization: Alignerr
- Type: Hourly Contract
- Location: Remote
- Commitment: 10–40 hours/week
- Analyze realistic security events, alerts, and incident cases drawn from modern environments
- Assess impact, determine root cause, and identify appropriate remediation strategies
- Evaluate detection rules, alerting pipelines, and investigative playbooks for quality and accuracy
- Review and validate AI-generated incident analysis to ensure it reflects real-world SOC operations
- Provide structured, expert feedback that directly shapes how AI models reason about cybersecurity threats
Interested in remote work opportunities in IT & Network Engineering? Discover IT & Network Engineering Remote Jobs featuring exclusive positions from top companies that offer flexible work arrangements.
- 2+ years of hands-on experience in SOC analysis, incident response, or security operations
- Proficient with SIEM platforms, alert queues, and common investigation tooling
- Skilled at distinguishing meaningful threats from background noise
- Detail-oriented and able to communicate technical findings clearly in writing
- Self-motivated and comfortable working independently on task-based assignments
Browse our curated collection of remote jobs across all categories and industries, featuring positions from top companies worldwide.
- Experience with threat hunting, digital forensics, or malware analysis
- Familiarity with frameworks such as MITRE ATT&CK or NIST IR
- Background in writing or reviewing detection logic and response playbooks
- Prior exposure to AI evaluation or data annotation workflows
- Work on frontier AI systems alongside top-tier research teams
- Fully remote and async — work on your own schedule, from anywhere
- Freelance autonomy with meaningful, intellectually engaging work
- Contribute to AI that will shape how cybersecurity investigations are conducted globally
- Potential for ongoing work and contract extension as projects evolve
Similar Jobs
Explore other opportunities that match your interests
agility pr solutions
Alignerr