Security Operations Analyst (AI Training)

Alignerr • United State
Remote
Apply
AI Summary

Partner with top security and AI research teams to train and evaluate AI systems. Analyze realistic SOC scenarios, classify threat severity, and recommend response actions. Provide expert-level assessments and feedback to improve AI model performance.

Key Highlights
Analyze realistic SOC scenarios
Classify threat severity and recommend response actions
Provide expert-level assessments and feedback
Key Responsibilities
Analyze realistic SOC scenarios
Classify threat severity and recommend response actions
Provide expert-level assessments and feedback
Technical Skills Required
SIEM platforms Alert triage Security investigation workflows
Benefits & Perks
Fully remote and flexible work arrangement
Potential for ongoing work and contract extension
Nice to Have
Threat hunting
Malware analysis
Digital forensics

Job Description


Security Operations Analyst (AI Training)

About The Role

We're partnering with the world's leading AI research labs to build the next generation of AI-powered security operations tools. As a Security Operations Analyst, you'll bring your real-world SOC experience to help train and evaluate AI systems that reason through security incidents, alerts, and investigations — ensuring they reflect how skilled analysts actually work.

This is a unique opportunity to go beyond traditional security work and directly influence how AI understands and responds to cyber threats.

  • Organization: Alignerr
  • Type: Hourly Contract
  • Location: Remote
  • Commitment: 10–40 hours/week

What You'll Do

  • Analyze realistic SOC scenarios — including incident alerts, detection logs, and investigation workflows — and provide expert-level assessments
  • Classify threat severity, identify root causes, and recommend appropriate response actions
  • Review and evaluate detection logic to ensure it reflects real-world analyst reasoning
  • Validate AI outputs by assessing whether they align with how experienced security professionals triage and respond to threats
  • Provide structured, high-quality feedback that directly improves AI model performance in security contexts

Who You Are

  • 2+ years of hands-on experience in a SOC, incident response, or security operations role
  • Proficient with SIEM platforms, alert triage, and security investigation workflows
  • Skilled at distinguishing genuine threats from false positives and background noise
  • Comfortable working independently and asynchronously on task-based assignments
  • Detail-oriented, analytical, and able to communicate findings clearly in writing

Nice to Have

  • Experience with threat hunting, malware analysis, or digital forensics
  • Familiarity with frameworks like MITRE ATT&CK, NIST, or similar
  • Background in red team / blue team exercises
  • Prior exposure to AI evaluation or data annotation workflows

Why Join Us

  • Work on cutting-edge AI projects in partnership with top security and AI research teams
  • Fully remote and flexible — work on your schedule, at your own pace
  • Freelance perks: autonomy, variety, and global collaboration
  • Make a tangible impact on how AI systems handle real-world cybersecurity challenges
  • Potential for ongoing work and contract extension

Similar Jobs

Explore other opportunities that match your interests

Cybersecurity & Identity Protection Engineer

Cyber Security
•
12h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

BLACKCLOAK

United State

Cybersecurity Architect

Cyber Security
•
12h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

D&H Distributing

United State
Visa Sponsorship Relocation Remote
Job Type Contract
Experience Level Mid-Senior level

Radiant Digital

United State

Subscribe our newsletter

New Things Will Always Update Regularly