Incident Response Analyst for AI Training

Alignerr • South Africa
Remote
Apply
AI Summary

Partner with world-leading AI research labs to train and evaluate AI systems for security incident response. Analyze security events, assess AI outputs, and provide structured feedback. 2+ years of experience in a SOC, incident response, or security operations role required.

Key Highlights
Analyze realistic security events and alerts
Assess AI outputs for accuracy
Provide structured feedback to improve AI-driven analysis
Key Responsibilities
Analyze realistic security events, alerts, and incident cases
Assess AI outputs for accuracy in determining impact, root cause, and appropriate remediation steps
Review detection rules, alerting pipelines, and investigative playbooks for real-world validity
Technical Skills Required
SIEM platforms Alert queues Investigation tooling
Benefits & Perks
Fully remote work
Flexible schedule
Potential for ongoing work and contract extension
Nice to Have
Experience writing or tuning detection rules and playbooks
Familiarity with threat intelligence frameworks (e.g., MITRE ATT&CK)

Job Description


Incident Response Analyst (AI Training)

About The Role

We're partnering with world-leading AI research labs to build the next generation of AI-powered security tools. As an Incident Response Analyst, you'll bring your real-world SOC experience to help train and evaluate AI systems designed to detect threats, correlate alerts, and support digital investigations — the way a seasoned analyst actually would.

Your expertise directly shapes how AI understands and responds to security incidents at scale. This is a rare opportunity to influence the future of cybersecurity AI from the comfort of your own setup.

  • Organization: Alignerr
  • Type: Hourly Contract
  • Location: Remote
  • Commitment: 10–40 hours/week

What You'll Do

  • Analyze realistic security events, alerts, and incident cases to evaluate AI-generated responses
  • Assess AI outputs for accuracy in determining impact, root cause, and appropriate remediation steps
  • Review detection rules, alerting pipelines, and investigative playbooks for real-world validity
  • Provide structured feedback that ensures AI-driven analysis reflects how modern response teams actually operate
  • Work independently and asynchronously on task-based assignments — on your own schedule

Who You Are

  • 2+ years of hands-on experience in a SOC, incident response, or security operations role
  • Familiar with SIEM platforms, alert queues, and investigation tooling
  • Skilled at triaging alerts and separating genuine threats from noise
  • Able to clearly articulate analytical reasoning in written form
  • Detail-oriented and comfortable working independently

Nice to Have

  • Experience writing or tuning detection rules and playbooks
  • Familiarity with threat intelligence frameworks (e.g., MITRE ATT&CK)
  • Background in digital forensics or threat hunting
  • Prior exposure to AI evaluation or annotation workflows

Why Join Us

  • Work on frontier AI projects with top-tier research labs and teams
  • Fully remote and flexible — complete tasks on your own schedule
  • Freelance perks: autonomy, variety, and collaboration with global security professionals
  • Make a real impact on how AI handles cybersecurity challenges worldwide
  • Potential for ongoing work and contract extension

Similar Jobs

Explore other opportunities that match your interests

Senior IT Service Manager (MSP)

Networking
•
5d ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

HIREXE

South Africa

L2/L3 Support Engineer

Networking
•
3w ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

Supportwave

South Africa
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

Cloud Decisions

South Africa

Subscribe our newsletter

New Things Will Always Update Regularly