Analyze realistic security incident data to train and evaluate AI systems for security operations. Assess AI outputs, classify threats, and provide feedback to improve AI reasoning. Requires 2+ years of SOC/IR experience and familiarity with SIEM platforms.
Key Highlights
Key Responsibilities
Technical Skills Required
Benefits & Perks
Nice to Have
Job Description
Security Operations Analyst (AI Training)
About The Role
We're partnering with leading AI research labs to build and evaluate next-generation AI systems designed for real-world security operations. As a Security Operations Analyst, you'll work with realistic SOC scenarios and incident data to ensure AI reasoning reflects how experienced analysts actually detect, triage, and respond to threats.
Your expertise directly shapes how AI understands security — making future tools smarter, more accurate, and more useful for defenders everywhere.
- Organization: Alignerr
- Type: Hourly Contract
- Location: Remote
- Commitment: 10–40 hours/week
- Analyze realistic incident and alert scenarios to assess what's happening and why it matters
- Classify severity levels, identify root causes, and recommend appropriate response actions
- Review detection logic, triage workflows, and investigation playbooks for accuracy and completeness
- Evaluate AI-generated security outputs and provide structured feedback based on real analyst judgment
- Help distinguish true positive signals from noise and false positives in complex alert environments
Interested in remote work opportunities in Cyber Security? Discover Cyber Security Remote Jobs featuring exclusive positions from top companies that offer flexible work arrangements.
- 2+ years of hands-on experience in a SOC, incident response, or security operations role
- Familiar with SIEM platforms, alert triage processes, and investigation workflows
- Strong ability to assess threat severity and determine appropriate escalation or remediation steps
- Detail-oriented with clear written communication skills
- Comfortable working independently in an asynchronous, task-based environment
Browse our curated collection of remote jobs across all categories and industries, featuring positions from top companies worldwide.
- Experience with threat hunting, detection engineering, or red/blue team operations
- Familiarity with frameworks like MITRE ATT&CK, NIST, or similar
- Background in writing or reviewing incident reports and post-mortems
- Prior exposure to AI evaluation or data annotation workflows
- Work on frontier AI systems alongside top research teams
- Fully remote and flexible — work on your own schedule
- Freelance perks: autonomy, variety, and global collaboration
- Make a meaningful impact on how AI handles real-world cybersecurity challenges
- Potential for ongoing work and contract extension
Similar Jobs
Explore other opportunities that match your interests
83zero
Alignerr