Analyze security events to evaluate AI-generated responses, improve AI performance, and shape the next generation of AI-powered security tools. 2+ years of experience in SOC, incident response, or security operations required. Strong analytical skills and ability to work independently.
Key Highlights
Key Responsibilities
Technical Skills Required
Benefits & Perks
Nice to Have
Job Description
Incident Response Analyst (AI Training)
About The Role
We're partnering with leading AI research labs to build the next generation of AI-powered security tools — and we need real incident responders to make it happen. Your hands-on SOC experience will directly shape how AI systems detect threats, correlate alerts, and support digital investigations.
This isn't a typical analyst role. You'll apply your security expertise to evaluate and improve AI models, ensuring they think and respond the way experienced practitioners actually do. Your knowledge becomes the standard that AI is trained against.
- Organization: Alignerr
- Type: Hourly Contract
- Location: Remote
- Commitment: 10–40 hours/week
- Analyze realistic security events, alerts, and incident cases to evaluate AI-generated responses
- Assess impact, root cause, and appropriate remediation steps across a variety of threat scenarios
- Review detection rules, alerting pipelines, and investigative playbooks for accuracy and real-world applicability
- Validate that AI-generated incident analysis reflects how modern security operations teams actually work
- Provide structured, expert feedback that directly improves AI performance in security contexts
- Work independently and asynchronously on task-based assignments
Interested in remote work opportunities in IT & Network Engineering? Discover IT & Network Engineering Remote Jobs featuring exclusive positions from top companies that offer flexible work arrangements.
- 2+ years of experience in a SOC, incident response, or security operations role
- Hands-on familiarity with SIEM platforms, alert queues, and investigation tooling
- Strong ability to distinguish meaningful threats from noise in high-volume alert environments
- Methodical thinker who can clearly document findings and reasoning
- Self-motivated and comfortable working independently on a flexible schedule
Browse our curated collection of remote jobs across all categories and industries, featuring positions from top companies worldwide.
- Experience with threat hunting, digital forensics, or malware analysis
- Familiarity with frameworks like MITRE ATT&CK or NIST incident response guidelines
- Background in cloud security, endpoint detection, or network forensics
- Prior experience with AI evaluation, annotation, or data labeling workflows
- Work on frontier AI systems being built with the world's top research labs
- Fully remote and flexible — work on your own schedule, wherever you are
- Freelance autonomy: no meetings, no office politics, just focused, meaningful work
- Contribute to AI that could redefine how the security industry operates
- Potential for ongoing work and contract extension based on performance
Similar Jobs
Explore other opportunities that match your interests
Senior Network Engineer
NTT DATA, Inc.
global s&op community