Threat Intelligence Analyst (AI Training)

Alignerr • United State
Remote
Apply
AI Summary

Analyze and classify threat reports, evaluate AI-generated cybersecurity outputs, and contribute to frontier AI research. 2+ years of experience in threat intelligence, SOC analysis, or security research required. Strong analytical and written communication skills needed.

Key Highlights
Analyze and classify threat reports
Evaluate AI-generated cybersecurity outputs
Contribute to frontier AI research
Key Responsibilities
Analyze and classify threat reports
Evaluate indicators of compromise, TTPs, and end-to-end attack narratives for accuracy and realism
Generate, structure, and validate threat intelligence data used to train and benchmark AI systems
Technical Skills Required
MITRE ATT&CK OSINT collection methodologies CTI workflows
Benefits & Perks
Fully remote and flexible
Freelance autonomy with meaningful, intellectually engaging work
Potential for ongoing work and contract extension

Job Description


Threat Intelligence Analyst (AI Training)

About The Role

We're looking for experienced Threat Intelligence Analysts to help train and evaluate cutting-edge AI systems. Your real-world knowledge of adversaries, campaigns, and CTI workflows will directly shape how AI understands and reasons about cybersecurity threats.

This is a unique opportunity to apply your security expertise in a new domain — contributing to frontier AI research without leaving your home.

  • Organization: Alignerr
  • Type: Hourly Contract
  • Location: Remote
  • Commitment: 10–40 hours/week

What You'll Do

  • Analyze and classify threat reports, adversary campaigns, and attacker behavior patterns
  • Evaluate indicators of compromise, TTPs, and end-to-end attack narratives for accuracy and realism
  • Generate, structure, and validate threat intelligence data used to train and benchmark AI systems
  • Review AI-generated cybersecurity outputs and assess them for factual accuracy, consistency, and quality
  • Help distinguish realistic attacker behavior from noise, fabricated scenarios, or low-quality data

Who You Are

  • 2+ years of experience in threat intelligence, SOC analysis, or security research
  • Familiar with MITRE ATT&CK, OSINT collection methodologies, or CTI workflows
  • Able to critically evaluate threat reports and identify inaccuracies or implausible attacker behavior
  • Strong analytical and written communication skills — you can explain complex threats clearly
  • Detail-oriented and comfortable working independently on task-based assignments

Nice to Have

  • Experience writing or reviewing threat intelligence reports or actor profiles
  • Familiarity with malware analysis, incident response, or red team operations
  • Background in cybersecurity research or vulnerability analysis

Why Join Us

  • Work directly on frontier AI systems alongside world-leading research labs
  • Fully remote and flexible — set your own schedule and workload
  • Freelance autonomy with meaningful, intellectually engaging work
  • Apply deep security expertise to a fast-growing field at the intersection of AI and cybersecurity
  • Potential for ongoing work and contract extension

Similar Jobs

Explore other opportunities that match your interests

Director of IT

Networking
•
2m ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

goodway group

United State
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Entry level

Jobs via Dice

United State

IT Support Specialist

Networking
•
3h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Entry level

ermco-eci

United State

Subscribe our newsletter

New Things Will Always Update Regularly