Threat Intelligence Analyst (AI Training)

Alignerr United State
Remote
Apply
AI Summary

Analyze and classify real-world threat reports to shape AI understanding of cybersecurity threats. Evaluate indicators of compromise and generate threat intelligence data. Apply security knowledge to distinguish genuine attacker behavior.

Key Highlights
Analyze and classify threat reports
Evaluate indicators of compromise
Generate threat intelligence data
Key Responsibilities
Analyze and classify real-world threat reports
Evaluate indicators of compromise (IOCs), TTPs, and end-to-end kill chains
Generate, structure, and validate threat intelligence data used to train and assess AI models
Technical Skills Required
MITRE ATT&CK OSINT collection methodologies CTI production workflows
Benefits & Perks
Fully remote work
Flexible work arrangement
Potential for ongoing work and contract extension
Nice to Have
Experience writing or reviewing finished intelligence products (threat reports, advisories, briefings)
Familiarity with threat actor tracking, attribution, or campaign clustering

Job Description


Threat Intelligence Analyst (AI Training)

About The Role

We partner with the world's leading AI research labs to build smarter, more capable AI systems — and we need experienced threat intelligence professionals to make it happen.

Your real-world expertise in adversary tracking, campaign analysis, and CTI workflows will directly shape how AI understands and reasons about cybersecurity threats. This is a rare opportunity to put your security knowledge to work on frontier AI — without leaving your home office.

  • Organization: Alignerr
  • Type: Hourly Contract
  • Location: Remote
  • Commitment: 10–40 hours/week

What You'll Do

  • Analyze and classify real-world threat reports, adversary campaigns, and attack narratives
  • Evaluate indicators of compromise (IOCs), TTPs, and end-to-end kill chains
  • Generate, structure, and validate threat intelligence data used to train and assess AI models
  • Review AI-generated security outputs for accuracy, consistency, and analytical soundness
  • Apply your practitioner knowledge to distinguish genuine attacker behavior from noise or fabricated data

Who You Are

  • 2+ years of hands-on experience in threat intelligence, SOC analysis, or security research
  • Familiar with MITRE ATT&CK, OSINT collection methodologies, or CTI production workflows
  • Able to critically evaluate threat reporting and identify what's credible, what's missing, and what's wrong
  • Strong analytical thinker with clear written communication skills
  • Self-directed and comfortable working asynchronously on task-based assignments

Nice to Have

  • Experience writing or reviewing finished intelligence products (threat reports, advisories, briefings)
  • Familiarity with threat actor tracking, attribution, or campaign clustering
  • Background in red teaming, malware analysis, or incident response
  • Prior exposure to AI evaluation or data annotation workflows

Why Join Us

  • Work directly on cutting-edge AI projects with top-tier research labs
  • Fully remote and flexible — work on your own schedule
  • Freelance perks: autonomy, variety, and global collaboration
  • Apply deep security expertise to a meaningful new domain
  • Potential for ongoing work and contract extension

Similar Jobs

Explore other opportunities that match your interests

Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

aux partners

United State

Senior Systems Engineer

Networking
7h ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

DLB Associates

United State

Senior Systems Engineer

Networking
8h ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

lightspeed

United State

Subscribe our newsletter

New Things Will Always Update Regularly