Incident Response Analyst

Incident Response Analyst

Posted 1 day ago by Alignerr

Negotiable
Undetermined
Remote
London, England, United Kingdom

Summary: The Incident Response Analyst at Alignerr will engage with leading AI research teams to develop and test AI systems for interpreting security events and supporting digital investigations. The role involves analyzing security incidents using realistic data to ensure AI-driven analysis aligns with real-world operations. This is a contract position with flexible hours, allowing for a commitment of 10 to 40 hours per week. The ideal candidate will have experience in security operations and a strong understanding of incident response protocols.

Key Responsibilities:

  • Examine security events, alerts, and incident cases
  • Determine impact, root cause, and appropriate remediation
  • Evaluate detection rules, alerting pipelines, and investigative playbooks
  • Verify that AI-generated incident analysis reflects real-world security operations

Key Skills:

  • 2+ years in SOC, incident response, or security operations
  • Experience with SIEM platforms, alert queues, and investigation tools
  • Ability to separate meaningful threats from background noise

Salary (Rate): £60.00/hour

City: London

Country: United Kingdom

Working Arrangements: remote

IR35 Status: undetermined

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

About The Job

At Alignerr, we partner with the world’s leading AI research teams and labs to build and train cutting-edge AI models. We’re developing and testing AI systems designed to interpret security events, correlate alerts, and support digital investigations across modern environments. You will work with realistic incident data to ensure AI-driven analysis reflects how real response teams operate.

Organization : Alignerr

Position : Incident Response Analyst

Type : Contract / Task-Based

Compensation : $30–$60 /hour

Location : Remote

Commitment : 10–40 hours/week

What You’ll Do

  • Examine security events, alerts, and incident cases
  • Determine impact, root cause, and appropriate remediation
  • Evaluate detection rules, alerting pipelines, and investigative playbooks
  • Verify that AI-generated incident analysis reflects real-world security operations

What We’re Looking For

  • 2+ years in SOC, incident response, or security operations
  • Experience with SIEM platforms, alert queues, and investigation tools
  • Ability to separate meaningful threats from background noise

Why Join Us

  • Competitive pay and flexible remote work.
  • Work directly on frontier AI systems.
  • Freelance perks: autonomy, flexibility, and global collaboration.
  • Potential for contract extension.

Application Process (Takes 10–15 min)

  • Submit your resume
  • Complete a short screening
  • Project matching and onboarding

PS: Our team reviews applications daily. Please complete your AI interview and application steps to be considered for this opportunity.