Threat Intelligence Analyst

Threat Intelligence Analyst

Posted 1 week ago by Alignerr

Negotiable
Undetermined
Remote
London, England, United Kingdom

Summary: The Threat Intelligence Analyst role involves collaborating with leading AI research teams to enhance AI models with real-world cybersecurity insights. Candidates will analyze threat reports and adversary behaviors, contributing to the development of AI systems that understand cybersecurity threats. This position is fully remote and offers flexible hours, allowing professionals to work independently on task-based assignments. The role requires a strong background in threat intelligence and the ability to produce actionable intelligence for AI training purposes.

Key Responsibilities:

  • Analyze and classify threat reports, adversary campaigns, and attacker behavior patterns
  • Evaluate indicators of compromise, TTPs, and end-to-end attack narratives for accuracy and realism
  • Generate, structure, and validate threat intelligence data used to train and assess AI systems
  • Review AI-generated cybersecurity outputs and flag inaccuracies, inconsistencies, or fabricated content
  • Apply knowledge of real attacker behavior to distinguish credible intelligence from noise
  • Work independently and asynchronously on task-based assignments at your own pace

Key Skills:

  • 2+ years of experience in threat intelligence, SOC analysis, or security research
  • Familiarity with MITRE ATT&CK, OSINT collection, or cyber threat intelligence (CTI) workflows
  • Strong ability to distinguish genuine attacker behavior from synthetic or inaccurate data
  • Analytical, detail-oriented, and capable of producing clear written assessments
  • Comfortable working independently on structured, task-based projects
  • Experience writing threat intelligence reports or producing finished intelligence products (nice to have)
  • Familiarity with tracking APT groups, ransomware operators, or nation-state campaigns (nice to have)
  • Background in malware analysis, incident response, or vulnerability research (nice to have)
  • Prior experience with AI training, data labeling, or content evaluation workflows (nice to have)

Salary (Rate): £35.00/hr

City: London

Country: United Kingdom

Working Arrangements: remote

IR35 Status: undetermined

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Threat Intelligence Analyst (AI Training)

About The Role

We partner with the world's leading AI research teams and labs to build and train cutting-edge AI models. Now, we're looking for experienced threat intelligence professionals to bring real-world adversary knowledge to frontier AI development. Your expertise in tracking campaigns, analyzing TTPs, and producing actionable intelligence will directly shape how AI systems understand and reason about cybersecurity threats — making a meaningful impact on the future of AI safety and capability.

Organization: Alignerr

Type: Hourly Contract

Commitment: 10–40 hours/week

Location: Remote

What You'll Do

  • Analyze and classify threat reports, adversary campaigns, and attacker behavior patterns
  • Evaluate indicators of compromise, TTPs, and end-to-end attack narratives for accuracy and realism
  • Generate, structure, and validate threat intelligence data used to train and assess AI systems
  • Review AI-generated cybersecurity outputs and flag inaccuracies, inconsistencies, or fabricated content
  • Apply your knowledge of real attacker behavior to distinguish credible intelligence from noise
  • Work independently and asynchronously on task-based assignments at your own pace

Who You Are

  • 2+ years of experience in threat intelligence, SOC analysis, or security research
  • Familiar with MITRE ATT&CK, OSINT collection, or cyber threat intelligence (CTI) workflows
  • Strong ability to distinguish genuine attacker behavior from synthetic or inaccurate data
  • Analytical, detail-oriented, and capable of producing clear written assessments
  • Comfortable working independently on structured, task-based projects

Nice to Have

  • Experience writing threat intelligence reports or producing finished intelligence products
  • Familiarity with tracking APT groups, ransomware operators, or nation-state campaigns
  • Background in malware analysis, incident response, or vulnerability research
  • Prior experience with AI training, data labeling, or content evaluation workflows

Why Join Us

  • Work directly on frontier AI systems alongside top research labs
  • Fully remote and flexible — work on your own schedule
  • Freelance perks: autonomy, variety, and global collaboration
  • Apply your cybersecurity expertise in a high-impact, cutting-edge domain
  • Potential for ongoing work and contract extension