Threat Intelligence Analyst

Threat Intelligence Analyst

Posted Today by Alignerr

Negotiable
Undetermined
Remote
Manchester, England, United Kingdom

Summary: The Threat Intelligence Analyst role at Alignerr involves analyzing and classifying threat reports and adversary behavior to support the development of AI models. The position requires expertise in threat intelligence workflows and the ability to evaluate attack narratives and indicators. Analysts will work remotely and are expected to commit between 10 to 40 hours per week. The role offers competitive pay and the opportunity to work on cutting-edge AI systems.

Key Responsibilities:

  • Analyze and classify threat reports, campaigns, and adversary behavior
  • Evaluate indicators, TTPs, and end-to-end attack narratives
  • Help generate, structure, and validate threat-intelligence data used to train and assess AI systems
  • Review AI-generated outputs for accuracy and consistency

Key Skills:

  • 2+ years in threat intelligence, SOC, or security analysis roles
  • Familiar with MITRE ATT&CK, OSINT collection, or CTI workflows
  • Ability to distinguish real attacker behavior from noise or fabricated data
  • Strong analytical, research, and writing skills

Salary (Rate): £60.00 hourly

City: Manchester

Country: United Kingdom

Working Arrangements: remote

IR35 Status: undetermined

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

About The Job At Alignerr, we partner with the world’s leading AI research teams and labs to build and train cutting-edge AI models. We’re looking for analysts who understand adversaries, campaigns, and real-world threat-intelligence workflows. You will work with realistic reporting, indicators, and attack narratives to help model how threats are tracked, analyzed, and communicated in practice.

Organization : Alignerr

Position : Threat Intelligence Analyst

Type : Contract / Task-Based

Compensation : $35–$60 /hour

Location : Remote

Commitment : 10–40 hours/week

What You’ll Do

  • Analyze and classify threat reports, campaigns, and adversary behavior
  • Evaluate indicators, TTPs, and end-to-end attack narratives
  • Help generate, structure, and validate threat-intelligence data used to train and assess AI systems
  • Review AI-generated outputs for accuracy and consistency

What We’re Looking For

  • 2+ years in threat intelligence, SOC, or security analysis roles
  • Familiar with MITRE ATT&CK, OSINT collection, or CTI workflows
  • Ability to distinguish real attacker behavior from noise or fabricated data
  • Strong analytical, research, and writing skills

Why Join Us

  • Competitive pay and flexible remote work.
  • Work directly on frontier AI systems.
  • Freelance perks: autonomy, flexibility, and global collaboration.
  • Potential for contract extension.

Application Process (Takes 10–15 min)

  • Submit your resume
  • Complete a short screening
  • Project matching and onboarding

PS: Our team reviews applications daily. Please complete your AI interview and application steps to be considered for this opportunity.