Threat Intelligence Analyst

Threat Intelligence Analyst

Posted 4 days ago by Alignerr

Negotiable
Undetermined
Remote
Manchester, England, United Kingdom

Summary: The Threat Intelligence Analyst role focuses on collaborating with AI research labs to enhance AI systems' understanding of cybersecurity threats. The position requires expertise in threat intelligence to analyze adversary behavior and validate data for AI training. This opportunity allows professionals to contribute to the development of next-generation security tools while working remotely. Candidates will engage in independent, task-based assignments that leverage their knowledge of threat intelligence beyond traditional SOC environments.

Key Responsibilities:

  • Analyze and classify real-world threat reports, adversary campaigns, and attacker behavior.
  • Evaluate indicators of compromise (IOCs), TTPs, and end-to-end attack narratives for accuracy and realism.
  • Generate, structure, and validate threat intelligence data used to train and assess AI systems.
  • Review AI-generated cybersecurity outputs and flag inaccuracies, hallucinations, or unrealistic scenarios.
  • Apply knowledge of attacker tradecraft to distinguish authentic threat behavior from noise or fabricated data.
  • Work independently and asynchronously on task-based assignments.

Key Skills:

  • 2+ years of hands-on experience in threat intelligence, SOC analysis, or security research.
  • Solid familiarity with MITRE ATT&CK, OSINT collection methodologies, or CTI workflows.
  • Able to critically evaluate attacker behavior and identify what's realistic versus what's not.
  • Strong analytical thinking and structured written communication skills.
  • Self-directed and comfortable working independently on remote, task-based projects.
  • Experience writing or editing threat intelligence reports or advisories (nice to have).
  • Background in malware analysis, incident response, or red teaming (nice to have).
  • Familiarity with AI or data labeling workflows (nice to have).
  • Certifications such as GCTI, GCIA, CEH, or equivalent (nice to have).

Salary (Rate): £35.00/hr

City: Manchester

Country: United Kingdom

Working Arrangements: remote

IR35 Status: undetermined

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Threat Intelligence Analyst (AI Training)

About The Role

We're partnering with leading AI research labs to build smarter, more security-aware AI systems — and we need experienced threat intelligence professionals to make it happen. Your real-world knowledge of adversaries, campaigns, and CTI workflows will directly shape how AI understands and reasons about cybersecurity threats. This is a rare opportunity to apply your threat intelligence expertise beyond the SOC — contributing to frontier AI development that will influence the next generation of security tooling and research.

Organization: Alignerr

Type: Hourly Contract

Location: Remote

Commitment: 10–40 hours/week

What You'll Do

  • Analyze and classify real-world threat reports, adversary campaigns, and attacker behavior
  • Evaluate indicators of compromise (IOCs), TTPs, and end-to-end attack narratives for accuracy and realism
  • Generate, structure, and validate threat intelligence data used to train and assess AI systems
  • Review AI-generated cybersecurity outputs and flag inaccuracies, hallucinations, or unrealistic scenarios
  • Apply your knowledge of attacker tradecraft to distinguish authentic threat behavior from noise or fabricated data
  • Work independently and asynchronously on task-based assignments

Who You Are

  • 2+ years of hands-on experience in threat intelligence, SOC analysis, or security research
  • Solid familiarity with MITRE ATT&CK, OSINT collection methodologies, or CTI workflows
  • Able to critically evaluate attacker behavior and identify what's realistic versus what's not
  • Strong analytical thinking and structured written communication skills
  • Self-directed and comfortable working independently on remote, task-based projects

Nice to Have

  • Experience writing or editing threat intelligence reports or advisories
  • Background in malware analysis, incident response, or red teaming
  • Familiarity with AI or data labeling workflows
  • Certifications such as GCTI, GCIA, CEH, or equivalent

Why Join Us

  • Work directly on cutting-edge AI projects with top-tier research labs
  • Fully remote and flexible — work on your own schedule
  • Apply your security expertise in a high-impact, forward-looking context
  • Freelance perks: autonomy, variety, and global collaboration
  • Meaningful work that helps AI reason more accurately about real-world cyber threats
  • Potential for ongoing work and contract extension