Negotiable
Undetermined
Remote
United Kingdom
Summary: The Threat Intelligence Analyst role involves collaborating with AI research labs to enhance AI systems through expert threat intelligence. Candidates will analyze and validate threat data, contributing to AI's understanding of cybersecurity. This position offers flexible, fully remote work, allowing professionals to apply their skills in a unique context. The role requires a minimum of 2 years of relevant experience in threat intelligence or security research.
Key Responsibilities:
- Analyze and classify real-world threat reports, adversary campaigns, and attack narratives
- Evaluate indicators of compromise, TTPs, and end-to-end attack chains for accuracy and realism
- Generate, structure, and validate threat intelligence data used to train and benchmark AI systems
- Review AI-generated cybersecurity outputs and flag inaccuracies, gaps, or fabricated indicators
- Apply knowledge of attacker behavior to distinguish signal from noise in AI-generated content
Key Skills:
- 2+ years of experience in threat intelligence, SOC analysis, or security research
- Solid working knowledge of MITRE ATT&CK, OSINT collection, or CTI workflows
- Able to critically evaluate threat reports and identify realistic versus fabricated adversary behavior
- Strong analytical and written communication skills
- Detail-oriented, self-motivated, and comfortable working asynchronously
- Experience with threat intelligence platforms (TIPs) or SIEM tools (nice to have)
- Background in red teaming, malware analysis, or incident response (nice to have)
- Familiarity with AI evaluation or data annotation workflows (nice to have)
Salary (Rate): £35.00/hr
City: undetermined
Country: United Kingdom
Working Arrangements: remote
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
Threat Intelligence Analyst (AI Training)
About The Role
We're partnering with leading AI research labs to build smarter, more accurate AI systems — and we need seasoned threat intelligence professionals to make it happen. Your real-world experience tracking adversaries, analyzing campaigns, and communicating threat data will directly shape how AI understands and reasons about cybersecurity. This is a unique opportunity to apply your CTI expertise beyond the SOC — contributing to frontier AI development on your own schedule, fully remote.
Organization: Alignerr
Type: Hourly Contract
Location: Remote
Commitment: 10–40 hours/week
What You'll Do
- Analyze and classify real-world threat reports, adversary campaigns, and attack narratives
- Evaluate indicators of compromise, TTPs, and end-to-end attack chains for accuracy and realism
- Generate, structure, and validate threat intelligence data used to train and benchmark AI systems
- Review AI-generated cybersecurity outputs and flag inaccuracies, gaps, or fabricated indicators
- Apply your knowledge of attacker behavior to distinguish signal from noise in AI-generated content
Who You Are
- 2+ years of experience in threat intelligence, SOC analysis, or security research
- Solid working knowledge of MITRE ATT&CK, OSINT collection, or CTI workflows
- Able to critically evaluate threat reports and identify realistic versus fabricated adversary behavior
- Strong analytical and written communication skills
- Detail-oriented, self-motivated, and comfortable working asynchronously
Nice to Have
- Experience with threat intelligence platforms (TIPs) or SIEM tools
- Background in red teaming, malware analysis, or incident response
- Familiarity with AI evaluation or data annotation workflows
Why Join Us
- Work directly on cutting-edge AI projects with top-tier research labs
- Fully remote and flexible — work on your schedule, at your pace
- Freelance autonomy with meaningful, intellectually engaging work
- Collaborate with a global network of security and AI professionals
- Potential for ongoing work and contract extension