Negotiable
Undetermined
Remote
United Kingdom
Summary: The Threat Intelligence Analyst role involves collaborating with AI research labs to enhance AI systems through expert threat intelligence. Candidates will analyze real-world threat reports and adversary campaigns, contributing to AI's understanding of cybersecurity. This position offers the flexibility of remote work and a commitment of 10–40 hours per week. The role requires a minimum of 2 years of relevant experience in threat intelligence or security research.
Key Responsibilities:
- Analyze and classify real-world threat reports, adversary campaigns, and attack narratives
- Evaluate indicators of compromise, TTPs, and end-to-end attack chains for accuracy and realism
- Generate, structure, and validate threat intelligence data used to train and benchmark AI systems
- Review AI-generated cybersecurity outputs and flag inaccuracies, gaps, or fabricated indicators
- Apply knowledge of attacker behavior to distinguish signal from noise in AI-generated content
Key Skills:
- 2+ years of experience in threat intelligence, SOC analysis, or security research
- Solid working knowledge of MITRE ATT&CK, OSINT collection, or CTI workflows
- Able to critically evaluate threat reports and identify realistic versus fabricated adversary behavior
- Strong analytical and written communication skills
- Detail-oriented, self-motivated, and comfortable working asynchronously
- Experience with threat intelligence platforms (TIPs) or SIEM tools (nice to have)
- Background in red teaming, malware analysis, or incident response (nice to have)
- Familiarity with AI evaluation or data annotation workflows (nice to have)
Salary (Rate): £35.00/hr
City: undetermined
Country: United Kingdom
Working Arrangements: remote
IR35 Status: undetermined
Seniority Level: Mid-Level
Industry: IT
Threat Intelligence Analyst (AI Training)
About The Role
We're partnering with leading AI research labs to build smarter, more accurate AI systems — and we need seasoned threat intelligence professionals to make it happen. Your real-world experience tracking adversaries, analyzing campaigns, and communicating threat data will directly shape how AI understands and reasons about cybersecurity. This is a unique opportunity to apply your CTI expertise beyond the SOC — contributing to frontier AI development on your own schedule, fully remote.
Organization: Alignerr
Type: Hourly Contract
Location: Remote
Commitment: 10–40 hours/week
What You'll Do
- Analyze and classify real-world threat reports, adversary campaigns, and attack narratives
- Evaluate indicators of compromise, TTPs, and end-to-end attack chains for accuracy and realism
- Generate, structure, and validate threat intelligence data used to train and benchmark AI systems
- Review AI-generated cybersecurity outputs and flag inaccuracies, gaps, or fabricated indicators
- Apply your knowledge of attacker behavior to distinguish signal from noise in AI-generated content
Who You Are
- 2+ years of experience in threat intelligence, SOC analysis, or security research
- Solid working knowledge of MITRE ATT&CK, OSINT collection, or CTI workflows
- Able to critically evaluate threat reports and identify realistic versus fabricated adversary behavior
- Strong analytical and written communication skills
- Detail-oriented, self-motivated, and comfortable working asynchronously
Nice to Have
- Experience with threat intelligence platforms (TIPs) or SIEM tools
- Background in red teaming, malware analysis, or incident response
- Familiarity with AI evaluation or data annotation workflows
Why Join Us
- Work directly on cutting-edge AI projects with top-tier research labs
- Fully remote and flexible — work on your schedule, at your pace
- Freelance autonomy with meaningful, intellectually engaging work
- Collaborate with a global network of security and AI professionals
- Potential for ongoing work and contract extension