Threat Intelligence Analyst

Threat Intelligence Analyst

Posted 1 day ago by Alignerr

Negotiable
Undetermined
Remote
London, England, United Kingdom

Summary: The Threat Intelligence Analyst role involves collaborating with leading AI research teams to enhance AI models with real-world cybersecurity insights. Candidates will analyze threat reports and adversary behavior to inform AI systems about cybersecurity threats. This position requires independent work and offers flexible hours in a fully remote setting. The role is pivotal in shaping the future of AI safety and capability through actionable intelligence.

Key Responsibilities:

  • Analyze and classify threat reports, adversary campaigns, and attacker behavior patterns
  • Evaluate indicators of compromise, TTPs, and end-to-end attack narratives for accuracy and realism
  • Generate, structure, and validate threat intelligence data used to train and assess AI systems
  • Review AI-generated cybersecurity outputs and flag inaccuracies, inconsistencies, or fabricated content
  • Apply knowledge of real attacker behavior to distinguish credible intelligence from noise
  • Work independently and asynchronously on task-based assignments at your own pace

Key Skills:

  • 2+ years of experience in threat intelligence, SOC analysis, or security research
  • Familiarity with MITRE ATT&CK, OSINT collection, or cyber threat intelligence (CTI) workflows
  • Strong ability to distinguish genuine attacker behavior from synthetic or inaccurate data
  • Analytical, detail-oriented, and capable of producing clear written assessments
  • Comfortable working independently on structured, task-based projects
  • Experience writing threat intelligence reports or producing finished intelligence products (nice to have)
  • Familiarity with tracking APT groups, ransomware operators, or nation-state campaigns (nice to have)
  • Background in malware analysis, incident response, or vulnerability research (nice to have)
  • Prior experience with AI training, data labeling, or content evaluation workflows (nice to have)

Salary (Rate): £35.00/hr

City: London

Country: United Kingdom

Working Arrangements: remote

IR35 Status: undetermined

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Threat Intelligence Analyst (AI Training)

About The Role

We partner with the world's leading AI research teams and labs to build and train cutting-edge AI models. Now, we're looking for experienced threat intelligence professionals to bring real-world adversary knowledge to frontier AI development. Your expertise in tracking campaigns, analyzing TTPs, and producing actionable intelligence will directly shape how AI systems understand and reason about cybersecurity threats — making a meaningful impact on the future of AI safety and capability.

Organization: Alignerr

Type: Hourly Contract

Commitment: 10–40 hours/week

Location: Remote

What You'll Do

  • Analyze and classify threat reports, adversary campaigns, and attacker behavior patterns
  • Evaluate indicators of compromise, TTPs, and end-to-end attack narratives for accuracy and realism
  • Generate, structure, and validate threat intelligence data used to train and assess AI systems
  • Review AI-generated cybersecurity outputs and flag inaccuracies, inconsistencies, or fabricated content
  • Apply your knowledge of real attacker behavior to distinguish credible intelligence from noise
  • Work independently and asynchronously on task-based assignments at your own pace

Who You Are

  • 2+ years of experience in threat intelligence, SOC analysis, or security research
  • Familiar with MITRE ATT&CK, OSINT collection, or cyber threat intelligence (CTI) workflows
  • Strong ability to distinguish genuine attacker behavior from synthetic or inaccurate data
  • Analytical, detail-oriented, and capable of producing clear written assessments
  • Comfortable working independently on structured, task-based projects

Nice to Have

  • Experience writing threat intelligence reports or producing finished intelligence products
  • Familiarity with tracking APT groups, ransomware operators, or nation-state campaigns
  • Background in malware analysis, incident response, or vulnerability research
  • Prior experience with AI training, data labeling, or content evaluation workflows

Why Join Us

  • Work directly on frontier AI systems alongside top research labs
  • Fully remote and flexible — work on your own schedule
  • Freelance perks: autonomy, variety, and global collaboration
  • Apply your cybersecurity expertise in a high-impact, cutting-edge domain
  • Potential for ongoing work and contract extension