Threat Intelligence Analyst

Threat Intelligence Analyst

Posted 1 day ago by Alignerr

Negotiable
Undetermined
Remote
Manchester, England, United Kingdom

Summary: The Threat Intelligence Analyst role involves collaborating with AI research labs to enhance AI systems' understanding of cybersecurity threats. The position requires expertise in threat intelligence to analyze real-world threat reports and evaluate adversary behavior, contributing to the development of advanced security tools. This role offers the opportunity to work independently on a flexible schedule while making a significant impact on AI-driven cybersecurity solutions. The position is fully remote and contract-based, requiring 10–40 hours of work per week.

Key Responsibilities:

  • Analyze and classify real-world threat reports, adversary campaigns, and attacker behavior.
  • Evaluate indicators of compromise (IOCs), TTPs, and end-to-end attack narratives for accuracy and realism.
  • Generate, structure, and validate threat intelligence data used to train and assess AI systems.
  • Review AI-generated cybersecurity outputs and flag inaccuracies, hallucinations, or unrealistic scenarios.
  • Apply knowledge of attacker tradecraft to distinguish authentic threat behavior from noise or fabricated data.
  • Work independently and asynchronously on task-based assignments.

Key Skills:

  • 2+ years of hands-on experience in threat intelligence, SOC analysis, or security research.
  • Solid familiarity with MITRE ATT&CK, OSINT collection methodologies, or CTI workflows.
  • Able to critically evaluate attacker behavior and identify what's realistic versus what's not.
  • Strong analytical thinking and structured written communication skills.
  • Self-directed and comfortable working independently on remote, task-based projects.
  • Experience writing or editing threat intelligence reports or advisories (nice to have).
  • Background in malware analysis, incident response, or red teaming (nice to have).
  • Familiarity with AI or data labeling workflows (nice to have).
  • Certifications such as GCTI, GCIA, CEH, or equivalent (nice to have).

Salary (Rate): £60.00 hourly

City: Manchester

Country: United Kingdom

Working Arrangements: remote

IR35 Status: undetermined

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Threat Intelligence Analyst (AI Training)

About The Role

We're partnering with leading AI research labs to build smarter, more security-aware AI systems — and we need experienced threat intelligence professionals to make it happen. Your real-world knowledge of adversaries, campaigns, and CTI workflows will directly shape how AI understands and reasons about cybersecurity threats. This is a rare opportunity to apply your threat intelligence expertise beyond the SOC — contributing to frontier AI development that will influence the next generation of security tooling and research.

Organization: Alignerr

Type: Hourly Contract

Location: Remote

Commitment: 10–40 hours/week

What You'll Do

  • Analyze and classify real-world threat reports, adversary campaigns, and attacker behavior
  • Evaluate indicators of compromise (IOCs), TTPs, and end-to-end attack narratives for accuracy and realism
  • Generate, structure, and validate threat intelligence data used to train and assess AI systems
  • Review AI-generated cybersecurity outputs and flag inaccuracies, hallucinations, or unrealistic scenarios
  • Apply your knowledge of attacker tradecraft to distinguish authentic threat behavior from noise or fabricated data
  • Work independently and asynchronously on task-based assignments

Who You Are

  • 2+ years of hands-on experience in threat intelligence, SOC analysis, or security research
  • Solid familiarity with MITRE ATT&CK, OSINT collection methodologies, or CTI workflows
  • Able to critically evaluate attacker behavior and identify what's realistic versus what's not
  • Strong analytical thinking and structured written communication skills
  • Self-directed and comfortable working independently on remote, task-based projects

Nice to Have

  • Experience writing or editing threat intelligence reports or advisories
  • Background in malware analysis, incident response, or red teaming
  • Familiarity with AI or data labeling workflows
  • Certifications such as GCTI, GCIA, CEH, or equivalent

Why Join Us

  • Work directly on cutting-edge AI projects with top-tier research labs
  • Fully remote and flexible — work on your own schedule
  • Apply your security expertise in a high-impact, forward-looking context
  • Freelance perks: autonomy, variety, and global collaboration
  • Meaningful work that helps AI reason more accurately about real-world cyber threats
  • Potential for ongoing work and contract extension