Negotiable
Undetermined
Remote
Manchester, England, United Kingdom
Summary: The Threat Intelligence Analyst role involves collaborating with AI research labs to enhance AI systems' understanding of cybersecurity threats. The position requires expertise in threat intelligence to analyze real-world threat reports and evaluate adversary behavior, contributing to the development of advanced security tools. This role offers the opportunity to work independently on a flexible schedule while making a significant impact on AI-driven cybersecurity solutions. The position is fully remote and contract-based, requiring 10–40 hours of work per week.
Key Responsibilities:
- Analyze and classify real-world threat reports, adversary campaigns, and attacker behavior.
- Evaluate indicators of compromise (IOCs), TTPs, and end-to-end attack narratives for accuracy and realism.
- Generate, structure, and validate threat intelligence data used to train and assess AI systems.
- Review AI-generated cybersecurity outputs and flag inaccuracies, hallucinations, or unrealistic scenarios.
- Apply knowledge of attacker tradecraft to distinguish authentic threat behavior from noise or fabricated data.
- Work independently and asynchronously on task-based assignments.
Key Skills:
- 2+ years of hands-on experience in threat intelligence, SOC analysis, or security research.
- Solid familiarity with MITRE ATT&CK, OSINT collection methodologies, or CTI workflows.
- Able to critically evaluate attacker behavior and identify what's realistic versus what's not.
- Strong analytical thinking and structured written communication skills.
- Self-directed and comfortable working independently on remote, task-based projects.
- Experience writing or editing threat intelligence reports or advisories (nice to have).
- Background in malware analysis, incident response, or red teaming (nice to have).
- Familiarity with AI or data labeling workflows (nice to have).
- Certifications such as GCTI, GCIA, CEH, or equivalent (nice to have).
Salary (Rate): £60.00 hourly
City: Manchester
Country: United Kingdom
Working Arrangements: remote
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
Threat Intelligence Analyst (AI Training)
About The Role
We're partnering with leading AI research labs to build smarter, more security-aware AI systems — and we need experienced threat intelligence professionals to make it happen. Your real-world knowledge of adversaries, campaigns, and CTI workflows will directly shape how AI understands and reasons about cybersecurity threats. This is a rare opportunity to apply your threat intelligence expertise beyond the SOC — contributing to frontier AI development that will influence the next generation of security tooling and research.
Organization: Alignerr
Type: Hourly Contract
Location: Remote
Commitment: 10–40 hours/week
What You'll Do
- Analyze and classify real-world threat reports, adversary campaigns, and attacker behavior
- Evaluate indicators of compromise (IOCs), TTPs, and end-to-end attack narratives for accuracy and realism
- Generate, structure, and validate threat intelligence data used to train and assess AI systems
- Review AI-generated cybersecurity outputs and flag inaccuracies, hallucinations, or unrealistic scenarios
- Apply your knowledge of attacker tradecraft to distinguish authentic threat behavior from noise or fabricated data
- Work independently and asynchronously on task-based assignments
Who You Are
- 2+ years of hands-on experience in threat intelligence, SOC analysis, or security research
- Solid familiarity with MITRE ATT&CK, OSINT collection methodologies, or CTI workflows
- Able to critically evaluate attacker behavior and identify what's realistic versus what's not
- Strong analytical thinking and structured written communication skills
- Self-directed and comfortable working independently on remote, task-based projects
Nice to Have
- Experience writing or editing threat intelligence reports or advisories
- Background in malware analysis, incident response, or red teaming
- Familiarity with AI or data labeling workflows
- Certifications such as GCTI, GCIA, CEH, or equivalent
Why Join Us
- Work directly on cutting-edge AI projects with top-tier research labs
- Fully remote and flexible — work on your own schedule
- Apply your security expertise in a high-impact, forward-looking context
- Freelance perks: autonomy, variety, and global collaboration
- Meaningful work that helps AI reason more accurately about real-world cyber threats
- Potential for ongoing work and contract extension