What are the responsibilities and job description for the Incident Response Analyst position at Alignerr?
Incident Response Analyst (AI Training)
About The Role
We're partnering with leading AI research labs to build the next generation of security-focused AI systems. As an Incident Response Analyst, you'll bring your real-world SOC and IR experience to bear on a genuinely novel challenge: teaching AI how skilled analysts think, investigate, and respond.
Your expertise will directly shape how AI interprets security events, correlates alerts, and supports digital investigations — making AI-driven security tools smarter, faster, and more accurate for teams everywhere.
About The Role
We're partnering with leading AI research labs to build the next generation of security-focused AI systems. As an Incident Response Analyst, you'll bring your real-world SOC and IR experience to bear on a genuinely novel challenge: teaching AI how skilled analysts think, investigate, and respond.
Your expertise will directly shape how AI interprets security events, correlates alerts, and supports digital investigations — making AI-driven security tools smarter, faster, and more accurate for teams everywhere.
- Organization: Alignerr
- Type: Hourly Contract
- Location: Remote
- Commitment: 10–40 hours/week
- Analyze realistic security events, alerts, and incident cases to evaluate AI-generated responses
- Assess AI outputs for accuracy in determining impact, root cause, and appropriate remediation
- Review detection rules, alerting pipelines, and investigative playbooks for real-world validity
- Identify gaps where AI reasoning diverges from how experienced response teams actually operate
- Provide structured, expert feedback that directly improves frontier AI security models
- Work independently and asynchronously on your own schedule
- 2 years of hands-on experience in SOC, incident response, or security operations
- Comfortable working with SIEM platforms, alert queues, and investigation tooling
- Strong ability to triage signals — separating meaningful threats from background noise
- Clear written communication skills when documenting findings and recommendations
- Self-motivated and reliable when working independently on task-based assignments
- Experience with threat hunting, digital forensics, or malware analysis
- Familiarity with common frameworks such as MITRE ATT&CK or NIST IR
- Background in cloud security, endpoint detection, or network forensics
- Prior involvement in AI evaluation, red teaming, or security research
- Work on frontier AI systems alongside top security and research teams
- Fully remote and flexible — complete tasks on your own schedule
- Freelance perks: autonomy, variety, and collaboration with a global expert community
- Apply your security expertise to a domain that's actively shaping the future of AI
- Potential for ongoing work and contract extension
Salary : $30 - $60