What are the responsibilities and job description for the Threat Intelligence Analyst position at Alignerr?
Threat Intelligence Analyst (AI Training)
About The Role
Your threat intelligence expertise is about to matter in a whole new way. At Alignerr, we partner with the world's leading AI research labs to build and train frontier AI systems — and we need seasoned analysts who understand how real adversaries think, operate, and communicate.
This isn't a typical SOC role. You'll work with realistic threat reports, indicators of compromise, and attack narratives to help model how threats are tracked, analyzed, and communicated in practice — directly influencing how the next generation of AI understands cybersecurity.
About The Role
Your threat intelligence expertise is about to matter in a whole new way. At Alignerr, we partner with the world's leading AI research labs to build and train frontier AI systems — and we need seasoned analysts who understand how real adversaries think, operate, and communicate.
This isn't a typical SOC role. You'll work with realistic threat reports, indicators of compromise, and attack narratives to help model how threats are tracked, analyzed, and communicated in practice — directly influencing how the next generation of AI understands cybersecurity.
- Organization: Alignerr
- Type: Hourly Contract
- Location: Remote
- Commitment: 10–40 hours/week
- Analyze and classify real-world threat reports, adversary campaigns, and attacker behavior patterns
- Evaluate indicators of compromise, TTPs, and end-to-end attack narratives for accuracy and completeness
- Generate, structure, and validate threat intelligence data used to train and assess AI systems
- Review AI-generated cybersecurity outputs and flag inaccuracies, inconsistencies, or unrealistic content
- Apply frameworks like MITRE ATT&CK to assess and annotate threat scenarios
- 2 years of experience in threat intelligence, SOC analysis, or security research
- Familiar with MITRE ATT&CK, OSINT collection techniques, or CTI workflows
- Able to distinguish authentic attacker behavior from fabricated or low-quality data
- Strong analytical, research, and written communication skills
- Comfortable working independently and asynchronously on task-based assignments
- Experience producing or consuming finished intelligence reports
- Background in red teaming, malware analysis, or incident response
- Familiarity with threat actor tracking or campaign attribution
- Work directly on frontier AI systems with top research labs
- Fully remote and flexible — work on your own schedule
- Freelance perks: autonomy, variety, and global collaboration
- Apply deep security expertise to a cutting-edge AI domain
- Potential for ongoing work and contract extension
Salary : $35 - $60