
Threat Intelligence Analyst
Alignerr · France
- Hybrid
- Contract
- $60,000 / year
- France
Job highlights
- Analyze threat intelligence for AI model training.
- Evaluate threat reports and attacker behavior.
- Generate and validate intelligence data.
- Review AI-generated threat outputs.
- Work remotely on flexible contract basis.
About the role
About The Role
We're partnering with the world's leading AI research labs to build smarter, more capable AI systems — and we need experienced threat intelligence professionals to make it happen. As a Threat Intelligence Analyst, you'll bring your real-world expertise in adversary tracking, campaign analysis, and CTI workflows to help train and evaluate cutting-edge AI models. Your knowledge of how threats actually behave is exactly what's needed to make AI systems more accurate, reliable, and security-aware.
This is a fully remote, flexible contract role — work on your schedule, on projects that matter.
Organization: Alignerr
Type: Hourly Contract
Location: Remote
Commitment: 10–40 hours/week
What You'll Do
- Analyze and classify real-world threat reports, adversary campaigns, and attacker behavior
- Evaluate indicators of compromise (IOCs), TTPs, and end-to-end attack narratives for accuracy and realism
- Generate, structure, and validate threat intelligence data used to train and benchmark AI systems
- Review AI-generated threat intelligence outputs and assess them for accuracy, consistency, and credibility
- Apply your expertise to distinguish genuine attacker behavior from noise, fabricated data, or AI hallucinations
Who You Are
- 2+ years of experience in threat intelligence, SOC analysis, or a related security role
- Familiar with MITRE ATT&CK, OSINT collection methodologies, or CTI production workflows
- Able to critically evaluate threat reports and identify what's real, what's plausible, and what's fiction
- Strong analytical and research skills with the ability to communicate complex findings clearly in writing
- Self-directed and comfortable working asynchronously on task-based assignments
Nice to Have
- Experience producing finished intelligence reports or threat briefings
- Familiarity with threat actor groups, malware families, or sector-specific threat landscapes
- Background in red teaming, incident response, or digital forensics
- Prior experience working with AI or data annotation platforms
Why Join Us
- Work directly on frontier AI systems with some of the world's top research teams
- Fully remote and flexible — work when and how much you want
- Freelance perks: autonomy, variety, and global collaboration
- Apply your cybersecurity expertise to a high-growth field at the intersection of AI and security
- Potential for ongoing work and contract extension
Key skills/competency
- Threat Intelligence Analysis
- AI Model Training
- Cyber Threat Intelligence (CTI)
- Adversary Tracking
- Campaign Analysis
- Indicators of Compromise (IOCs)
- TTPs (Tactics, Techniques, and Procedures)
- OSINT (Open-Source Intelligence)
- MITRE ATT&CK Framework
- Security Research
Skills & topics
- Threat Intelligence Analyst
- Cyber Threat Intelligence
- CTI
- AI Training
- Adversary Tracking
- Campaign Analysis
- IOCs
- TTPs
- OSINT
- Security Analyst
- Remote Work
- Contract Role
- Alignerr
- MITRE ATT&CK
How to get hired
- Tailor your resume: Highlight threat intelligence, AI training, and CTI experience.
- Showcase analytical skills: Emphasize critical evaluation of threat reports and data.
- Demonstrate self-direction: Mention experience with asynchronous, task-based work.
- Understand the role: Align your application with the intersection of AI and cybersecurity.
Technical preparation
Master MITRE ATT&CK framework.,Practice OSINT collection methodologies.,Analyze real-world threat reports.,Evaluate IOCs and TTPs critically.
Behavioral questions
Describe a complex threat you analyzed.,How do you distinguish real threats from noise?,How do you manage asynchronous tasks effectively?,Explain a finding to a non-technical audience.
Frequently asked questions
- What is the primary goal of the Threat Intelligence Analyst role at Alignerr?
- The primary goal of the Threat Intelligence Analyst role at Alignerr is to leverage your real-world expertise in threat intelligence to train and evaluate cutting-edge AI models for AI research labs. You'll help make AI systems more accurate, reliable, and security-aware by providing classified threat data and evaluating AI outputs.
- Is this Threat Intelligence Analyst position remote?
- Yes, this is a fully remote, flexible contract role. You can work on your schedule and from any location, offering significant autonomy and flexibility.
- What kind of experience is required for the Threat Intelligence Analyst position?
- The role requires at least 2 years of experience in threat intelligence, SOC analysis, or a related security role. Familiarity with MITRE ATT&CK, OSINT, or CTI production workflows is also important. Strong analytical and communication skills are essential.
- What are the key responsibilities of a Threat Intelligence Analyst at Alignerr?
- Key responsibilities include analyzing and classifying threat reports, evaluating IOCs and TTPs, generating and validating threat intelligence data for AI training, and reviewing AI-generated threat intelligence for accuracy and credibility.
- What makes the Threat Intelligence Analyst role at Alignerr unique?
- This role is unique because it sits at the intersection of cutting-edge AI research and cybersecurity threat intelligence. You'll work directly with leading AI research labs to improve AI capabilities by applying your practical threat analysis skills.
- How does Alignerr use threat intelligence for AI training?
- Alignerr uses threat intelligence data, including real-world threat reports and adversary behaviors, to train and benchmark AI models. Your analysis helps ensure these models accurately understand and respond to cyber threats.
- What are the 'nice to have' qualifications for this Threat Intelligence Analyst role?
- Nice-to-have qualifications include experience producing finished intelligence reports, familiarity with specific threat actor groups or malware, a background in red teaming or incident response, and prior experience with AI or data annotation platforms.