PitchMeAI
Alignerr

Threat Intelligence Analyst

Alignerr · France

  • Hybrid
  • Contract
  • $60,000 / year
  • France

Job highlights

  • Analyze threat intelligence for AI model training.
  • Evaluate threat reports and attacker behavior.
  • Generate and validate intelligence data.
  • Review AI-generated threat outputs.
  • Work remotely on flexible contract basis.

About the role

About The Role

We're partnering with the world's leading AI research labs to build smarter, more capable AI systems — and we need experienced threat intelligence professionals to make it happen. As a Threat Intelligence Analyst, you'll bring your real-world expertise in adversary tracking, campaign analysis, and CTI workflows to help train and evaluate cutting-edge AI models. Your knowledge of how threats actually behave is exactly what's needed to make AI systems more accurate, reliable, and security-aware.

This is a fully remote, flexible contract role — work on your schedule, on projects that matter.

Organization: Alignerr
Type: Hourly Contract
Location: Remote
Commitment: 10–40 hours/week

What You'll Do

  • Analyze and classify real-world threat reports, adversary campaigns, and attacker behavior
  • Evaluate indicators of compromise (IOCs), TTPs, and end-to-end attack narratives for accuracy and realism
  • Generate, structure, and validate threat intelligence data used to train and benchmark AI systems
  • Review AI-generated threat intelligence outputs and assess them for accuracy, consistency, and credibility
  • Apply your expertise to distinguish genuine attacker behavior from noise, fabricated data, or AI hallucinations

Who You Are

  • 2+ years of experience in threat intelligence, SOC analysis, or a related security role
  • Familiar with MITRE ATT&CK, OSINT collection methodologies, or CTI production workflows
  • Able to critically evaluate threat reports and identify what's real, what's plausible, and what's fiction
  • Strong analytical and research skills with the ability to communicate complex findings clearly in writing
  • Self-directed and comfortable working asynchronously on task-based assignments

Nice to Have

  • Experience producing finished intelligence reports or threat briefings
  • Familiarity with threat actor groups, malware families, or sector-specific threat landscapes
  • Background in red teaming, incident response, or digital forensics
  • Prior experience working with AI or data annotation platforms

Why Join Us

  • Work directly on frontier AI systems with some of the world's top research teams
  • Fully remote and flexible — work when and how much you want
  • Freelance perks: autonomy, variety, and global collaboration
  • Apply your cybersecurity expertise to a high-growth field at the intersection of AI and security
  • Potential for ongoing work and contract extension

Key skills/competency

  • Threat Intelligence Analysis
  • AI Model Training
  • Cyber Threat Intelligence (CTI)
  • Adversary Tracking
  • Campaign Analysis
  • Indicators of Compromise (IOCs)
  • TTPs (Tactics, Techniques, and Procedures)
  • OSINT (Open-Source Intelligence)
  • MITRE ATT&CK Framework
  • Security Research

Skills & topics

  • Threat Intelligence Analyst
  • Cyber Threat Intelligence
  • CTI
  • AI Training
  • Adversary Tracking
  • Campaign Analysis
  • IOCs
  • TTPs
  • OSINT
  • Security Analyst
  • Remote Work
  • Contract Role
  • Alignerr
  • MITRE ATT&CK

How to get hired

  • Tailor your resume: Highlight threat intelligence, AI training, and CTI experience.
  • Showcase analytical skills: Emphasize critical evaluation of threat reports and data.
  • Demonstrate self-direction: Mention experience with asynchronous, task-based work.
  • Understand the role: Align your application with the intersection of AI and cybersecurity.

Technical preparation

Master MITRE ATT&CK framework.,Practice OSINT collection methodologies.,Analyze real-world threat reports.,Evaluate IOCs and TTPs critically.

Behavioral questions

Describe a complex threat you analyzed.,How do you distinguish real threats from noise?,How do you manage asynchronous tasks effectively?,Explain a finding to a non-technical audience.

Frequently asked questions

What is the primary goal of the Threat Intelligence Analyst role at Alignerr?
The primary goal of the Threat Intelligence Analyst role at Alignerr is to leverage your real-world expertise in threat intelligence to train and evaluate cutting-edge AI models for AI research labs. You'll help make AI systems more accurate, reliable, and security-aware by providing classified threat data and evaluating AI outputs.
Is this Threat Intelligence Analyst position remote?
Yes, this is a fully remote, flexible contract role. You can work on your schedule and from any location, offering significant autonomy and flexibility.
What kind of experience is required for the Threat Intelligence Analyst position?
The role requires at least 2 years of experience in threat intelligence, SOC analysis, or a related security role. Familiarity with MITRE ATT&CK, OSINT, or CTI production workflows is also important. Strong analytical and communication skills are essential.
What are the key responsibilities of a Threat Intelligence Analyst at Alignerr?
Key responsibilities include analyzing and classifying threat reports, evaluating IOCs and TTPs, generating and validating threat intelligence data for AI training, and reviewing AI-generated threat intelligence for accuracy and credibility.
What makes the Threat Intelligence Analyst role at Alignerr unique?
This role is unique because it sits at the intersection of cutting-edge AI research and cybersecurity threat intelligence. You'll work directly with leading AI research labs to improve AI capabilities by applying your practical threat analysis skills.
How does Alignerr use threat intelligence for AI training?
Alignerr uses threat intelligence data, including real-world threat reports and adversary behaviors, to train and benchmark AI models. Your analysis helps ensure these models accurately understand and respond to cyber threats.
What are the 'nice to have' qualifications for this Threat Intelligence Analyst role?
Nice-to-have qualifications include experience producing finished intelligence reports, familiarity with specific threat actor groups or malware, a background in red teaming or incident response, and prior experience with AI or data annotation platforms.