​Freelance Cybersecurity Analyst – AI Trainer (SOC & Microsoft Defender Expert)

Remote
United States
Posted 1 month ago

​Mindrift is seeking a Freelance Cybersecurity Analyst to work as an AI Trainer, contributing to projects aimed at giving GenAI models complex reasoning skills in cybersecurity. This role requires deep, hands-on experience in security operations to analyze and validate AI-generated content and performance.

  • Location: Remote (Must currently reside in the specified country—though the posting says Remote Iowa, US is listed).
  • Compensation: Up to $55/hour, depending on skills, experience, and project needs.
  • Type: Part-time, fully remote, freelance project with a flexible schedule.
  • Focus: Training AI models by analyzing simulated security incidents, conducting threat hunting, assessing AI-generated reports, and refining the model’s understanding of SOC workflows and specific security tools.

What You’ll Do: AI Training and Cybersecurity Investigation

​The analyst’s duties directly involve evaluating and improving the AI model’s security capabilities.

  • Incident & Threat Analysis: Analyze and investigate simulated security alerts and incidents across endpoints, identities, and cloud environments.
  • Threat Hunting: Conduct proactive threat hunting using KQL or similar query languages.
  • AI Validation: Assess the accuracy and depth of AI-generated security incident reports and threat analyses.
  • Product Expertise: Review, validate, and improve the model’s understanding of Microsoft Defender products and standard Security Operations Center (SOC) workflows.
  • Feedback Loop: Provide expert feedback on AI performance in identifying and classifying cybersecurity threats.

Requirements: SOC, Microsoft Defender, and KQL Proficiency

  • Experience: At least 3 years of hands-on experience in cybersecurity operations, incident response, or threat detection.
  • Work Background: Proven background working in Security Operations Centers (SOC).
  • Technical Proficiency: Proficient in Microsoft Defender products (Endpoint, Identity, Cloud Apps) and familiar with Microsoft Sentinel or similar SIEM tools (Splunk, QRadar, Elastic).
  • Query Language: Strong experience using KQL (Kusto Query Language) or equivalent log analysis tools for threat detection and investigation.
  • Education/Certification: Bachelor’s or Master’s Degree in Cybersecurity or related field is preferred. Recognized industry certification (e.g., SC-200, AZ-500, CISSP, CEH, CompTIA Security+) is preferred.

Job Features

Job CategoryAI (Artificial Intelligence), IT & Cybersecurity

Apply For This Job

A valid phone number is required.