Freelance Cybersecurity Analyst – AI Trainer (SOC & Microsoft Defender Expert)
Remote
United States
Posted 1 month ago
Mindrift is seeking a Freelance Cybersecurity Analyst to work as an AI Trainer, contributing to projects aimed at giving GenAI models complex reasoning skills in cybersecurity. This role requires deep, hands-on experience in security operations to analyze and validate AI-generated content and performance.
- Location: Remote (Must currently reside in the specified country—though the posting says Remote Iowa, US is listed).
- Compensation: Up to $55/hour, depending on skills, experience, and project needs.
- Type: Part-time, fully remote, freelance project with a flexible schedule.
- Focus: Training AI models by analyzing simulated security incidents, conducting threat hunting, assessing AI-generated reports, and refining the model’s understanding of SOC workflows and specific security tools.
What You’ll Do: AI Training and Cybersecurity Investigation
The analyst’s duties directly involve evaluating and improving the AI model’s security capabilities.
- Incident & Threat Analysis: Analyze and investigate simulated security alerts and incidents across endpoints, identities, and cloud environments.
- Threat Hunting: Conduct proactive threat hunting using KQL or similar query languages.
- AI Validation: Assess the accuracy and depth of AI-generated security incident reports and threat analyses.
- Product Expertise: Review, validate, and improve the model’s understanding of Microsoft Defender products and standard Security Operations Center (SOC) workflows.
- Feedback Loop: Provide expert feedback on AI performance in identifying and classifying cybersecurity threats.
Requirements: SOC, Microsoft Defender, and KQL Proficiency
- Experience: At least 3 years of hands-on experience in cybersecurity operations, incident response, or threat detection.
- Work Background: Proven background working in Security Operations Centers (SOC).
- Technical Proficiency: Proficient in Microsoft Defender products (Endpoint, Identity, Cloud Apps) and familiar with Microsoft Sentinel or similar SIEM tools (Splunk, QRadar, Elastic).
- Query Language: Strong experience using KQL (Kusto Query Language) or equivalent log analysis tools for threat detection and investigation.
- Education/Certification: Bachelor’s or Master’s Degree in Cybersecurity or related field is preferred. Recognized industry certification (e.g., SC-200, AZ-500, CISSP, CEH, CompTIA Security+) is preferred.
Job Features
| Job Category | AI (Artificial Intelligence), IT & Cybersecurity |