Job Search and Career Advice Platform

Enable job alerts via email!

Incident Response Analyst

Alignerr

Remote

ZAR 200 000 - 300 000

Part time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cutting-edge AI firm is looking for an Incident Response Analyst to analyze security events and alerts in a remote setting. Candidates should have over 2 years of experience in security operations and familiarity with incident response tools. The role allows flexible hours between 10 to 40 per week and offers attractive pay of $30 to $60 per hour. Join a team developing advanced AI systems in a dynamic and collaborative environment, with the potential for contract extension.

Benefits

Competitive pay
Flexible remote work
Project autonomy
Global collaboration

Qualifications

  • 2+ years in SOC, incident response, or security operations.
  • Ability to evaluate detection rules and investigative playbooks.
  • Experience with alert queues and investigation tools.

Responsibilities

  • Examine security events, alerts, and incident cases.
  • Determine impact, root cause, and appropriate remediation.
  • Verify that AI-generated incident analysis reflects operations.

Skills

Incident response
Experience with SIEM platforms
Threat detection
Job description
About The Job

At Alignerr, we partner with the world’s leading AI research teams and labs to build and train cutting‑edge AI models. We’re developing and testing AI systems designed to interpret security events, correlate alerts, and support digital investigations across modern environments. You will work with realistic incident data to ensure AI‑driven analysis reflects how real response teams operate.

Organization: Alignerr Position: Incident Response Analyst Type: Contract / Task‑Based Compensation: $30–$60 /hour Location: Remote Commitment: 10–40 hours/week

What You’ll Do
  • Examine security events, alerts, and incident cases
  • Determine impact, root cause, and appropriate remediation
  • Evaluate detection rules, alerting pipelines, and investigative playbooks
  • Verify that AI‑generated incident analysis reflects real‑world security operations
What We’re Looking For
  • 2+ years in SOC, incident response, or security operations
  • Experience with SIEM platforms, alert queues, and investigation tools
  • Ability to separate meaningful threats from background noise
Why Join Us
  • Competitive pay and flexible remote work.
  • Work directly on frontier AI systems.
  • Freelance perks: autonomy, flexibility, and global collaboration.
  • Potential for contract extension.
Application Process (Takes 10–15 min)
  • Submit your resume
  • Complete a short screening
  • Project matching and onboarding

PS: Our team reviews applications daily. Please complete your AI interview and application steps to be considered for this opportunity.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.