This opportunity is available through a leading AI-driven work platform.
Cyber Security Experts
Location
United States
Posted
10 days ago
Salary
Not specified
No structured requirement data.
Job Description
Role Description
This role involves contributing to an advanced AI research project focused on cybersecurity applications.
- Evaluate and improve AI systems designed for threat detection, incident response, and attack simulation
- Apply real-world defensive and offensive security knowledge to assess how AI models analyze and respond to complex cyber threats
Key Responsibilities
-
Blue Team / Defensive Security
- Investigate and analyze security incidents such as phishing, ransomware, lateral movement, and privilege escalation
- Review telemetry and logs from SIEM, EDR/XDR, firewall, cloud, and identity platforms
- Classify adversary activity using frameworks such as MITRE ATT&CK
- Evaluate detection rules, alert quality, triage workflows, and response strategies
- Assess the technical accuracy of AI-generated threat investigations
-
Red Team / Offensive Security
- Analyze full attack chains including initial access, persistence, privilege escalation, and data exfiltration
- Simulate attacker behavior to identify detection gaps and evasion techniques
- Evaluate exploit techniques, payload behavior, and adversary tactics
- Stress-test AI systems using realistic red-team scenarios
-
AI Evaluation
- Provide structured reasoning explaining investigative and adversarial decisions
- Identify weaknesses in AI threat analysis
- Contribute insights that help improve AI cybersecurity benchmarks
Qualifications
- 5+ years of professional cybersecurity experience
-
Experience in roles such as:
- SOC Analyst (Level II/III)
- Incident Responder
- Threat Hunter
- Detection Engineer
- Red Team Operator / Penetration Tester
- Offensive Security Consultant
- Hands-on experience responding to real-world security incidents
Technical Skills
-
Blue Team
- Experience with SIEM platforms such as Splunk, Sentinel, QRadar, or Elastic
- Experience with EDR/XDR tools such as CrowdStrike, Defender, or Carbon Black
- Log analysis and event correlation
- Network traffic analysis using Wireshark, Zeek, or tcpdump
- Familiarity with MITRE ATT&CK frameworks
-
Red Team
- Penetration testing methodologies
- Adversary emulation and attack simulation
- Experience with frameworks such as Metasploit or Cobalt Strike
- Privilege escalation and lateral movement techniques
- Attack surface analysis and evasion methods
Preferred Qualifications
-
Certifications such as:
- OSCP, OSEP, CRTO
- GCIA, GCFA, GCIH
- CISSP
- Experience mentoring security analysts or red team members
- Scripting skills in Python, PowerShell, or Bash
Why This Opportunity
- Work on next-generation AI systems for cybersecurity
- Apply real-world offensive and defensive expertise
- Help improve how AI models understand cyber attacks
- Collaborate with leading AI researchers and security experts
Contract Details
- Independent contractor role
- Fully remote with flexible scheduling
- Compensation: $85–$95 per hour
- Weekly payments via Stripe or Wise
Job Requirements
- 5+ years of professional cybersecurity experience
- Experience in roles such as: SOC Analyst (Level II/III) Incident Responder Threat Hunter Detection Engineer Red Team Operator / Penetration Tester Offensive Security Consultant
- SOC Analyst (Level II/III)
- Incident Responder
- Threat Hunter
- Detection Engineer
- Red Team Operator / Penetration Tester
- Offensive Security Consultant
- Hands-on experience responding to real-world security incidents
- Technical Skills
- Blue Team Experience with SIEM platforms such as Splunk, Sentinel, QRadar, or Elastic Experience with EDR/XDR tools such as CrowdStrike, Defender, or Carbon Black Log analysis and event correlation Network traffic analysis using Wireshark, Zeek, or tcpdump Familiarity with MITRE ATT&CK frameworks
- Experience with SIEM platforms such as Splunk, Sentinel, QRadar, or Elastic
- Experience with EDR/XDR tools such as CrowdStrike, Defender, or Carbon Black
- Log analysis and event correlation
- Network traffic analysis using Wireshark, Zeek, or tcpdump
- Familiarity with MITRE ATT&CK frameworks
- Red Team Penetration testing methodologies Adversary emulation and attack simulation Experience with frameworks such as Metasploit or Cobalt Strike Privilege escalation and lateral movement techniques Attack surface analysis and evasion methods
- Penetration testing methodologies
- Adversary emulation and attack simulation
- Experience with frameworks such as Metasploit or Cobalt Strike
- Privilege escalation and lateral movement techniques
- Attack surface analysis and evasion methods
- Preferred Qualifications
- Certifications such as: OSCP, OSEP, CRTO GCIA, GCFA, GCIH CISSP
- OSCP, OSEP, CRTO
- GCIA, GCFA, GCIH
- CISSP
- Experience mentoring security analysts or red team members
- Scripting skills in Python, PowerShell, or Bash
- Why This Opportunity
- Work on next-generation AI systems for cybersecurity
- Apply real-world offensive and defensive expertise
- Help improve how AI models understand cyber attacks
- Collaborate with leading AI researchers and security experts
- Contract Details
- Independent contractor role
- Fully remote with flexible scheduling
- Compensation: $85–$95 per hour
- Weekly payments via Stripe or Wise
Related Guides
Related Categories
Related Job Pages
More Security Engineer Jobs
Sr. IBM z/OS Systems Administrator at DDC- IT Services
Senior IT Security Engineer
EnsonoEnsono delivers complete Hybrid IT solutions, from mainframe to cloud, tailored to each client’s journey.
Senior Information Security Engineer designing enterprise-level security solutions
Cloud Security Engineer supporting DoD mission requirements
This role involves leading and scaling security across products, platform, AI initiatives, and the corporate environment, focusing on DevSecOps, Product Security, AI Security & Risk, and Corporate IT/GRC functions. Key duties include defining security architecture, embedding security into engineering workflows, managing compliance maturity (SOC 2), and leading the internal IT and governance functions.