aitrainer.work - AI Training Jobs Platform
STEM mercor

Cyber Security Experts

Mercor β€’ Remote β€’ Posted 60 days ago

Education

Any

Type

Pay Rate

$90/task

Posted

60d ago

βœ… Applying through this link gives you a verified candidate referral.

Referrals from verified candidates give your profile a visibility boost and help support our platform at no cost to you.

This position is hosted on an external talent platform. Please only apply for this position if it fits your skills and interests.

Apply Now β†’

About this Role

Mercor is recruiting on behalf of a cutting-edge AI research lab building advanced AI systems for cybersecurity applications. We are seeking senior cybersecurity professionals with deep hands-on experience across both defensive (Blue Team) and offensive (Red Team) security disciplines. In this role, you will apply real-world adversarial and defensive expertise to evaluate, stress-test, and improve AI models designed to assist with threat detection, incident response, and attack simulation. Your insights will directly inform how AI systems reason about attacks, evasions, detection logic, and response workflows. This is a flexible, remote engagement ideal for experienced practitioners who have operated in enterprise, consulting, or high-security environments.

Investigate and analyse real or simulated security incidents (e.g., phishing, lateral movement, ransomware, privilege escalation).

defensive (Blue Team)

offensive (Red Team)

Key Responsibilities

Defensive (Blue Team) Contributions

MITRE ATTACK

Offensive (Red Team) Contributions

AI Evaluation & Feedback

Requirements

Experience

Technical Skills – Blue Team

Technical Skills – Red Team

Analytical & Communication Skills

Preferred Qualifications

Why Join

Mercor is recruiting on behalf of a cutting-edge AI research lab building advanced AI systems for cybersecurity applications. We are seeking senior cybersecurity professionals with deep hands-on experience across both defensive (Blue Team) and offensive (Red Team) security disciplines. In this role, you will apply real-world adversarial and defensive expertise to evaluate, stress-test, and improve AI models designed to assist with threat detection, incident response, and attack simulation. Your insights will directly inform how AI systems reason about attacks, evasions, detection logic, and response workflows. This is a flexible, remote engagement ideal for experienced practitioners who have operated in enterprise, consulting, or high-security environments. Investigate and analyse real or simulated security incidents (e.g., phishing, lateral movement, ransomware, privilege escalation). Review logs and telemetry from SIEM, EDR/XDR, firewall, cloud, and identity systems. Apply frameworks such as MITRE ATTACK to classify adversary behavior. Evaluate alert quality, detection rules, triage decisions, and response workflows. Assess AI-generated investigations for technical correctness and operational realism. Analyse attack chains including initial access, persistence, privilege escalation, lateral movement, and data exfiltration. Simulate adversarial thinking to evaluate detection gaps and bypass techniques. Review exploit techniques, payload behaviors, and evasion strategies. Provide insights into attack surface analysis and real-world adversary tactics. Stress-test AI systems against realistic red-team scenarios. Provide structured reasoning explaining investigative and adversarial decisions. Identify weaknesses in AI threat analysis and suggest improvements. Help refine benchmarks for detection, triage, and attack simulation accuracy. 5+ years in cybersecurity with experience in one or more of: SOC Analyst (Level II/III) Incident Responder Detection Engineer Threat Hunter Red Team Operator / Penetration Tester Security Consultant (Offensive Security) Hands-on experience conducting or responding to real-world security incidents. Strong experience with: SIEM platforms (Splunk, Sentinel, QRadar, Elastic) EDR/XDR tools (CrowdStrike, Defender, Carbon Black) Log analysis and event correlation Network traffic analysis (Wireshark, Zeek, tcpdump) Cloud security and IAM investigation experience preferred. Familiarity with MITRE ATT&CK mapping and detection engineering. Experience with: Penetration testing methodologies Adversary emulation and attack simulation Exploitation frameworks (e.g., Metasploit, Cobalt Strike or equivalents) Privilege escalation techniques Lateral movement techniques Evasion and obfuscation methods Understanding of Active Directory attacks, phishing frameworks, and payload development is a plus. Strong written documentation skills explaining technical reasoning. Ability to think from both attacker and defender perspectives. Structured, logical analysis of complex security scenarios. Certifications such as: OSCP, OSEP, CRTO (Red Team) GCIA, GCFA, GCIH (Blue Team) Experience mentoring junior analysts or red team members. Scripting proficiency (Python, PowerShell, Bash). Contribute to next-generation AI systems for cybersecurity. Work at the intersection of offensive and defensive security research. High-impact role shaping AI reasoning about real-world cyber threats. Flexible engagement suited for senior practitioners. Collaborate with leading AI researchers and security experts. We consider all qualified applicants without regard to legally protected characteristics and provide reasonable accommodations upon request.

  • Investigate and analyse real or simulated security incidents (e.g., phishing, lateral movement, ransomware, privilege escalation).
  • Review logs and telemetry from SIEM, EDR/XDR, firewall, cloud, and identity systems.
  • Apply frameworks such as MITRE ATTACK to classify adversary behavior.
  • Evaluate alert quality, detection rules, triage decisions, and response workflows.
  • Assess AI-generated investigations for technical correctness and operational realism.
  • Analyse attack chains including initial access, persistence, privilege escalation, lateral movement, and data exfiltration.
  • Simulate adversarial thinking to evaluate detection gaps and bypass techniques.
  • Review exploit techniques, payload behaviors, and evasion strategies.
  • Provide insights into attack surface analysis and real-world adversary tactics.
  • Stress-test AI systems against realistic red-team scenarios.
  • Provide structured reasoning explaining investigative and adversarial decisions.
  • Identify weaknesses in AI threat analysis and suggest improvements.
  • Help refine benchmarks for detection, triage, and attack simulation accuracy.
  • 5+ years in cybersecurity with experience in one or more of:

SOC Analyst (Level II/III)

Incident Responder

Detection Engineer

Threat Hunter

Red Team Operator / Penetration Tester

Security Consultant (Offensive Security)

  • SOC Analyst (Level II/III)
  • Incident Responder
  • Detection Engineer
  • Threat Hunter
  • Red Team Operator / Penetration Tester
  • Security Consultant (Offensive Security)
  • Hands-on experience conducting or responding to real-world security incidents.
  • SOC Analyst (Level II/III)
  • Incident Responder
  • Detection Engineer
  • Threat Hunter
  • Red Team Operator / Penetration Tester
  • Security Consultant (Offensive Security)
  • Strong experience with:

SIEM platforms (Splunk, Sentinel, QRadar, Elastic)

EDR/XDR tools (CrowdStrike, Defender, Carbon Black)

Log analysis and event correlation

Network traffic analysis (Wireshark, Zeek, tcpdump)

  • SIEM platforms (Splunk, Sentinel, QRadar, Elastic)
  • EDR/XDR tools (CrowdStrike, Defender, Carbon Black)
  • Log analysis and event correlation
  • Network traffic analysis (Wireshark, Zeek, tcpdump)
  • Cloud security and IAM investigation experience preferred.
  • Familiarity with MITRE ATT&CK mapping and detection engineering.
  • SIEM platforms (Splunk, Sentinel, QRadar, Elastic)
  • EDR/XDR tools (CrowdStrike, Defender, Carbon Black)
  • Log analysis and event correlation
  • Network traffic analysis (Wireshark, Zeek, tcpdump)
  • Experience with:

Penetration testing methodologies

Adversary emulation and attack simulation

Exploitation frameworks (e.g., Metasploit, Cobalt Strike or equivalents)

Privilege escalation techniques

Lateral movement techniques

Evasion and obfuscation methods

  • Penetration testing methodologies
  • Adversary emulation and attack simulation
  • Exploitation frameworks (e.g., Metasploit, Cobalt Strike or equivalents)
  • Privilege escalation techniques
  • Lateral movement techniques
  • Evasion and obfuscation methods
  • Understanding of Active Directory attacks, phishing frameworks, and payload development is a plus.
  • Penetration testing methodologies
  • Adversary emulation and attack simulation
  • Exploitation frameworks (e.g., Metasploit, Cobalt Strike or equivalents)
  • Privilege escalation techniques
  • Lateral movement techniques
  • Evasion and obfuscation methods
  • Strong written documentation skills explaining technical reasoning.
  • Ability to think from both attacker and defender perspectives.
  • Structured, logical analysis of complex security scenarios.
  • Certifications such as:

OSCP, OSEP, CRTO (Red Team)

GCIA, GCFA, GCIH (Blue Team)

CISSP

  • OSCP, OSEP, CRTO (Red Team)
  • GCIA, GCFA, GCIH (Blue Team)
  • CISSP
  • Experience mentoring junior analysts or red team members.
  • Scripting proficiency (Python, PowerShell, Bash).
  • OSCP, OSEP, CRTO (Red Team)
  • GCIA, GCFA, GCIH (Blue Team)
  • CISSP
  • Contribute to next-generation AI systems for cybersecurity.
  • Work at the intersection of offensive and defensive security research.
  • High-impact role shaping AI reasoning about real-world cyber threats.
  • Flexible engagement suited for senior practitioners.
  • Collaborate with leading AI researchers and security experts.

Requirements

  • Must be eligible to work in Remote
  • Fluent proficiency in English (Written & Verbal)
  • Reliable high-speed internet connection
  • Bachelor's degree or equivalent professional experience
  • Demonstrated expertise in STEM

Compensation Analysis

Mercor is recruiting on behalf of a cutting-edge AI research lab building advanced AI systems for cybersecurity applications. We are seeking senior cybersecurity professionals with deep hands-on experience across both defensive (Blue Team) and offensive (Red Team) security disciplines. In this role, you will apply real-world adversarial and defensi

Skills & Categories

Explore other opportunities in related specializations:

Related Jobs

Mercor

Browse All Jobs from Mercor

Discover more opportunities on Mercor that match your skills and interests.

View All Mercor Jobs β†’

Community Reviews

Loading reviews…

Frequently Asked Questions

Is this for freelancers or full-time employees?

Both. Mercor tries to match you with clients who want long-term contractors. Unlike other platforms where you log in and grab small tasks, Mercor matches you with one company for a steady role (e.g., 'Python Tutor for 3 months').

I'm not comfortable on camera. Can I still apply?

No. The application requires a video interview with an AI avatar. The AI asks you questions about your resume, and the video is shared with potential clients to prove your communication skills.

Does it cost money to join?

No. You should never pay to join these platforms. Mercor makes money by charging the client a fee on top of your hourly rate.

Is this just labeling data?

No. This is closer to academic research. You will likely be writing or verifying complex proofs, solving advanced equations, or checking the logic of a model's step-by-step reasoning. The goal is to teach AI systems to reason deeply in your field.

Do I need a PhD?

For the highest pay tiers in this category, a PhD (or current enrollment) is usually expected. However, the most important factor is your ability to pass the domain assessment. If you can solve the problems, the degree is secondary.

Is the work continuous?

Work in niche fields is often project-based. A specific "campaign" (e.g., training a model on Quantum Mechanics) might last for a few weeks. It is best to treat this as a high-paying fellowship or grant rather than a permanent daily job.

How soon will I start?

Important: Mercor is a talent marketplace, not a task queue. Applying puts you in a pool of candidates. You will only start working when a specific client (like a major AI lab) selects your profile. This matching process can take weeks.