More jobs:
Job Description & How to Apply Below
At Mindrift, innovation meets opportunity. We believe in using the power of collective intelligence to ethically shape the future of AI.
What We Do
The Mindrift platform connects specialists with AI projects from major tech innovators. Our mission is to unlock the potential of Generative AI by tapping into real-world expertise from across the globe.
About
The Role
GenAI models are improving very quickly, and one of our goals is to make them capable of addressing specialized questions and achieving complex reasoning skills. If you join the platform as an AI Tutor in Coding, you'll have the opportunity to collaborate on these projects.
Although every project is unique, you might typically:
Analyze and investigate simulated security alerts and incidents across endpoints, identities, and cloud environments
Conduct proactive threat hunting using KQL or similar query languages to identify hidden vulnerabilities and emerging threats that automated systems may miss
Assess the accuracy and depth of AI-generated security incident reports and threat analyses
Review, validate, and improve the model's understanding of Microsoft Defender products and SOC workflows
Provide expert feedback on AI performance in identifying and classifying cybersecurity threats
How To Get Started
Simply apply to this post, qualify, and get the chance to contribute to projects aligned with your skills, on your own schedule. From creating training prompts to refining model responses, you'll help shape the future of AI while ensuring technology benefits everyone.
Requirements
You hold a Bachelor's or Master's Degree in Computer Science, Information Security / Cybersecurity, Digital Forensics, Network or Computer Engineering or other related fields. Recognized industry certification (e.g., SC-200, AZ-500, CISSP, CEH, GCIH, CSA, CompTIA Security+) is preferred
You have at least 3 years of hands-on experience in cybersecurity operations, incident response, or threat detection.
You have a proven background working in Security Operations Centers (SOC).
You are able to investigate, triage, and respond to complex security incidents across endpoints, identities, and cloud environments
You are proficient in Microsoft Defender products (Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Defender for Cloud Apps) and familiar with Microsoft Sentinel or similar SIEM tools (Splunk, QRadar, Elastic)
You have strong analytical and problem-solving skills with experience using KQL (Kusto Query Language) or equivalent log analysis tools for threat detection and investigation
You have prior experience in threat intelligence, vulnerability management, or incident correlation
Your level of English is advanced (C1) or above
You are ready to learn new methods, able to switch between tasks and topics quickly and sometimes work with challenging, complex guidelines
Our freelance role is fully remote so, you just need a laptop, internet connection, time available and enthusiasm to take on a challenge
Benefits
Why this freelance opportunity might be a great fit for you
Get paid for your expertise, with rates that can go up to $19/hour depending on your skills, experience, and project needs
Take part in a part-time, remote, freelance project that fits around your primary professional or academic commitments
Work on advanced AI projects and gain valuable experience that enhances your portfolio
Influence how future AI models understand and communicate in your field of expertise
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×