×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Usage Tester - Work From Home

Remote / Online - Candidates ideally in
Manchester, Hillsborough County, New Hampshire, 03103, USA
Listing for: GL1
Remote/Work from Home position
Listed on 2026-03-14
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 45 USD Hourly USD 45.00 HOUR
Job Description & How to Apply Below
Position: Usage Tester - Work From Home - $45 per hour

Overview

The cities near Manchester, NH that boast the highest number of tester jobs are:

  • Hartford
  • Springfield

The 10 cities near Manchester, NH that have the most job openings are:

  • Hartford
  • Springfield
  • Providence
  • Worcester
  • Boston
  • Cambridge
  • Lowell
  • Brockton
  • Quincy
  • New Bedford

The 10 most popular job searches in Manchester, NH are:

  • work from home
  • amazon
  • data entry clerk
  • data entry
  • online
  • high paying
  • graphic design
  • customer service
  • customer care

Mercor is recruiting on behalf of a cutting-edge AI research lab building advanced AI systems for cybersecurity applications. We are seeking senior cybersecurity professionals with deep hands-on experience across both defensive (Blue Team) and offensive (Red Team) security disciplines. In this role, you will apply real-world adversarial and defensive expertise to evaluate, stress-test, and improve AI models designed to assist with threat detection, incident response, and attack simulation.

Your insights will directly inform how AI systems reason about attacks, evasions, detection logic, and response workflows. This is a flexible, remote engagement ideal for experienced practitioners who have operated in enterprise, consulting, or high-security environments.

Responsibilities
  • Defensive (Blue Team) Contributions
    • Investigate and analyse real or simulated security incidents (e.g., phishing, lateral movement, ransomware, privilege escalation).
    • Review logs and telemetry from SIEM, EDR / XDR, firewall, cloud, and identity systems.
    • Apply frameworks such as MITRE ATT&CK to classify adversary behavior.
    • Evaluate alert quality, detection rules, triage decisions, and response workflows.
    • Assess AI-generated investigations for technical correctness and operational realism.
  • Offensive (Red Team) Contributions
    • Analyse attack chains including initial access, persistence, privilege escalation, lateral movement, and data exfiltration.
    • Simulate adversarial thinking to evaluate detection gaps and bypass techniques.
    • Review exploit techniques, payload behaviors, and evasion strategies.
    • Provide insights into attack surface analysis and real-world adversary tactics.
    • Stress-test AI systems against realistic red-team scenarios.
  • AI Evaluation & Feedback
    • Provide structured reasoning explaining investigative and adversarial decisions.
    • Identify weaknesses in AI threat analysis and suggest improvements.
    • Help refine benchmarks for detection, triage, and attack simulation accuracy.
Requirements
  • Experience
    • 5+ years in cybersecurity with experience in one or more of:
      • SOC Analyst (Level II / III)
      • Incident Responder
      • Detection Engineer
      • Threat Hunter
      • Red Team Operator / Penetration Tester
      • Security Consultant (Offensive Security)
    • Hands-on experience conducting or responding to real-world security incidents.
  • Technical Skills – Blue Team
    • Strong experience with SIEM platforms (Splunk, Sentinel, QRadar, Elastic)
    • EDR / XDR tools (Crowd Strike, Defender, Carbon Black)
    • Log analysis and event correlation
    • Network traffic analysis (Wireshark, Zeek, tcpdump)
    • Cloud security and IAM investigation experience preferred
    • Familiarity with MITRE ATT&CK mapping and detection engineering
  • Technical Skills – Red Team
    • Penetration testing methodologies
    • Adversary emulation and attack simulation
    • Exploitation frameworks (e.g., Metasploit, Cobalt Strike or equivalents)
    • Privilege escalation techniques
    • Lateral movement techniques
    • Evasion and obfuscation methods
    • Understanding of Active Directory attacks, phishing frameworks, and payload development is a plus
  • Analytical & Communication Skills
    • Strong written documentation skills explaining technical reasoning
    • Ability to think from both attacker and defender perspectives
    • Structured, logical analysis of complex security scenarios
  • Preferred Qualifications
    • Certifications such as OSCP, OSEP, CRTO (Red Team)
    • GCIA, GCFA, GCIH (Blue Team)
    • CISSP
    • Experience mentoring junior analysts or red team members
    • Scripting proficiency (Python, Power Shell, Bash)
Why Join
  • Contribute to next-generation AI systems for cybersecurity.
  • Work at the intersection of offensive and defensive security research.
  • High-impact role shaping AI reasoning about real-world cyber threats.
  • Flexible engagement suited for senior practitioners.
  • Collaborate with leading AI researchers and security experts.
#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary