Skip to content
mimi

Cybersecurity Risk Mgmt Analyst

Mercor

Remote (Global) Senior $85 – $95/hr 2w ago

About the role

About The Job

Mercor connects elite creative and technical talent with leading AI research labs. Headquartered in San Francisco, our investors include Benchmark, General Catalyst, Peter Thiel, Adam D'Angelo, Larry Summers, and Jack Dorsey.

Position

Senior Cybersecurity Professional

Type

Contract

Compensation

$85–$95/hour

Location

Remote

Role Responsibilities

  • Evaluate AI models for threat detection, incident response, and attack simulation. Apply real-world adversarial and defensive expertise.
  • Investigate and analyze security incidents using SIEM, EDR/XDR, and other tools. Classify adversary behavior with MITRE ATT&CK.
  • Simulate adversarial thinking to identify detection gaps and bypass techniques. Stress-test AI systems against realistic red-team scenarios.
  • Provide structured reasoning and feedback to improve AI threat analysis and detection accuracy.
  • Work independently and asynchronously in a flexible remote engagement.

Qualifications

Must-Have

  • 5+ years in cybersecurity.
  • Experience as SOC Analyst, Incident Responder, Detection Engineer, Threat Hunter, Red Team Operator, or Security Consultant.
  • Hands-on experience with real-world security incidents.
  • Strong skills with SIEM platforms, EDR/XDR tools, and network traffic analysis.
  • Familiarity with MITRE ATT&CK and detection engineering.

Preferred

  • Certifications: OSCP, OSEP, CRTO, GCIA, GCFA, GCIH, CISSP.
  • Experience mentoring junior analysts or red team members.
  • Scripting proficiency in Python, PowerShell, Bash.

Application Process (Takes 20–30 mins to complete)

  • Upload resume
  • AI interview based on your resume
  • Submit form

Resources & Support

PS: Our team reviews applications daily. Please complete your AI interview and application steps to be considered for this opportunity.

Requirements

  • 5+ years in cybersecurity.
  • Experience as SOC Analyst, Incident Responder, Detection Engineer, Threat Hunter, Red Team Operator, or Security Consultant.
  • Hands-on experience with real-world security incidents.
  • Strong skills with SIEM platforms, EDR/XDR tools, and network traffic analysis.
  • Familiarity with MITRE ATT&CK and detection engineering.

Responsibilities

  • Evaluate AI models for threat detection, incident response, and attack simulation.
  • Investigate and analyze security incidents using SIEM, EDR/XDR, and other tools.
  • Simulate adversarial thinking to identify detection gaps and bypass techniques.
  • Provide structured reasoning and feedback to improve AI threat analysis and detection accuracy.
  • Work independently and asynchronously in a flexible remote engagement.

Skills

BashDockerEDR/XDRGCFAGCIAGCIHMITRE ATT&CKOSCPOSEPPowerShellPythonSIEMCRTOCISSP

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free