At a Glance
- Tasks: Evaluate AI-generated threat hunt results and research hypotheses using cutting-edge tools.
- Company: Join a leading AI research lab backed by top investors in a remote role.
- Benefits: Competitive pay, flexible hours, and the chance to work with elite talent.
- Other info: Dynamic remote environment with opportunities for professional growth.
- Why this job: Make a real impact in cybersecurity while working on innovative AI projects.
- Qualifications: 3–5 years of cybersecurity experience and strong analytical skills required.
Mercor connects elite creative and technical talent with leading AI research labs. Headquartered in San Francisco, our investors include Benchmark, General Catalyst, Peter Thiel, Adam D'Angelo, Larry Summers, and Jack Dorsey.
Position: Cybersecurity Professionals
Type: Contract
Compensation: $48–$104/hour
Location: Remote
Role Responsibilities
- Evaluate AI-generated threat hunt results for correctness and quality.
- Research hunt hypotheses using MITRE ATT&CK and Google Threat Intelligence.
- Assess investigation steps and verify AI interpretation of log evidence.
- Score outputs across five dimensions using a structured rubric.
- Provide written comments identifying errors or gaps in AI reasoning.
- Work independently and asynchronously on a project-based schedule.
Qualifications
Must-Have
- 3–5+ years of professional cybersecurity experience and relevant college-level or post-graduate education.
- Hands-on experience in threat hunting, DFIR, detection engineering, SOC analysis, or red teaming.
- Familiarity with MITRE ATT&CK and ability to research threat actor TTPs independently.
- Experience reading structured log data (SIEM, EDR, or endpoint telemetry).
- Strong analytical reasoning to identify when evidence does or does not support a conclusion.
Preferred
- Chronicle/Google SecOps experience.
- Relevant certifications (OSCP, GIAC, CISSP, or equivalent).
Application Process (Takes 20–30 mins to complete)
- Upload resume
- AI interview based on your resume
- Submit form
Resources & Support
For details about the interview process and platform information, please check: any help or support, reach out to: PS: Our team reviews applications daily. Please complete your AI interview and application steps to be considered for this opportunity.
Cyber Threat Hunter in London employer: Mercor
Contact Detail:
Mercor Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Hunter in London
✨Tip Number 1
Get familiar with the company and its mission. When you know what Mercor stands for, you can tailor your conversations to show how your skills align with their goals. This will make you stand out during interviews!
✨Tip Number 2
Practice makes perfect! Before your AI interview, run through some common cybersecurity scenarios or questions. This will help you articulate your experience in threat hunting and make a strong impression.
✨Tip Number 3
Don’t forget to showcase your analytical skills! Be ready to discuss specific examples where you’ve identified gaps in AI reasoning or improved threat detection. Real-life stories resonate well with interviewers.
✨Tip Number 4
Apply through our website! It’s the quickest way to get your application seen by the right people. Plus, it shows you’re proactive and serious about landing that Cyber Threat Hunter role.
We think you need these skills to ace Cyber Threat Hunter in London
Some tips for your application 🫡
Tailor Your Resume: Make sure your resume highlights your relevant experience in cybersecurity, especially in threat hunting and DFIR. We want to see how your skills align with the role, so don’t be shy about showcasing your hands-on experience!
Show Off Your Knowledge: When filling out your application, reference your familiarity with MITRE ATT&CK and any specific tools you've used. We love seeing candidates who can demonstrate their understanding of threat actor TTPs and how they apply them in real-world scenarios.
Be Clear and Concise: In your written comments and responses, clarity is key! We appreciate well-structured thoughts that get straight to the point. Remember, you’re scoring outputs and identifying gaps, so make your feedback as actionable as possible.
Apply Through Our Website: Don’t forget to submit your application through our website! It’s the best way for us to receive your details and ensure you’re considered for this exciting opportunity. Plus, it only takes 20–30 minutes to complete!
How to prepare for a job interview at Mercor
✨Know Your MITRE ATT&CK
Make sure you brush up on the MITRE ATT&CK framework before your interview. Familiarity with this will not only help you answer questions confidently but also demonstrate your understanding of threat actor tactics, techniques, and procedures.
✨Showcase Your Analytical Skills
Prepare to discuss specific examples from your past experience where you've used analytical reasoning to identify gaps in evidence or errors in AI interpretations. This will highlight your problem-solving abilities and your hands-on experience in threat hunting.
✨Be Ready for Technical Questions
Expect technical questions related to threat hunting, DFIR, and log data analysis. Brush up on your knowledge of SIEM, EDR, and endpoint telemetry, and be prepared to explain how you've applied these tools in real-world scenarios.
✨Communicate Clearly and Concisely
Since the role involves providing written comments on AI outputs, practice articulating your thoughts clearly. During the interview, focus on being concise yet thorough in your explanations, as this will reflect your ability to communicate effectively in a remote work environment.