Job Listings
Threat Intelligence Analyst – Remote (US-Based) - listed April 9, 2026
Firm/Company
LockedIn AI
33 Irving Pl, Manhattan, New York, United States
Contact
LockedIn AI
8622797219
info.lockedinai@gmail.com
Job Description
Company: LockedIn AILocation: Remote (US-Based) · Optional hybrid in New York, NY
Employment Type: Full-Time
Salary: $120,000 – $175,000 USD / yr
About LockedIn AI
LockedIn AI is the #1 real-time AI interview and meeting copilot, trusted by over 1 million users worldwide. We deliver AI-powered assistance for live job interviews, coding assessments, and professional meetings, helping candidates communicate with clarity, confidence, and competence.
We are building the most advanced career tech platform and are looking for top talent to help secure our AI systems and users in an AI-native environment.
Role Overview
As a Threat Intelligence Analyst, you will identify, monitor, and assess cyber threats targeting LockedIn AI’s platform, AI systems, and user data. You will analyze threat data from diverse sources, produce actionable intelligence, and provide strategic insights that help the company stay ahead of adversaries targeting AI-powered platforms.
You will track AI-specific threats such as prompt injections, adversarial attacks on LLMs, credential harvesting, social engineering, and data scraping, while producing reports and recommendations that inform defensive and operational decisions.
Key Responsibilities
Threat Monitoring & Analysis
Monitor OSINT, dark web forums, threat feeds, social media, and commercial intelligence sources for emerging threats.
Analyze threat actor tactics, techniques, and procedures (TTPs) affecting AI, SaaS, and career tech platforms.
Track campaigns targeting AI systems, including prompt injection, model extraction, and data poisoning attempts.
Detect credential leaks, phishing campaigns, and brand impersonation threats.
Intelligence Production & Reporting
Produce actionable intelligence reports, alerts, and assessments for technical and executive audiences.
Provide tactical intelligence to support detection, incident response, and risk mitigation.
Maintain a structured threat intelligence knowledge base for historical analysis and lessons learned.
AI-Specific Threat Intelligence
Research adversarial attacks on LLMs, including jailbreaking, model extraction, and data exfiltration.
Collaborate with engineering teams to implement defensive improvements based on intelligence findings.
Map threats to AI frameworks using MITRE ATLAS, OWASP Top 10 for LLM Applications, and other frameworks.
Detection & Incident Support
Develop detection rules, SIEM queries, and monitoring signatures.
Provide real-time threat context for security incidents and post-incident analysis.
Automate workflows to enrich alerts and accelerate detection and response.
Vulnerability Intelligence & Risk Assessment
Track vulnerabilities, exploits, and patch releases for LockedIn AI’s technology stack.
Assess risk impact and provide remediation recommendations based on threat intelligence.
Conduct periodic threat assessments to evaluate overall security posture.
Cross-Functional Collaboration
Work with engineering, security, product, and operations teams to align intelligence priorities.
Contribute to industry threat intelligence sharing groups and maintain awareness of emerging trends.
Educate company teams on threat awareness and security best practices.
Required Qualifications
3+ years of experience in threat intelligence, cyber threat analysis, or related security roles.
Strong knowledge of threat actors, TTPs, and the current cyber threat landscape.
Experience producing actionable intelligence reports for technical and executive audiences.
Hands-on OSINT collection and threat actor tracking experience.
Familiarity with SIEM platforms (Splunk, Elastic, Sentinel, or similar).
Startup or high-growth experience preferred.
Bachelor’s degree in Cybersecurity, InfoSec, Computer Science, Intelligence Studies, or related field.
Technical Skills
Threat intelligence platforms and OSINT tools.
Scripting/automation in Python, YARA, or similar.
MITRE ATT&CK, MITRE ATLAS, OWASP LLM Top 10 frameworks.
Networking fundamentals and common protocols.
Preferred Qualifications
AI-specific threat intelligence experience (LLM attacks, prompt injection, model extraction).
Incident response support and real-time threat context experience.
Contributions to open-source intelligence tools or publications.
Familiarity with AI security frameworks and regulatory requirements.
Why Join LockedIn AI?
Equity & Impact: Early-stage equity with direct influence on security for 1M+ users.
AI-Native Environment: Work at the frontier of AI security and career tech innovation.
Fast-Paced Startup: Make high-impact security decisions in a dynamic environment.
Flexible & Collaborative Culture: Remote-first, with optional NYC coworking.
Growth & Learning: Expand expertise across AI security, threat intelligence, and applied cybersecurity.
How to Apply
Submit your application with:
Resume or CV
A brief note explaining:
Why you want to join LockedIn AI
Your experience with threat intelligence or AI security
Feedback on the LockedIn AI platform (optional)
Any portfolio work, GitHub repos, or research (optional)
