Cyber security specialist (& CISO)
Role details
Job location
Tech stack
Job description
Your Mission You will contribute to reinforcement learning from human feedback (RLHF) datasets that strengthen AI reasoning across cybersecurity and information security contexts. Specifically, you will:
- Draft complex scenarios involving threat analysis, vulnerability assessment, incident response workflows, security architecture decisions, and risk management trade-offs
- Evaluate and refine AI-generated responses for technical accuracy, operational realism, appropriate severity assessment, and alignment with industry frameworks (NIST CSF, ISO 27001, MITRE ATT&CK, CIS Controls)
- Create prompt variants tailored to different contexts (e.g., CISO board briefing, SOC analyst triage, red team planning, cloud security review, third-party risk assessment, post-breach forensics)
- Design examples that intentionally expose weaknesses in security reasoning - missed attack vectors, flawed risk prioritisation, incomplete incident containment, over-reliance on compliance as security
- Ensure outputs reflect European regulatory and operational realities, including NIS2, DORA, GDPR breach notification, ENISA guidance, national CERT coordination, and sector-specific requirements (financial services, critical infrastructure, healthcare)
- Collaborate asynchronously with our research coordination team This is structured, high-focus intellectual work - the kind of threat-informed, risk-calibrated thinking you apply every day, distilled into training signal.
Requirements
Who We're Looking For You are a practising or recently practised cybersecurity professional or security leader in a European context with hands-on operational and/or strategic experience. Minimum profile:
- 5+ years of professional experience in cybersecurity, information security, or a CISO/security leadership role
- Based in an EU or UK jurisdiction with working knowledge of the European threat landscape and regulatory environment
- Strong expertise in at least two domains (e.g., network security, application security, cloud security, identity and access management, incident response, GRC, OT/ICS security, threat intelligence)
- Familiarity with major frameworks and standards - NIST CSF, ISO 27001/27002, MITRE ATT&CK, CIS Controls, OWASP, COBIT
- Ability to articulate security reasoning clearly across both technical and executive audiences, and identify flawed assumptions or blind spots quickly Bonus:
- Current or former CISO, Head of Security, or equivalent leadership role
- Relevant certifications (CISSP, CISM, OSCP, GIAC, CISA, CEH, or equivalent)
- Experience with European regulatory compliance - NIS2 implementation, DORA readiness, GDPR security requirements, eIDAS trust services
- Background in critical infrastructure protection (energy, finance, healthcare, transport)
- Experience in security architecture for cloud-native or hybrid environments (AWS, Azure, GCP)
- Incident response or digital forensics experience (DFIR)
- Red team, purple team, or adversary simulation background
- Experience briefing boards, regulators, or supervisory authorities on cyber risk
- Teaching, mentoring, or thought leadership in cybersecurity What matters most: You understand how attackers think and how defenders operate under pressure - the real-world trade-offs between security posture, business continuity, regulatory obligation, and resource constraints - and you can break it down with precision.
Commitment & Structure
- Fully remote
- Asynchronous work (flexible scheduling - work around your operational responsibilities or personal time)
Benefits & conditions
- Competitive hourly rate (market-aligned for senior European cybersecurity professionals)
- Paid weekly via secure payment infrastructure
- Performance and quality-driven continuation
Why This Matters You won't be defending one perimeter at a time. You'll be shaping how AI systems understand cybersecurity - the adversarial mindset, the defensive trade-offs, the regulatory maze, and the operational reality of keeping organisations safe in an increasingly hostile landscape. At scale. Every time a frontier model produces sharper threat analysis, identifies a more realistic attack path, or reasons more carefully about incident response priorities - your expertise is in that reasoning. The irony isn't lost on us: the AI systems that will transform cybersecurity need cybersecurity experts to train them well. This is your chance to be on the right side of that equation. This is applied security intelligence with global impact.