JOB TODAY logo

AI Researcher - Kangal AI

Information Technology

30 October 2025151 views

Expires in 15 days

Role Overview
We are seeking an AI Scientist to develop, fine-tune, and deploy large language models (LLMs) for national security applications. You will work on advanced AI research and real-time intelligence solutions that require precision, reliability, and alignment with allied defence objectives.


Key Responsibilities

  • Design and train LLMs for national security purposes.
  • Develop scalable, secure pipelines for intelligence data processing.
  • Collaborate with cross-functional teams to translate AI research into operational solutions.
  • Ensure AI systems adhere to security standards and ethical guidelines.

Qualifications

  • Advanced degree (PhD preferred) in AI, Machine Learning, NLP, or related field.
  • Strong experience with LLM development, fine-tuning, and deployment.
  • Proven expertise in AI applied to text analysis, information retrieval, or intelligence applications.
  • Understanding of national security and allied operations is a plus.
  • Eligible to obtain security clearance (required).
  • Experience
    Not required
  • Languages
    English – Advanced
  • Employment
    Full-time
  • Salary
    £50,000 – £100,000 yearly
  • Benefits
    Equity
  • Starting time
    Immediate start!

pin icon167-169 Great Portland Street, W1W 5PF, London

icon
Information TechnologyLondon

Artificial Intelligence For National Security • 1-10 Employees

Hiring on JOB TODAY since October, 2025

We develop state-of-the-art AI for national security.

Daniel B. avatar icon
Daniel B.Active 13 days ago
Are you hiring?

Post a job and hire

Hire now

Similar jobs

  • Security Operations Analyst
    Security Operations Analyst
    1 month ago
    £36000–£49000 yearly
    Full-time
    London

    As a Security Operations Analyst. You’ll monitor, triage, and respond to threats across our global estate, using modern SIEM/EDR and automation to keep [Company/clients] safe. Hybrid working, strong learning culture, and clear progression. The role • You’ll be part of our Security Operations Centre, detecting and responding to cyber threats, improving our controls, and guiding the business through security incidents. This role suits someone hands-on with SOC tooling, calm under pressure, and eager to automate the boring stuff. What you’ll do • Monitor and triage security alerts across SIEM (e.g., Microsoft Sentinel/Splunk), EDR (e.g., Defender for Endpoint/CrowdStrike), email security, and cloud platforms., • Investigate incidents end-to-end: scoping, containment, eradication, and recovery; maintain clear incident records and timelines., • Execute and improve playbooks/runbooks; contribute to SOAR automation for repetitive tasks., • Perform threat hunting using hypotheses mapped to MITRE ATT&CK; enrich findings with threat intelligence (internal and external)., • Lead/assist on phishing investigations, malware analysis at triage level, and suspicious user activity reviews., • Collaborate with IT/Cloud/Network teams on log onboarding, tuning, and control gaps; reduce false positives., • Track and meet SLAs/KPIs (MTTD/MTTR); deliver concise, executive-ready post-incident reports and lessons learned., • Support vulnerability management by contextualising exposures and recommending remediation priorities., • Participate in shift handovers and, if applicable, an out-of-hours/on-call rota., • Contribute to security awareness and purple-team exercises/attack simulations. What you’ll bring • Experience in a SOC/IR role (typically 2–5 years for this level) with demonstrable incident handling., • Working knowledge of: SIEM, EDR, email security, network security (IDS/IPS, firewalls), and cloud security (Azure/AWS)., • Ability to query and analyse data (KQL/Splunk SPL/SQL); basic scripting (PowerShell or Python) for enrichment and automation., • Familiarity with frameworks and standards: MITRE ATT&CK, NIST CSF, ISO/IEC 27001, and Cyber Essentials/Plus., • Strong written and verbal communication; comfortable translating technical risk for non-technical audiences., • A proactive mindset: curiosity, ownership, and continuous improvement., • Nice to have (advantageous, not essential), • Certifications such as Security+, CySA+, SC-200, AZ-500, GCIH/GCIA/GCTI, SSCP, GCED, or equivalent., • Experience with SOAR tooling, sandboxing, DFIR basics, or purple-team methodology., • Exposure to identity security (Entra ID, Okta), SaaS security, or container/Kubernetes security., • Experience in regulated environments (financial services, public sector) and/or UK SC/BPSS clearance eligibility. What we offer • Leave: 20 days’ annual leave, • Pension & protection: Employer pension contribution, life assurance, and income protection., • Learning & growth: Budget for certifications, paid exam days, access to labs and training platforms; clear progression to Senior Analyst/Incident Responder/Threat Hunter.

    Easy apply