JOB TODAY logo

AI Researcher - Kangal AI

Tecnología de la información

30 octubre 2025155 vistas

Caduca en 13 días

Role Overview
We are seeking an AI Scientist to develop, fine-tune, and deploy large language models (LLMs) for national security applications. You will work on advanced AI research and real-time intelligence solutions that require precision, reliability, and alignment with allied defence objectives.


Key Responsibilities

  • Design and train LLMs for national security purposes.
  • Develop scalable, secure pipelines for intelligence data processing.
  • Collaborate with cross-functional teams to translate AI research into operational solutions.
  • Ensure AI systems adhere to security standards and ethical guidelines.

Qualifications

  • Advanced degree (PhD preferred) in AI, Machine Learning, NLP, or related field.
  • Strong experience with LLM development, fine-tuning, and deployment.
  • Proven expertise in AI applied to text analysis, information retrieval, or intelligence applications.
  • Understanding of national security and allied operations is a plus.
  • Eligible to obtain security clearance (required).
  • Experiencia
    No se requiere
  • Idiomas
    Inglés – Avanzado
  • Jornada
    Completa
  • Salario
    50.000 £ – 100.000 £ anual
  • Extras
    Equity
  • Inicio
    Incorporación inmediata

pin icon167-169 Great Portland Street, W1W 5PF, London

icon
Tecnología de la informaciónLondon

Artificial Intelligence For National Security • 1-10 empleados

En JOB TODAY desde octubre, 2025

We develop state-of-the-art AI for national security.

Daniel B. avatar icon
Daniel B.Activo hace 15 días
¿Estás contratando?

Publica una oferta y contrata

Contratar Ya

Ofertas similares

  • Security Operations Analyst
    Security Operations Analyst
    hace 1 mes
    £36000–£49000 anual
    Jornada completa
    London

    As a Security Operations Analyst. You’ll monitor, triage, and respond to threats across our global estate, using modern SIEM/EDR and automation to keep [Company/clients] safe. Hybrid working, strong learning culture, and clear progression. The role • You’ll be part of our Security Operations Centre, detecting and responding to cyber threats, improving our controls, and guiding the business through security incidents. This role suits someone hands-on with SOC tooling, calm under pressure, and eager to automate the boring stuff. What you’ll do • Monitor and triage security alerts across SIEM (e.g., Microsoft Sentinel/Splunk), EDR (e.g., Defender for Endpoint/CrowdStrike), email security, and cloud platforms., • Investigate incidents end-to-end: scoping, containment, eradication, and recovery; maintain clear incident records and timelines., • Execute and improve playbooks/runbooks; contribute to SOAR automation for repetitive tasks., • Perform threat hunting using hypotheses mapped to MITRE ATT&CK; enrich findings with threat intelligence (internal and external)., • Lead/assist on phishing investigations, malware analysis at triage level, and suspicious user activity reviews., • Collaborate with IT/Cloud/Network teams on log onboarding, tuning, and control gaps; reduce false positives., • Track and meet SLAs/KPIs (MTTD/MTTR); deliver concise, executive-ready post-incident reports and lessons learned., • Support vulnerability management by contextualising exposures and recommending remediation priorities., • Participate in shift handovers and, if applicable, an out-of-hours/on-call rota., • Contribute to security awareness and purple-team exercises/attack simulations. What you’ll bring • Experience in a SOC/IR role (typically 2–5 years for this level) with demonstrable incident handling., • Working knowledge of: SIEM, EDR, email security, network security (IDS/IPS, firewalls), and cloud security (Azure/AWS)., • Ability to query and analyse data (KQL/Splunk SPL/SQL); basic scripting (PowerShell or Python) for enrichment and automation., • Familiarity with frameworks and standards: MITRE ATT&CK, NIST CSF, ISO/IEC 27001, and Cyber Essentials/Plus., • Strong written and verbal communication; comfortable translating technical risk for non-technical audiences., • A proactive mindset: curiosity, ownership, and continuous improvement., • Nice to have (advantageous, not essential), • Certifications such as Security+, CySA+, SC-200, AZ-500, GCIH/GCIA/GCTI, SSCP, GCED, or equivalent., • Experience with SOAR tooling, sandboxing, DFIR basics, or purple-team methodology., • Exposure to identity security (Entra ID, Okta), SaaS security, or container/Kubernetes security., • Experience in regulated environments (financial services, public sector) and/or UK SC/BPSS clearance eligibility. What we offer • Leave: 20 days’ annual leave, • Pension & protection: Employer pension contribution, life assurance, and income protection., • Learning & growth: Budget for certifications, paid exam days, access to labs and training platforms; clear progression to Senior Analyst/Incident Responder/Threat Hunter.

    Inscripción fácil