Cyber security analyst Jobs in Detroit, MI
Create a job alert for this search
Cyber security analyst • detroit mi
Remote Cyber Security Experts - AI Trainer ($85-$95 per hour)
MercorDetroit, Michigan, US- Promoted
- New!
Security Specialist
Security Industry SpecialistsDetroit, MI, United StatesClaims Analyst
LancesoftDetroit, MI, US- Promoted
Pricing Analyst
Central TransportHighland Park, MI, United StatesSr. Cyber Threat Intelligence Analyst - Security Operations
General MotorsDetroit, MichiganSecurity Officer
Serrato CorporationDetroit, MI, USASecurity Operations Center Analyst
TechBiz Global GmbHDetroit, MI, USVehicle Cyber Security Systems Engineer
Ford Motor CompanyDearborn, MI, United StatesSales Analyst
Leggett & PlattDetroit, MI, USCyber Solutions Insurance Risk Advisor
HylantDetroit, Michigan- Promoted
Cyber Security Practitioner
KyybaDearborn, MI, United States- Promoted
Security Director
Titan Security Services IncDearborn, MI, United StatesSecurity Engineer
DATAMAXISDearborn, Michigan, United StatesPrincipal Cyber Security Engineer
Ally500 Woodward Avenue, MI, United StatesCyber Oracle Cloud Security – Consultant
DeloitteDetroit, Michigan, USCyber Oracle Cloud Security – Senior Consultant
DeloitteDetroit, Michigan, USVehicle Cyber Security Engineer - Work from home
TEKsystemsDetroit, MI, US- Promoted
School Security
The Leona GroupDetroit, MI, United States- Promoted
Claims Analyst
LanceSoftDetroit, MI, United StatesRemote Cyber Security Experts - AI Trainer ($85-$95 per hour)
MercorDetroit, Michigan, US- Full-time
- Remote
Mercor is recruiting on behalf of a cutting-edge AI research lab building advanced AI systems for cybersecurity applications. We are seeking senior cybersecurity professionals with deep hands-on experience across both defensive (Blue Team) and offensive (Red Team) security disciplines. In this role, you will apply real-world adversarial and defensive expertise to evaluate, stress-test, and improve AI models designed to assist with threat detection, incident response, and attack simulation. Your insights will directly inform how AI systems reason about attacks, evasions, detection logic, and response workflows. This is a flexible, remote engagement ideal for experienced practitioners who have operated in enterprise, consulting, or high-security environments.
- Key Responsibilities ### Defensive (Blue Team) Contributions - Investigate and analyse real or simulated security incidents (e.g., phishing, lateral movement, ransomware, privilege escalation). - Review logs and telemetry from SIEM, EDR / XDR, firewall, cloud, and identity systems. - Apply frameworks such as MITRE ATTACK to classify adversary behavior. - Evaluate alert quality, detection rules, triage decisions, and response workflows. - Assess AI-generated investigations for technical correctness and operational realism. ### Offensive (Red Team) Contributions - Analyse attack chains including initial access, persistence, privilege escalation, lateral movement, and data exfiltration. - Simulate adversarial thinking to evaluate detection gaps and bypass techniques. - Review exploit techniques, payload behaviors, and evasion strategies. - Provide insights into attack surface analysis and real-world adversary tactics. - Stress-test AI systems against realistic red-team scenarios. ### AI Evaluation & Feedback - Provide structured reasoning explaining investigative and adversarial decisions. - Identify weaknesses in AI threat analysis and suggest improvements. - Help refine benchmarks for detection, triage, and attack simulation accuracy. * * * ## Requirements ### Experience - 5+ years in cybersecurity with experience in one or more of : - SOC Analyst (Level II / III) - Incident Responder - Detection Engineer - Threat Hunter - Red Team Operator / Penetration Tester - Security Consultant (Offensive Security) - Hands-on experience conducting or responding to real-world security incidents. * * * ### Technical Skills – Blue Team - Strong experience with : - SIEM platforms (Splunk, Sentinel, QRadar, Elastic) - EDR / XDR tools (CrowdStrike, Defender, Carbon Black) - Log analysis and event correlation - Network traffic analysis (Wireshark, Zeek, tcpdump) - Cloud security and IAM investigation experience preferred. - Familiarity with MITRE ATT&CK mapping and detection engineering. * * * ### Technical Skills – Red Team - Experience with : - Penetration testing methodologies - Adversary emulation and attack simulation - Exploitation frameworks (e.g., Metasploit, Cobalt Strike or equivalents) - Privilege escalation techniques - Lateral movement techniques - Evasion and obfuscation methods - Understanding of Active Directory attacks, phishing frameworks, and payload development is a plus. * * * ### Analytical & Communication Skills - Strong written documentation skills explaining technical reasoning. - Ability to think from both attacker and defender perspectives. - Structured, logical analysis of complex security scenarios. * * * ### Preferred Qualifications - Certifications such as : - OSCP, OSEP, CRTO (Red Team) - GCIA, GCFA, GCIH (Blue Team) - CISSP - Experience mentoring junior analysts or red team members. - Scripting proficiency (Python, PowerShell, Bash). * * * ## Why Join - Contribute to next-generation AI systems for cybersecurity. - Work at the intersection of offensive and defensive security research. - High-impact role shaping AI reasoning about real-world cyber threats. - Flexible engagement suited for senior practitioners. - Collaborate with leading AI researchers and security experts.