About the job
About 10a Labs: At 10a Labs, we serve as the premier safety and threat-intelligence layer, relied upon by cutting-edge AI laboratories, high-growth AI companies, Fortune 10 enterprises, and leading global technology platforms. Our expertise in adversarial red teaming, model evaluations, and intelligence gathering empowers engineering, safety, and security teams to outpace evolving threats while ensuring the safe deployment of AI systems.
The Investigations Team at 10a Labs is seeking additional support to effectively respond to critical safety incidents and conduct thorough investigations across various abuse areas, including but not limited to Violence, Hate, Mental Health, CBRNE, Child Safety, Cyber Abuse, and more.
About the Role:
As a Threat Investigator, you will play a key role in supporting our London-based Investigations Team covering Europe, the Middle East, and Africa (EMEA). Your responsibilities will include identifying and responding to malicious activities and abuse on our platform, investigating suspicious behaviors, drafting detailed reports based on your findings, and providing actionable recommendations. This role necessitates a strong technical background in investigating threat actors, harmful behaviors, and cyber abuse, alongside proficiency in SQL and Python for data querying, transformation, and analysis. You will also manage escalations and reactive leads, including those that may not be identified by our current safety systems.
Investigations may involve exposure to sensitive and distressing content, including sexual, violent, or otherwise disturbing material.
This position includes an on-call component, requiring you to address urgent escalations outside of standard working hours, which may occasionally include evenings and weekends. The typical on-call rotation consists of 7 consecutive days every 2 months, though this may vary based on operational requirements, and candidates should be prepared to be flexible.
Key Responsibilities:
- Proactively identify and track malicious actors on our platform.
- Investigate potentially policy-violating activities by querying internal data sources (using SQL and Python) and cross-referencing open-source information (OSINT).
- Document and communicate investigative findings to internal stakeholders.

