Counterintelligence analyst jobs near me - 107 jobs
Let us run your job search
Sit back and relax while we apply to 100s of jobs for you - $25
Senior Cyber Intelligence Analyst | Remote
UPS 4.6
Remote counterintelligence analyst job
**Before you apply to a job, select your language preference from the options available at the top right of this page.** Explore your next opportunity at a Fortune Global 500 organization. Envision innovative possibilities, experience our rewarding culture, and work with talented teams that help you become better every day. We know what it takes to lead UPS into tomorrow-people with a unique combination of skill + passion. If you have the qualities and drive to lead yourself or teams, there are roles ready to cultivate your skills and take you to the next level.
**Job Description:**
**Job Summary**
This position engages in the identification, tracking, monitoring, containment and mitigation of information security threats. He/She performs quality assurance functions to validate that existing methods of research are successful in identifying and documenting security incidents. This position defines procedures for analysis and makes adjustments as technologies and methodologies advance.
**Responsibilities:**
+ Assesses, prioritizes and takes action on requests that improve existing Security Operation Center (SOC) tools and procedures.
+ Partners with management to coordinate security incident response efforts to communicate information, drive resource actions and decisions, provide recommendations, and ensure resolution.
+ Evaluates and analyzes complex malicious code through the use of tools including disassemblers, debuggers, hex editors, un-packers, virtual machines and network sniffers.
+ Conducts reverse-engineering for known and suspected malware files.
+ Investigates instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration.
+ Performs research in the area of malicious software, vulnerabilities, and exploitation tactics, and recommend preventative or defensive actions.
+ Produces reports detailing attributes and functionality of malware, and indicators that can be used for malware identification/detection, to include behavior, identified infrastructure used for command and control, and mitigation techniques.
+ Analyses the relationship between a given sample of malware and other known samples/families of malware, and notable features that indicate the origin or sophistication of the malware and its authors.
**Qualifications:**
+ 2-3 years' experience as Security Operations Center (SOC) Analyst including Incident Response and Handling roles
+ Experience in Malware Reverse Engineering and Sandboxing
+ Experience with SIEM Technology
+ Significant experience with Linux, TCP/IP, UNIX, MS-Windows, IP Routing, Firewalls and IPS
+ Understanding of behavioral based threat models, including ATT&CK, Cyber Kill Chain, Diamond Model, etc.
+ Deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats
+ Demonstrated experience using Open Source (OllyDbg, Radare, GDB, etc.) malware analysis tools
+ Ability to analyze shellcode, and packed and obfuscated code, and their associated algorithms
+ Ability to develop network and host based signatures to identify specific malware. Recommend heuristic or anomaly based detection methods
+ Subject matter expertise in the detection, analysis and mitigation of malware
+ Experience with Information Security Research, Malware Reverse Engineering, Cyber Threat Analysis, Windows Operating System and Data Analysis
+ Knowledge of Research skills, Technical Writing, Information Security Research, Security Incident Response, Security Risk Assessment/Analysis
+ Bachelor's Degree or International equivalent - Preferred
+ Experience with multi-cloud technologies such as Google Cloud, Azure and AWS
**Other Criteria:**
+ Job Grade: 20H
+ Must be currently located in the same geographic location as the job or willing to relocate yourself -Required.
+ Last day to apply is 01/06/2026 EOD
+ Shift: Monday - Friday 7am to 5pm or 8am to 6pm
**Employee Type:**
Permanent
UPS is committed to providing a workplace free of discrimination, harassment, and retaliation.
Employer will sponsor visas for specific positions. UPS is an equal opportunity employer. UPS does not discriminate on the basis of race/color/religion/sex/national origin/veteran/disability/age/sexual orientation/gender identity or any other characteristic protected by law.
$78k-101k yearly est. 8d ago
Looking for a job?
Let Zippia find it for you.
Threat Intelligence Analyst, Threat Defense
Doordash 4.4
Remote counterintelligence analyst job
About the Team
At DoorDash, we are building the industry's most scalable and reliable delivery network, securing the data and protecting the privacy of our consumers, merchants, and dashers. Our Threat Defense team, encompassing Threat Response, Threat Hunting, Threat Intelligence, and Detection Engineering, is crucial to this mission. We are a fast-paced, highly collaborative group committed to innovation, proactive defense, and understanding the evolving threat landscape. Our ultimate goal is to create a secure DoorDash environment through proactive threat preparation and rapid response, safeguarding our people, partners, customers, and technologies with unwavering vigilance.
About the Role
The Threat Intelligence Analyst will be a foundational member of the Threat Defense Team and integral component of the Cyber Defense | Security Organization. As a Threat Intelligence Analyst, you'll be at the forefront of DoorDash's defensive capabilities, responsible for identifying, analyzing, and disseminating critical threat information. You'll proactively monitor the external threat landscape, track emerging attack vectors, and assess the potential impact on DoorDash. This role involves deep dives into threat actor methodologies, Tactics, Techniques, and Procedures (TTPs), and campaigns, translating raw intelligence into actionable insights for our security teams.
You'll play a crucial role in enhancing our detection capabilities, informing our security posture, and ultimately safeguarding our ecosystem.
You will report into the Senior Manager, Threat Defense under the Director, Cyber Defense and Chief Information Security Officer.
You're excited about this opportunity because you willā¦
Develop and execute operational and tactical threat intelligence requirements, leveraging a combination of open source and proprietary intelligence.
Maintain up to date knowledge of global security trends and the latest cyber threats in order to identify and assess threats to the company.
Prepare and deliver threat intelligence products to cross-functional partners and senior stakeholders.
Work with cross-functional teams in a fast-paced environment.
Solve complex problems and think critically.
We're excited about you becauseā¦
4+ years of experience in a dedicated threat intelligence role.
A strong understanding of cyber threat intelligence lifecycle and frameworks (e.g., MITRE ATT&CK, Kill Chain).
Proficiency in collecting, analyzing, and synthesizing threat data from various sources (OSINT, commercial feeds, dark web forums).
Experience with threat intelligence platforms and security information and event management (SIEM) systems. Experience with scripting languages (e.g., Python) for data analysis and automation is a plus.
Ability to articulate complex technical information clearly and concisely to both technical and non-technical audiences.
Must be comfortable regularly exercising discretion and independent judgment in performing job duties, including evaluating options, making informed decisions, and determining appropriate courses of action within the scope of assigned responsibilities.
Applications for this position are accepted on an ongoing basis
Notice to Applicants for Jobs Located in NYC or Remote Jobs Associated With Office in NYC Only
We use Covey as part of our hiring and/or promotional process for jobs in NYC and certain features may qualify it as an AEDT in NYC. As part of the hiring and/or promotion process, we provide Covey with job requirements and candidate submitted applications. We began using Covey Scout for Inbound from August 21, 2023, through December 21, 2023, and resumed using Covey Scout for Inbound again on June 29, 2024.
The Covey tool has been reviewed by an independent auditor. Results of the audit may be viewed here: Covey
Compensation
The successful candidate's starting pay will fall within the pay range listed below and is determined based on job-related factors including, but not limited to, skills, experience, qualifications, work location, and market conditions. Base salary is localized according to an employee's work location. Ranges are market-dependent and may be modified in the future.
In addition to base salary, the compensation for this role includes opportunities for equity grants. Talk to your recruiter for more information.
DoorDash cares about you and your overall well-being. That's why we offer a comprehensive benefits package to all regular employees, which includes a 401(k) plan with employer matching, 16 weeks of paid parental leave, wellness benefits, commuter benefits match, paid time off and paid sick leave in compliance with applicable laws (e.g. Colorado Healthy Families and Workplaces Act). DoorDash also offers medical, dental, and vision benefits, 11 paid holidays, disability and basic life insurance, family-forming assistance, and a mental health program, among others.
To learn more about our benefits, visit our careers page here.
See below for paid time off details:
For salaried roles: flexible paid time off/vacation, plus 80 hours of paid sick time per year.
For hourly roles: vacation accrued at about 1 hour for every 25.97 hours worked (e.g. about 6.7 hours/month if working 40 hours/week; about 3.4 hours/month if working 20 hours/week), and paid sick time accrued at 1 hour for every 30 hours worked (e.g. about 5.8 hours/month if working 40 hours/week; about 2.9 hours/month if working 20 hours/week).
The national base pay range for this position within the United States, including Illinois and Colorado.$130,600-$192,000 USDAbout DoorDash
At DoorDash, our mission to empower local economies shapes how our team members move quickly, learn, and reiterate in order to make impactful decisions that display empathy for our range of users-from Dashers to merchant partners to consumers. We are a technology and logistics company that started with door-to-door delivery, and we are looking for team members who can help us go from a company that is known for delivering food to a company that people turn to for any and all goods.
DoorDash is growing rapidly and changing constantly, which gives our team members the opportunity to share their unique perspectives, solve new challenges, and own their careers. We're committed to supporting employees' happiness, healthiness, and overall well-being by providing comprehensive benefits and perks including premium healthcare, wellness expense reimbursement, paid parental leave and more.
Our Commitment to Diversity and Inclusion
We're committed to growing and empowering a more inclusive community within our company, industry, and cities. That's why we hire and cultivate diverse teams of people from all backgrounds, experiences, and perspectives. We believe that true innovation happens when everyone has room at the table and the tools, resources, and opportunity to excel.
Statement of Non-Discrimination: In keeping with our beliefs and goals, no employee or applicant will face discrimination or harassment based on: race, color, ancestry, national origin, religion, age, gender, marital/domestic partner status, sexual orientation, gender identity or expression, disability status, or veteran status. Above and beyond discrimination and harassment based on āprotected categories,ā we also strive to prevent other subtler forms of inappropriate behavior (i.e., stereotyping) from ever gaining a foothold in our office. Whether blatant or hidden, barriers to success have no place at DoorDash. We value a diverse workforce - people who identify as women, non-binary or gender non-conforming, LGBTQIA+, American Indian or Native Alaskan, Black or African American, Hispanic or Latinx, Native Hawaiian or Other Pacific Islander, differently-abled, caretakers and parents, and veterans are strongly encouraged to apply. Thank you to the Level Playing Field Institute for this statement of non-discrimination.
Pursuant to the San Francisco Fair Chance Ordinance, Los Angeles Fair Chance Initiative for Hiring Ordinance, and any other state or local hiring regulations, we will consider for employment any qualified applicant, including those with arrest and conviction records, in a manner consistent with the applicable regulation.
If you need any accommodations, please inform your recruiting contact upon initial connection.
$130.6k-192k yearly Auto-Apply 21d ago
Embedded Lead Intelligence Analyst
Sibylline Americas
Remote counterintelligence analyst job
About Sibylline Sibylline is a leading intelligence and strategic risk consultancy in the security sector. Since 2010 we have supported businesses, governments and NGOs through the provision of high-quality risk analysis, due diligence and consultancy services.
The firm provides an innovative, entrepreneurial and fast-growing working environment, offering employees ever greater exposure to high profile clients and challenges. Sibylline offers fantastic opportunities for career progression within a successful company, and we aim to help our employees to build their own personal profiles as well-regarded analysts within the broader industry.
Key attributes of Sibylline employees are:
Self-motivated, and auto-improving individuals who can couple initiative and boldness with good judgement
Excellent written and spoken English
Clarity of thought and analytical flair
Strong, demonstrable interest in security and intelligence
The ability to work under pressure, demonstrate leadership when required but also be able to collaborate effectively in teams
Excellent attention to detail
Job Description
Position Summary
We are looking for an experienced Lead Intelligence Analyst to join us in an embedded role for a global social media client. You will be based in the client's Global Physical Security Intelligence Team, and contributing to international geopolitical and security analysis, strategic risk assessments and advisory services. In this role, you will assist the client in making decisions about the safety and security of its people, assets, operations, and reputation in the Americas region.
You will be responsible for conducting leveraging advanced analytical and investigative techniques to identify and assess risks to the client's business, provide actionable intelligence and support decision making for key security functions, including protective intelligence, crisis management and travel security. You will monitor intelligence sources, conduct risk assessments and produce strategic and tactical intelligence products. You will also be responsible for overseeing a small team of embedded intelligence analysts and its delivery of high-quality and actionable strategic and protective intelligence insights.
You will proactively engage with the client and stakeholders on intelligence needs and priorities. You will act as line manager for the embedded team, supporting each analyst on training, performance management, and continuous improvement.
This is an onsite role at the client's San Jose office, working Monday to Friday 9am - 6pm, with the potential to work remotely one day a week. There may be occasional need to work out-of-hours during emergencies and time-sensitive matters, including holidays and weekends.
Essential Functions / Responsibilities
Investigate threat actors, including those operating in illicit online communities, and assess their tactics, techniques, and procedures (TTPs)
Conduct investigations and threat assessments for persons/groups of interest as part of the overall management of threats to the client's employees, assets, and operations
Conduct OSINT analysis, including deep and dark web monitoring
Develop and implement protective intelligence gathering, assessment, and dissemination protocols
Monitor open-source and vendor intelligence feeds to identify risks to business operations in the Americas region
Conduct comprehensive risk assessments for personnel, assets, operations, travel, and special events
Produce strategic and tactical reports to deliver proactive and in-depth analysis and actionable insight to client stakeholders, to enable them to drive mitigation measures
Deliver situational awareness reporting to support crisis response and business continuity
Manage intelligence requirements, centralise relevant sources, and ensure comprehensive intelligence coverage
Establish and maintain relationships with internal stakeholders to align intelligence efforts with business needs
Lead cross-functional intelligence projects around high-impact events and emerging threats
Safeguard sensitive and confidential information
Display innovation, implementing the latest techniques, tools and best practices to support a global intelligence function
Work with the embedded analysts to prepare and deliver credible, timely, and actionable intelligence products and verbal briefings to clearly and accurately inform decision making
Set team priorities, manage deadlines, and provide continuous editorial feedback and mentoring support to ensure high-quality service delivery
Assist Sibylline with the day-to-day management of the client's account, facilitating the escalation of problems, challenges and new opportunities as required
Qualifications
Knowledge, Skills, and Abilities
Strong proficiency in OSINT sources, methods and tools (e.g., Brandwatch, Liferaft, Skopenow, Flashpoint) and investigative resources (e.g., Clear, LexisNexis), including deep and dark web sources
Strong commercial awareness, with the ability to interpret and collect intelligence information, track threats and geopolitical developments, and determine their impact to business staff, assets, operations and reputation
High-level experience in geopolitical risk, violent actor behaviours and activities, and other risk areas relevant to a global tech company
Experience leveraging data analysis tools and techniques; SQL and/or Python preferred
Excellent ability to deliver verbal and written briefings to stakeholders, customise intelligence output to stakeholder needs, and build and maintain strong stakeholder relationships
Advanced analytical and problem-solving skills, attention to detail, and ability to manage multiple priorities in a fast-paced environment
Experience working cross-functionally across global teams and adapting to evolving intelligence needs
Experience in managing complex projects and priorities with a high degree of autonomy
Ability to innovate and identify potential opportunities to enhance efficiency and/or effectiveness within own area of work, including developing own knowledge to increase effectiveness
Requirements
Bachelor's degree in related field, such as International Relations, Security Studies, Journalism, Business Management; Masters degree preferred.
5+ years of experience in intelligence collection, analysis, and production, with a focus on business risk and security, investigating threat actors, documenting TTPs, and contributing to tactical, operational, and strategic intelligence
Excellent written and verbal communication skills in English, and fluency in either Portuguese or Spanish (ideally both)
1+ years line management experience
Additional Information
Work Environment/Physical Requirements
This position is largely self-directed and requires understanding and compliance with company policies, procedures, and values. The position works in an on-site office environment utilizing a computer and standard office equipment. While performing the duties of this job, the employee is regularly required to interact collaboratively with the team and stakeholders, and communicate via phone, videophone, or text messaging. The employee may be required to occasionally lift and/or move up to 20 pounds. The position may require travel up to 10%.
Benefits
Salary Range: $130,000 - $157,500
401(k) up to 5% matching
Medical/Dental/Vision
Basic Life and AD&D Insurance
Long Term/Short Term Disability
PTO: 160 hours (20 days) accrued per year
Sick: 80 hours sick time front loaded
10 Holidays
Employee Assistance Program and Employee Discount Program
Interview Process
Initial call with our Talent Acquisition team member
Timed written assessment (arranged at the time that suits you) to test writing and analytical capability
Panel interview with some of the team members and hiring managers at Sibylline
Meet and Greet with the client
Research indicates that certain groups are less likely to apply for a position unless they meet every single requirement. If you feel you meet some of the requirements and can offer a unique perspective to this role, we strongly encourage you to apply-you might be the perfect fit we're looking for!
Sibylline is committed to the recruitment and selection of candidates without regard for sexual orientation, gender, ethnicity, age, political beliefs, culture and lifestyle. We are committed to fostering a business culture that reflects these values and promotes equal opportunities.
$130k-157.5k yearly 19h ago
Sr. Cyber Threat Intelligence Analyst
Cfocus Softwareorporated
Remote counterintelligence analyst job
cFocus Software seeks a Senior Cyber Threat Intelligence Analyst to join our program supporting AOUSC. This position is fully remote. This position requires active Public Trust clearance. Qualifications:
8 years' experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs).
8 years' experience in collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization.
8 years' experience in producing high-quality written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization.
5 years working in an office environment with technical IT personnel.
5 years of experience with Microsoft Office Tools such as Word, PowerPoint, Excel, and OneNote
5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.
Bachelor's degree in Cybersecurity preferred
Security + is required and Network + or equivalent is preferred
Duties:
Identify emerging cyber threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds.
Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks. This includes analyzing malware samples, phishing emails, and other threat artifacts to understand threat actor TTPs.
Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner.
Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies.
Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies.
Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis, helping to prioritize security investments and initiatives to mitigate emerging threats effectively.
Provide mentorship, guidance, and training to other contractor's employees, including sharing knowledge and best practices to build a skilled and cohesive cyber threat intelligence team.
Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities.
Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities based on threat intelligence data, enabling informed decisions on patching and remediation efforts.
Provide written recommendations on Government drafts of executive summaries and briefings.
Provide recommendations and input on other content and presentations.
Incorporate data from Mandiant, federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies.
Examine malware samples from diverse sources using reverse engineering techniques to uncover capabilities, origins, and threat actor methodologies.
Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms.
Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time.
$81k-111k yearly est. Auto-Apply 60d+ ago
Senior Threat Intelligence Analyst
Allstate 4.6
Remote counterintelligence analyst job
At Allstate, great things happen when our people work together to protect families and their belongings from life's uncertainties. And for more than 90 years our innovative drive has kept us a step ahead of our customers' evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection.
Job Description
The Senior Threat Intelligence Analyst will be responsible for supporting the monitoring, collection, analysis, reporting, and assessment of impact for threat related data from vendors, internal sources, and open-source intelligence.
Leveraging threat severity and risk, this individual will help drive timely reporting and mitigation by partnering with Incident Handling / Incident Response, Threat Hunting, Vulnerability Management, other departments within Allstate Information Security, and system/application owners. The role will be accountable for helping to research and compile reports and data on the state of the threat landscape and presenting that data to multiple levels of leadership.Key Responsibilities
Act as a threat intelligence SME in at least one of the following areas: malware analysis, exploit/vulnerability analysis, Advanced Persistent Threats (APTs), digital forensics, incident handling, cybercrime.
Support the Threat Management process providing guidance on improvements that can be made to the identification, assessment, and mitigation of threats to the environment.
Collect, analyze, and assess technical (IOCs) and non-technical (HUMINT) threat, vulnerability, and security incident-related information made available from platform vendors, 3rd parties, and internal sources to help determine course of action for the Allstate environment.
Partner with other security professionals to determine and implement mitigating controls.
Generate ad-hoc and scheduled briefs, reports, whitepapers, and presentations on threats and associated activities necessary to protect the environment.
Job Qualifications
5+ years' experience in either threat management, security assurance, or related field.
Familiar with industry standard security best practices and threat management processes including technical and non-technical reporting.
Experience with threat research, threat indicator sharing (such as STIX/TAXII), vulnerability scanning tools (such as Qualys) and other security tools.
Good knowledge of operating systems security (Windows, *nix).
Understanding of secure network/systems configuration management.
Understanding of networking concepts and devices (Firewalls, Routers, Switches, Load Balancers, etc.).
Experience programming and scripting.
Able to effectively work independently and in a team environment.
Able to interact with all levels of management, business, and IT, and is required to act in a professional and confident manner.
Self-motivator possessing a high sense of urgency and a high level of integrity.
Excellent analytical and problem-solving skills.
Excellent communication (oral, written, presentation), interpersonal and consultative skills.
Experience with GRC tools such as Archer, and Threat Intel' tools such as ThreatConnect, helpful but not required.
Bachelor's degree in Information Systems or related field preferred.
Certifications: Obtained certifications in one or more of the following, or relevant experience: GIAC, GCTI, GCIH, CEH, CISSP, CISA.
#LI-JJ1
Skills
Advanced Persistent Threats (APT), Cybercrime Investigation, Cyber Threat Intelligence, IT Problem Solving, Malware Analysis, Network Security, Scripting, Technical Writing, Threat Management, Vulnerability Scanning
Compensation
Compensation offered for this role is $70,500.00 - 124,125.00 annually and is based on experience and qualifications.
The candidate(s) offered this position will be required to submit to a background investigation.
Joining our team isn't just a job - it's an opportunity. One that takes your skills and pushes them to the next level. One that encourages you to challenge the status quo. One where you can shape the future of protection while supporting causes that mean the most to you. Joining our team means being part of something bigger - a winning team making a meaningful impact.
Allstate generally does not sponsor individuals for employment-based visas for this position.
Effective July 1, 2014, under Indiana House Enrolled Act (HEA) 1242, it is against public policy of the State of Indiana and a discriminatory practice for an employer to discriminate against a prospective employee on the basis of status as a veteran by refusing to employ an applicant on the basis that they are a veteran of the armed forces of the United States, a member of the Indiana National Guard or a member of a reserve component.
For jobs in San Francisco, please click āhereā for information regarding the San Francisco Fair Chance Ordinance.
For jobs in Los Angeles, please click āhereā for information regarding the Los Angeles Fair Chance Initiative for Hiring Ordinance.
To view the āEEO is the Lawā poster click āhereā. This poster provides information concerning the laws and procedures for filing complaints of violations of the laws with the Office of Federal Contract Compliance Programs
To view the FMLA poster, click āhereā. This poster summarizing the major provisions of the Family and Medical Leave Act (FMLA) and telling employees how to file a complaint.
It is the Company's policy to employ the best qualified individuals available for all jobs. Therefore, any discriminatory action taken on account of an employee's ancestry, age, color, disability, genetic information, gender, gender identity, gender expression, sexual and reproductive health decision, marital status, medical condition, military or veteran status, national origin, race (include traits historically associated with race, including, but not limited to, hair texture and protective hairstyles), religion (including religious dress), sex, or sexual orientation that adversely affects an employee's terms or conditions of employment is prohibited. This policy applies to all aspects of the employment relationship, including, but not limited to, hiring, training, salary administration, promotion, job assignment, benefits, discipline, and separation of employment.
$70.5k-124.1k yearly Auto-Apply 60d+ ago
Research Data Intelligence Analyst (Epic Clarity/Caboodle) - Remote
Cedars-Sinai 4.8
Remote counterintelligence analyst job
**Grow your career at Cedars-Sinai!** The Enterprise Information Services (EIS) team at Cedars-Sinai understands that true clinical transformation and the optimization of a clinical information systems implementation is fueled through the alignment of the right people, processes, and technologies.
**Why work here?**
Cedars-Sinai placed in the top 20 on Newsweek's " World's Best Smart Hospitals 2024 " list, which highlights hospitals that have excelled in the utilization of electronic functionalities, telemedicine, digital imaging, artificial intelligence and robotics.
The organization's Healthtech excellence was acknowledged again, this time by the esteemed " CHIME Digital Health Most Wired " recognition program. Cedars-Sinai was assigned a Level 10-the most prestigious level of certification-among more than 300 surveyed healthcare organizations. Cedars-Sinai netted high scores across multiple verticals and particularly excelled in areas of infrastructure, interoperability, and population health innovation.
**What will you be doing in this role:**
The Research Data Intelligence Analyst role is heavily focused on reporting, with a primary responsibility for delivering accurate, timely, and high-quality reports that support researchers conducting both prospective and retrospective studies. Analysts will work extensively with Epic's Clarity and Caboodle data models, producing multiple large scale reports each week and managing datasets ranging from hundreds of thousands to millions of records. Because this work involves sensitive patient information, the role requires strict adherence to HIPAA and PHI privacy standards as well as a strong attention to detail to ensure data integrity and compliance. The position also involves intermediate level design, build, and implementation of reporting solutions, applying operational knowledge to translate research needs into reliable, functional outputs. In addition to reporting, the analyst provides support for research applications such as REDCap, OnCore, I2B2, OMOP, and DEEP6, and assists end users through training, troubleshooting, and client interactions.
+ Deliver accurate, timely, and high-quality reports using Epic's Clarity and Caboodle data models, often working with datasets ranging from hundreds of thousands to millions of records.
+ Ensure all reporting adheres to HIPAA and PHI requirements, maintaining strict data privacy and integrity standards.
+ Translate research and operational requirements into actionable reporting solutions, working closely with researchers and stakeholders to meet study needs.
+ Provide support for research applications such as REDCap, OnCore, I2B2, OMOP, and DEEP6, including troubleshooting and user assistance.
+ Assist researchers and staff through training, hands-on guidance, and client support interactions.
+ Contribute to the design, build, and implementation of reporting tools and data solutions, applying knowledge of applications and workflows.
**Qualifications**
**Experience Requirements:**
Three (3) plus years of experience in Epic Clarity and Caboodle data models, research data extraction, report delivery, grant support, and application support.
Solid grasp of SQL experience.
**Educational Requirements:**
High School Diploma/GED.
Bachelor's degree in Computer Sciences, Mathematics, or related subject area. (preferred)
Epic Clarity and/or Caboodle Certifications highly preferred.
\#LI-Remote
**Req ID** : 11582
**Working Title** : Research Data Intelligence Analyst (Epic Clarity/Caboodle) - Remote
**Department** : Research Data Services
**Business Entity** : Cedars-Sinai Medical Center
**Job Category** : Information Technology
**Job Specialty** : Bus Intelligence/Reporting
**Overtime Status** : EXEMPT
**Primary Shift** : Day
**Shift Duration** : 8 hour
**Base Pay** : $96,324.80 - $154,128
Cedars-Sinai is an EEO employer. Cedars-Sinai does not unlawfully discriminate on the basis of the race, religion, color, national origin, citizenship, ancestry, physical or mental disability, legally protected medical condition (cancer-related or genetic characteristics or any genetic information), marital status, sex, gender, sexual orientation, gender identity, gender expression, pregnancy, age (40 or older), military and/or veteran status or any other basis protected by federal or state law.
$96.3k-154.1k yearly 60d+ ago
*REMOTE* Temp Sourcing Analyst
Tews Company 4.1
Remote counterintelligence analyst job
Unlock Your Potential: Join TEWS and Solve the Talent Equation for Your Career
*REMOTE CONTRACT OPPORTUNITY*
Join a Hospitality-Focused Team!
SOURCING ANALYST needed! Facilities contract experience is a huge plus!
$40/hour, depending on experience
Contract Length: 3-4 months with possibility to extend
FULLY REMOTE!
You are:
2+ years of experience in sourcing, procurement, or contract management.
Strong communication skills with the ability to balance excellent customer service and assertiveness.
Exceptional organizational skills and ability to prioritize multiple deadlines in a fast-paced environment.
Advanced Excel proficiency (pivot tables, dashboards, reporting).
Experience with Monday.com for project and workflow management.
Experience with service-based procurement (e.g., facilities, janitorial, landscaping, snow removal) preferred.
What you will do?
Essential Job Functions:
Draft and manage service contracts using standard templates.
Support vendor sourcing and negotiations for facilities services (janitorial, landscaping, snow removal, etc.).
Resolve vendor performance issues in coordination with General Managers and suppliers.
Review and negotiate vendor proposals to ensure clear scope, itemization, and pricing accuracy.
Run and support RFx processes and seasonal contract cycles.
Communicate with stakeholders to share updates on spend, savings, and vendor performance.
TEWS has opportunities with leading companies for professionals at all career stages, whether you're a seasoned consultant, recent graduate, or transitioning into a new phase of your career, we are here to help.
Tews is an equal opportunity employer and will consider all applications for employment without regards to age, color, sex, disability, national origin, race, religion, or veteran status.
$40 hourly 1d ago
Senior Cyber Threat Intelligence Analyst
Punch Cyber Analytics Group 3.8
Remote counterintelligence analyst job
About PUNCH:
We're problem solvers first & foremost
. PUNCH's origin story involves frustration with available INFOSEC tools and techniques-we came up thru the industry using these inefficient tools and techniques and decided there had to be a
better
way. We bring this laser focus on efficiency to every customer engagement.
We have trust as a hallmark in everything we do
. PUNCH provides its team members with the maximum amount of ownership over their careers, the direction of the company, and the flexibility & freedom to accomplish their job without interference. Trust requires accountability; we live that, company-wide.
We back each other up
. PUNCH is a supportive place to work. We've worked hard to create an environment that makes people better, encourages team work, and rewards a āpitch inā mentality.
We give back.
To those in need. To the community. To the industry.
Does this sound like you?
In this Role You Will: Consult and advise a commercial client with maturing and expanding an established CTI program. Relevant experience includes:
Significant experience with analyzing and tracking cyber threats at the strategic, operational and tactical level.
Substantial background in developing CTI products and services for Cybersecurity teams, and other portions of an organization, is highly preferred.
Experience with evolving CTI out of a traditional security function is a plus.
Ability to manage multiple, simultaneous projects while being able to shift priority based on customer need.
Comfortability with managing client expectations, and proactively communicating issues to leadership.
Proficient at documenting processes and procedures.
Capability & willingness to mentor and teach others.
Experience with CIRT/SOC security tools and services, as well as Microsoft 365 and Azure ecosystems preferred.
Ability to communicate to all Levels of an Organization and Technical Backgrounds.
Previous experience within Healthcare industries is a plus.
Strong preference for prior all-source analysts with cybersecurity experience
Key Requirements: 5+ years of diverse corporate and/or government cybersecurity experience. Familiarity with Microsoft 365, Azure, and services within the Microsoft ecosystem. Proven management/mentoring experience.
Must Haves: Significant strategic, operational and tactical intelligence experience within a corporate environment. Experience within the Microsoft Azure ecosystem.
Remote work is available with this position.
$61k-85k yearly est. 60d+ ago
Artificial Intelligence Researcher
Generalwebers
Remote counterintelligence analyst job
The Artificial Intelligence Researcher is responsible for developing and advancing innovative AI models, algorithms, and methodologies to solve complex problems and drive organizational growth. This role involves conducting original research, collaborating with cross-functional teams, publishing findings, and contributing to the application of state-of-the-art AI solutions in real-world scenarios. The ideal candidate demonstrates excellence in theoretical and applied machine learning, deep learning, or related AI domains.
Key Responsibilities:
Design, develop, and implement novel algorithms and machine learning models to address business and technical challenges.
Conduct original research in artificial intelligence, publishing findings in peer-reviewed journals and presenting at conferences as appropriate.
Collaborate with data scientists, engineers, and product teams to transition research innovations into scalable solutions.
Analyze large and complex datasets to validate model performance and drive improvements.
Stay current with developments in AI, machine learning, deep learning, and related fields, integrating advancements into ongoing research.
Document methodologies, experiments, and results following scientific best practices.
Participate in grant writing, patent applications, or research funding proposals as needed.
Ensure all work complies with ethical, legal, and organizational standards for research and data security.
Mentor junior researchers or interns as assigned.
Qualifications:
Ph.D. or Master's degree in Computer Science, Artificial Intelligence, Machine Learning, Mathematics, Statistics, or a closely related field.
Demonstrated research experience in AI/ML, evidenced by published papers, patents, or significant project contributions.
Proficiency in programming languages and frameworks commonly used in AI research (e.g., Python, TensorFlow, PyTorch, R, C++).
Strong analytical, problem-solving, and critical thinking skills.
Experience working with large-scale datasets and advanced statistical methods.
Excellent written and verbal communication abilities.
Ability to work independently and collaboratively in a remote environment.
U.S. residency is required; applications from outside the United States will not be considered.
Compensation and Benefits:
Annual Salary Range: $140,000 - $185,000, depending on experience, education, and location within the U.S.
Benefits Package:
Comprehensive health, dental, and vision insurance
401(k) retirement plan with employer match
Paid time off (vacation, holidays, sick leave)
Professional development funding (conferences, publications, training)
Flexible remote work arrangements
Employee wellness and assistance programs
$140k-185k yearly 7d ago
Artificial Intelligence, Analyst I
Strsoh
Counterintelligence analyst job in Columbus, OH
STRS Ohio, STRS
The State Teachers Retirement System of Ohio (STRS Ohio) is seeking an Artificial Intelligence, Analyst 1 to join the EX/Information Technology Services/Data & Digital Solutions team.
Established in 1920 and serving Ohio's educators, STRS Ohio is one of the nation's premier retirement systems, serving over 500,000 active, inactive, and retired public-school teachers, and university faculty members, managing approximately $90.1 billion in assets and paying more than $7 billion in benefits annually.
STRS Ohio provides a competitive pay, and a comprehensive benefits package including on-site parking, educational assistance, subsidized medical insurance, fully paid dental and life insurance, vacation and sick leave, retirement benefits and on-site fitness center. At STRS Ohio, you can experience rewarding work in a professional, business casual work environment. We welcome, celebrate, and promote respect for everyone. We are continually seeking bright and talented individuals to join our team.
Compensation:
$83,835-$100,602
Work Schedule:
8:00am-5:00pm Monday through Friday (Onsite)
General Summary:
Under the direction of the manager, Business Intelligence (BI), design, develop, implement and support AI solutions that enhance State Teachers Retirement System of Ohio (STRS Ohio) business processes, analytics and user experiences. This role emphasizes rapid prototyping and adoption of AI solutions with a strong focus on governance, security and measurable business impact.
Summary of Responsibilities:
Identify opportunities for AI and data integration to improve business efficiency and decision-making.
Serve as the subject matter expert for AI-driven productivity and analytics tools.
Develop cases and prototypes using AI tools such as Microsoft Copilot, Microsoft Studio and Microsoft Fabric tailored to organizational needs.
Ensure AI and data solutions comply with organizational policies, data privacy and security standards. Maintain data quality and integrity for AI model development. Provide status reports in accordance with defined standards.
Support AI model versioning and track changes to prompts, instructions and knowledge sources.
Participate in requirements gathering, documentation, testing and production implementation of new and existing AI and data solutions.
The above list of duties in intended to describe the general nature and level of work performed by persons assigned to this classification. It is not to be construed as an exhaustive list of duties performed by the persons so classified, nor is it intended to limit or modify the right of any supervisor to assign, direct and control the work of associates under supervision.
Summary of Qualifications:
Bachelor's degree in computer science or related field required; focus on data analytics preferred.
Two or more years of relevant AI-related experience required, with emphasis on the Microsoft Copilot ecosystem (Microsoft 365, Copilot, Microsoft Studio and Microsoft Fabric) preferred.
Knowledge of prompt engineering, AI agents, AI instructions, AI knowledge sources and AI governance frameworks required.
Knowledge of data security and compliance (information protection/DLP, access control, privacy).
Foundational skills in SQL and either Python or R; understanding of LLM concepts.
Strong problem-solving ability and attention to detail required.
Equal Employment Opportunity Employer Statement
State Teachers Retirement System of Ohio (STRS) is an Equal Employment Opportunity Employer and prohibits discrimination and harassment of applicants or employees on the basis of race, color, religion, gender, gender identity or expression, national origin (ancestry), military status, disability, age, genetic information, sexual orientation, or caregiver status, in making employment-related decisions about an individual.
ADA Statement
STRS Ohio is committed to ensuring access, inclusion, and reasonable accommodations across all its services, activities, programs, and employment opportunities in accordance with the Americans with Disabilities Act (ADA) and other applicable laws.
Posting Drug-Free Workplace Statement
The State Teachers Retirement System of Ohio (STRS Ohio) is a drug-free workplace. The use of recreational marijuana and non-medical cannabis is strictly prohibited.
Pre-Employment Drug Testing
All final candidates tentatively selected for employment will be required to undergo a urinalysis drug screening prior to appointment. This screening includes testing for illegal substances, including marijuana. A positive test result will disqualify the applicant from employment unless valid medical documentation is provided for legally prescribed medications or a physician's recommendation for medical marijuana.
Pre-Employment Background Investigation
The final candidate selected for this position will be subject to a criminal background check. STRS Ohio will conduct an individualized assessment of any prior criminal convictions before making a determination regarding employment eligibility.
$83.8k-100.6k yearly Auto-Apply 10d ago
Pharmacy Data Intelligence Analyst
BHS 4.3
Remote counterintelligence analyst job
The Pharmacy Data Intelligence Analyst will play a crucial role in analyzing pharmacy data to improve efficiency, reduce costs, and ensure medication safety. This role will gather and analyze data to identify areas for improvement in pharmacy-related services and operations. The Pharmacy Data Intelligence Analyst will collaborate with pharmacy team and management across various settings to promote new opportunities for the organization and assist with implementing new solutions based on data findings.
Job Description:
Baptist Health is looking for a Pharmacy Data Intelligence Analyst. This is a remote opportunity for residents of KY or IN.
Gather and integrate data from disparate healthcare data sources (e.g., electronic health records, claims data, financial data).
Clean, validate, and prepare data for analysis ensuring data accuracy and consistency by correcting errors, handling missing values, and standardizing formats.
Perform statistical analysis and modeling to identify trends, patterns, and correlations within healthcare data. Translating and summarizing complex data into clear, concise, and actionable insights for non-technical audiences.
Develop and maintain data visualizations (e.g., dashboards, reports) to effectively communicate findings to stakeholders.
Compile analyzed data into a structured report tailored for a specific audience.
Present data in a visually appealing and easy-to-understand way using charts, graphs, tables, or dashboards.
Generate patient data to provide a deep knowledge of patient dynamics in real-world settings and create personalized solutions to improve care.
Collaborate to understand data needs and create comprehensive data maps to integrate data from a variety of sources within the EHR.
Analyze patient data from various sources (e.g., electronic health records, patient satisfaction surveys, claims data) to identify trends, patterns, and areas for improvement. Conduct root cause analysis to identify factors contributing to poor patient outcomes.
Collaborate with clinical services and patient care services to identify patient population and associated disease states and correlate data points for better patient outcomes.
Collaborate with physicians, nurses, and other healthcare professionals to understand patient medication needs and challenges.
Incorporate industry benchmarks to illustrate baseline metrics and current state when publishing charts, graphs, pivot tables and other diagrams.
Provide 340B program compliance reports for qualified patients, drugs, providers, vendors, payers, and locations.
Publish quality analytics to include weekly or monthly dashboards, productivity, ad-hoc projects, and/or KPI used by directors and managers to improve processes and maintain a pulse of daily operations.
Support Pharmacy and Therapeutics Committee functions by providing financial data to be used in the drug evaluation process.
Minimum Experience Required
Associate/Bachelor's degree in Information Technology, Business Management, Finance, Accounting, or Hospital Administration preferred, or the equivalent combination of education and experience.
Minimum 5 years of Data science or programming experience in lieu of degree.
Direct experience in data analysis and/or health care planning background is preferred.
Excellent Benefits Package
5 days of Paid Time Off available for use upon hire (full-time)
PTO Sell Back Program
Compassionate Leave Sharing Program (PTO Donation)
Company paid Maternity and Paternity Leave
Bereavement Leave (includes pets)
Employee Support Fund, for employees in need of emergency financial support
Retirement plans with company match
Company paid Basic Life Insurance & Long-Term Disability
Health Insurance, Pharmacy, Dental, Vision and much more!
Work Experience
Education
If you would like to be part of a growing family focused on supporting clinical excellence, teamwork and innovation, we urge you to apply now!
Baptist Health is an
Equal Employment Opportunity
employer.
$64k-93k yearly est. Auto-Apply 28d ago
Senior Intelligence Analyst
Zscaler 4.4
Remote counterintelligence analyst job
Zscaler accelerates digital transformation so our customers can be more agile, efficient, resilient, and secure. Our cloud native Zero Trust Exchange platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location.
Here, impact in your role matters more than title and trust is built on results. We believe in transparency and value constructive, honest debate-we're focused on getting to the best ideas, faster. We build high-performing teams that can make an impact quickly and with high quality. To do this, we are building a culture of execution centered on customer obsession, collaboration, ownership and accountability.
We value high-impact, high-accountability with a sense of urgency where you're enabled to do your best work and embrace your potential. If you're driven by purpose, thrive on solving complex challenges and want to make a positive difference on a global scale, we invite you to bring your talents to Zscaler and help shape the future of cybersecurity.
The Red Canary Intelligence Team conducts in-depth analysis to provide context and help prioritize where to focus detection and response efforts. As a key contributor, you will investigate raw telemetry, analyze suspicious and confirmed threats, and conduct open-source research to associate activity with known adversaries. A significant focus is on modeling and analyzing in the Synapse graph database. Curiosity, adaptability, and a passion for addressing evolving threats will be vital for success in this dynamic, mission-driven team.
We're looking for an experienced Senior Intelligence Analyst to join our Intelligence team. Reporting to the Senior Manager, Intelligence, you'll be responsible for:
Utilizing Synapse and Storm Query Language for data modeling and analytic workflows to identify patterns and trends that can be disseminated to customers
Investigating telemetry to identify new activity clusters based on analysis of malicious and suspicious behaviors and activity observed across our customer base
Conducting open and closed source research to analyze threat patterns and trends, writing actionable intelligence products to customers and the community to communicate TTPs, detection coverage, and remediation strategies
Actively engaging with internal teams, external partners, customers, and the infosec community to share knowledge and enhance collaboration
Validating Red Canary's endpoint, cloud, and identity detection coverage against the continuously evolving threat landscape and identify unique or emerging threats to build detection coverage for. Recommending solutions to visibility gaps in telemetry and data sources
What We're Looking for (Minimum Qualifications)
Strong analytical and problem-solving skills, including the ability to synthesize complex and contradictory information, specifically through utilizing graph databases, or with query languages and data platforms such as SQL, Splunk, Elasticsearch, or Synapse Storm
Knowledge of cyber threat intelligence concepts including attribution, group naming, making assessments, and pivoting. Familiarity with the mechanics of attack behaviors and MITRE ATT&CK .
Experience tracking adversaries, including threat groups, activity groups, or malware families, and ability to differentiate unique and shared characteristics of clusters.
Outstanding communication skills, both written and verbal, including the ability to communicate technical concepts in a clear, succinct fashion to subject matter and non-subject matter experts alike.
Experience in Intelligence, Security Operations Center (SOC), Digital Forensics and Incident Response (DFIR), or other security-focused roles
What Will Make You Stand Out (Preferred Qualifications)
Proven leadership mentoring team members and contributing to the development of intelligence analysis expertise.
Experience in threat hunting, endpoint telemetry analysis, and/or Detections Development.
Experience performing dynamic analysis and triage on suspected malicious samples for the purpose of confirming malicious behavior and to extract relevant indicators of compromise and other findings
#Remote
#LI-DB1
Zscaler's salary ranges are benchmarked and are determined by role and level. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations and could be higher or lower based on a multitude of factors, including job-related skills, experience, and relevant education or training.
The base salary range listed for this full-time position excludes commission/ bonus/ equity (if applicable) + benefits.
Base Pay Range$119,000-$170,000 USD
At Zscaler, we are committed to building a team that reflects the communities we serve and the customers we work with. We foster an inclusive environment that values all backgrounds and perspectives, emphasizing collaboration and belonging. Join us in our mission to make doing business seamless and secure.
Our Benefits program is one of the most important ways we support our employees. Zscaler proudly offers comprehensive and inclusive benefits to meet the diverse needs of our employees and their families throughout their life stages, including:
Various health plans
Time off plans for vacation and sick time
Parental leave options
Retirement options
Education reimbursement
In-office perks, and more!
Learn more about Zscaler's Future of Work strategy, hybrid working model, and benefits here.
By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines.
Zscaler is committed to providing equal employment opportunities to all individuals. We strive to create a workplace where employees are treated with respect and have the chance to succeed. All qualified applicants will be considered for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status, or any other characteristic protected by federal, state, or local laws.
See more information by clicking on the
Know Your Rights: Workplace Discrimination is Illegal
link.
Pay Transparency
Zscaler complies with all applicable federal, state, and local pay transparency rules.
Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support.
$119k-170k yearly Auto-Apply 1d ago
Intelligence Analyst - RFI Triage (Remote, East Coast)
Crowdstrike 3.8
Remote counterintelligence analyst job
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn't changed - we're here to stop breaches, and we've redefined modern security with the world's most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We're also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We're always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.
About the Role:
CrowdStrike Counter Adversary Operations, a core component of CrowdStrike, is seeking an Intelligence Analyst for its Analytical Support Team (AST) to support daily intelligence production and the development of customer Requests for Information (RFIs) responses. The Analyst will be required to write custom RFI responses using a variety of sources.
This position is instrumental in supporting internal intelligence teams and CrowdStrike's Intelligence customers by producing and developing written RFI responses.
Am I an RFI Triage Intelligence Analyst?
Do you love working in a fast-paced environment where you handle multiple, competing deadlines?
Do you like working with customers and interacting with numerous teams to answer intelligence questions?
Do you crave new and challenging work that varies day-to-day?
What You'll Do:
Triage, scope, and respond to CrowdStrike Intelligence customer RFIs
Identify relevant context such as priority intelligence requirements (PIR) or organizational threat profiles to fully interpret customer RFIs.
Proactively collect and synthesize large amounts of information to identify relevant and actionable intelligence and statistics summaries to address customers' RFIs on cyber threats, trends, and new developments.
Collaborate and coordinate with numerous intelligence teams and Subject Matter Experts (SMEs) using a variety of raw and processed data sources for RFIs responses and reviews
Support leadership and content management by compiling statistics on customer composition and readership, as needed
Identify areas and gaps for process improvements and trend analysis in AST, as needed.
What You'll Need:
Candidates must be consistent, highly organized self-starter with 3+ years applied experience with:
Intelligence Tradecraft: knowledge of Intelligence tradecraft, analysis, and terminologies.
Intelligence Writing: applied knowledge of the Intelligence writing process and structure including scoping, responding to customer RFI responses, and writing supporting evidence to produce quality finished intelligence products with minimal assistance.
Collaboration: An enthusiasm for collaboration, including being comfortable working in a team-oriented environment as well as across multiple teams to leverage SMEs.
Successful candidates will have experience in Research: Ability to demonstrate comprehensive, practical knowledge of research, collection skills, and analytic intelligence tradecraft methodology. Research management skills to organize numerous research leads and sources is essential. Excellent time management skills, including prioritizing, scheduling, and adapting as necessary to multiple, competing deadlines.
OSINT/Data Collection: Experience in assessing, interpreting, and vetting multiple data sources for relevance, reliability, and credibility including open-source regional media sources, network/endpoint telemetry, and other raw data sources. Ability to produce statistics/metrics to identify and demonstrate adversarial and targeting trends.
Cyber Threat Intelligence experience: Familiarity and understanding of cyber threat intelligence and technical terminology/tooling explaining tactics used by threat actors including MITRE ATT&CK TTPs, IOCs/IOAs. Applied knowledge of actor kill chains and customer implications.
Project Management experience: Strong project management skills with the ability to communicate RFI findings in writing to various customer stakeholders; ability to effectively communicate RFI tasks, guidance, and methodology with internal teams.
Bonus Points:
Understanding of contemporary scripting languages that can be used for task automation.
Experience using Jira, Elasticsearch, Kibana, and Salesforce.
#LI-Remote
#LI-AO1
Benefits of Working at CrowdStrike:
Market leader in compensation and equity awards
Comprehensive physical and mental wellness programs
Competitive vacation and holidays for recharge
Paid parental and adoption leaves
Professional development opportunities for all employees regardless of level or role
Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
Vibrant office culture with world class amenities
Great Place to Work Certified⢠across the globe
CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.
CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.
If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at ************************** for further assistance.
Find out more about your rights as an applicant.
CrowdStrike participates in the E-Verify program.
Notice of E-Verify Participation
Right to Work
CrowdStrike, Inc. is committed to fair and equitable compensation practices. Placement within the pay range is dependent on a variety of factors including, but not limited to, relevant work experience, skills, certifications, job level, supervisory status, and location. The base salary range for this position for all U.S. candidates is $85,000 - $120,000 per year, with eligibility for bonuses, equity grants and a comprehensive benefits package that includes health insurance, 401k and paid time off.
For detailed information about the U.S. benefits package, please click here.
Expected Close Date of Job Posting is:01-24-2026
$85k-120k yearly Auto-Apply 9d ago
Cyber Intelligence Analyst
444&&Polarsonpweh
Counterintelligence analyst job in Dublin, OH
Cyber Intelligence Analyst is responsible for all sources of technical data collection and analysis in order to produce a common operating picture of intrusion or threat related activity. This includes developing and maintaining new technical and non-technical sources of information, threat research, threat profile development, analysis, briefings, and warnings.
Continuously assesses and prioritizes information sources based on relevance, cost and effectiveness for the purpose of informing management of the highest quality and most actionable intelligence.
Establishes and maintains industry partnerships within the security and financial sector to gain insight into significant shifts in government expectations, human behaviors and technology adoption that may pose business risk.
Works with all available resources (including but not limited to: Development, IT Operations, Security and Business Units) to make strategic adjustments to the enterprise security posture.
Establishes a threat modeling methodology to identify, classify, prioritize and report on enterprise threats using a structured approach to the Security Intelligence and Response Manager for briefings to Sr. Management and the Director of Systems Security and stakeholders on the overall Security position of Paychex.
Aggregates and correlates cyber threat information to known vulnerabilities and assign to Vulnerability Management to remediate.
Develops a portfolio of historical threat activity, trends and common attack vectors to predict and prevent future threats.
Evaluates new equipment and methodologies and provide detailed reviews and recommendations to the Security Intelligence and Response Manager.
Provides research for next generation traditional and non-traditional cyber threat methods, techniques and tactics specific to evolving IT infrastructures.
Maintains familiarity with multiple operating systems in order to analyze malware static and dynamic behavior.
Mentors junior team members on advanced data mining techniques and provide expertise when junior members require assistance.
$66k-89k yearly est. 60d+ ago
Lead Revenue Cycle Intelligence Analyst
Aa067
Remote counterintelligence analyst job
Lead Revenue Cycle Intelligence Analyst - (10032391) Description Join the transformative team at City of Hope, where we're changing lives and making a real difference in the fight against cancer, diabetes, and other life-threatening illnesses. City of Hope's growing national system includes its Los Angeles campus, a network of clinical care locations across Southern California, a new cancer center in Orange County, California, and treatment facilities in Atlanta, Chicago and Phoenix.
Our dedicated and compassionate employees are driven by a common mission: To deliver the cures of tomorrow to the people who need them today.
Position SummaryThe Lead Revenue Cycle BI Strategist serves as a senior analytics expert and thought partner within the Revenue Cycle Intelligence team.
This role is responsible for designing, developing, and delivering advanced business intelligence solutions that drive operational excellence, financial performance, and strategic decision-making.
The Strategist translates complex data into actionable insights, collaborates with cross-functional teams, and supports enterprise initiatives through predictive modeling, visualization, and performance analytics.
ResponsibilitiesDesign and develop advanced dashboards, reports, and analytic tools to monitor and improve revenue cycle performance and strategy.
Partner with operational leaders to define KPIs, identify trends, and deliver actionable insights that enhance financial outcomes.
Lead data exploration and predictive modeling initiatives to support forecasting, reimbursement optimization, and payer analysis.
Ensure accuracy, governance, and consistency of data across reporting platforms and analytics workflows.
Mentor and support junior analysts by sharing expertise, fostering development, and providing technical guidance.
Collaborate on system implementations, upgrades, and the integration of new data sources into reporting structures.
Qualifications QualificationsEducation (Minimum): Bachelor's degree in Health Administration, Business, Finance, or a related field.
Experience (Minimum): 5+ years of progressive leadership experience in healthcare revenue cycle, finance, strategy, or performance improvement.
Education (Preferred): Master's degree or equivalent advanced degree.
Certifications (Preferred): CRCR, CHFP, CPA, Lean Six Sigma, or equivalent.
Additional InformationCOH employees may apply for a transfer or promotion to job openings for which they meet the minimum qualifications if they meet the following criteria:Employed at COH in current role for at least one year, unless otherwise stipulated in an applicable collective bargaining agreement.
Are in good standing and have no current performance issues.
City of Hope employee pay is based on the following criteria: work experience, qualifications, and work location.
To learn more about our Comprehensive Benefits, please CLICK HERE.
City of Hope is an equal opportunity employer.
Primary Location: US-Nationwide-USA-Remote-US-RemoteJob: Accounting/FinanceWork Force Type: RemoteShift: DaysJob Posting: Sep 30, 2025Minimum Hourly Rate ($): 61.
997400Maximum Hourly Rate ($): 99.
196200
$66k-91k yearly est. Auto-Apply 1d ago
Intelligence Analyst
Contact Government Services, LLC
Remote counterintelligence analyst job
Intelligence AnalystEmployment Type: Full-Time, Experienced Contact Government Services is hiring an Intelligence Analyst ready to be a member of a dynamic and fast paced intel analysis program for a federal agency supporting the US Government's threat watchlisting and screening mission.
As an Intelligence Analyst, you will provide embedded analysis and reach back support to a federal agency and their partners.
You will provide multi-source intelligence analysis and fusion that integrates existing national-level products and databases to define patterns of operations.
As required, you will interact directly with government leadership and deployed intelligence consumers during the development of intelligence products and ongoing screening operations to meet intelligence requirements across the watchlist enterprise.
Duties may include the processing and verification of national security threat actor nominations, data integrity/quality control, encounter management, information sharing, and/or multiple discipline intelligence analysis.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology.
To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others.
Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Primary Responsibilities Apply complex direction, including standard operating procedures and operations manuals documentation as well as appropriate oral and written guidance received.
Communicates clearly and effectively, both orally and in writing, in order to tactfully and persuasively advise and guide executive management relative to a variety of issues which can be delicate in nature; includes making presentations and preparing complete, clear, and concise formal and informal reports, correspondence, briefings, charts, tables, and graphs that are distributed throughout the government and its partner agencies.
Conduct research and analysis of data, information, and intelligence to produce a wide range of finished all-source intelligence products.
Finished intelligence products shall include standard and non-standard Agency products as well as briefings for the tactical and strategic customers You should be able to provide daily feedback to the team lead.
Basic Qualifications The ability to learn the range of pertinent laws, regulations, policies, and precedents which affect the program Effective problem-solving, analytic, written and oral communication skills Capacity to work as part of a team to provide multi-faceted intelligence products and support to operational units and Intelligence Community components Knowledge with Microsoft Outlook applications Ability to work with and engage the customer daily Active Top Secret clearance and eligible for a CI Polygraph Preferred Qualifications Experience working with IC tools and databases Degree in security or intelligence studies with a recommended focus on terrorism or other transnational security threats is highly desired Two to seven years of Experience Familiarity with programs and software such as Palantir, ESRI, Intel Analyst, ETC.
Completion certificate from a commercial, military, or US government all source analysis training course or a specialized intelligence career field.
Skills and attributes for success:- Drafting and development of technical documentation related to a variety of projects in the IT space.
- Work closely with project stakeholders to establish technical processes and procedures.
- Document projects through the SDLC.
- Provide status reports for multiple ongoing projects and related documentation efforts.
- Assist with both user and admin level documentation.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources.
We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs.
We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government-contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees.
Therefore, we offer a comprehensive benefits package.
- Health, Dental, and Vision- Life Insurance- 401k- Flexible Spending Account (Health, Dependent Care, and Commuter)- Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer.
Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation! Explore additional job opportunities with CGS on our Job Board:*******************
com/join-our-team/For more information about CGS please visit: ************
cgsfederal.
com or contact:Email: info@cgsfederal.
com #CJ
$66k-91k yearly est. Auto-Apply 60d+ ago
Protective Intelligence Analyst - Executive Protection Support
IO Global 4.2
Remote counterintelligence analyst job
Who are we?
IOG, is a technology company focused on Blockchain research and development. We are renowned for our scientific approach to blockchain development, emphasizing peer-reviewed research and formal methods to ensure security, scalability, and sustainability. Our projects include decentralized finance (DeFi), governance, and identity management, aiming to advance the capabilities and adoption of blockchain technology globally.
We invest in the unknown, applying our curiosity and desire for positive change to everything we do. By fueling creativity, innovation, and progress within our teams, our products and services are designed for people to be fearless, to be changemakers.
What the role involves:
The Protective Intelligence team seeks a skilled Open Source Intelligence Analyst to provide support for executive movements, travel, and event security. This analyst will play a critical role in ensuring proactive situational awareness, supporting executive protection operations through open-source intelligence (OSINT) monitoring, travel assessments, and threat investigations. The position requires close coordination with Executive Protection (EP) agents, the Security Operations Center (SOC), and corporate leadership to identify, assess, and mitigate risks to executives, facilities, and company interests.
Conduct continuous open-source and social-media monitoring to identify threats, hostile activity, or emerging risks targeting executives, events, or company facilities.
Analyze online chatter, protest activity, and criminal or extremist indicators to provide timely alerts to the Executive Protection (EP) team and the Security Operations Center (SOC).
Produce pre-travel and event intelligence briefs evaluating destination threat environments, including crime, terrorism, unrest, health, and environmental risks.
Support EP advance planning by providing intelligence on neighborhoods, routes, and venues; identify areas of concern and recommend mitigation measures.
Monitor global and local developments affecting executives while in transit; issue real-time updates on incidents, unrest, or hazards near executive locations.
Conduct Person of Interest (POI) investigations to assess intent, capability, and threat level of individuals or groups exhibiting concerning behavior toward executives.
Monitor social-media activity along executive travel routes, hotels, and venues to detect localized security concerns or emerging threats.
Utilize analytical tools and recognition technologies to identify or confirm potential threat actors in proximity to executive movements.
Prepare concise intelligence summaries or advisories highlighting security developments relevant to executive protection operations.
Maintain automated travel monitoring and alert systems for active and planned executive travel.
Serve as primary intelligence liaison to the EP Detail, ensuring clear information flow, deconfliction, and operational alignment.
Develop and track early warning indicators signaling potential escalation or emerging threat activity to enable proactive risk mitigation.
Support after-hours or on-call operations during executive travel.
Travel domestically or internationally (up to 50%) in support of special assignments or executive movements.
Lead monthly global risk assessments focused on security trends, terrorism, civil unrest, and geopolitical volatility affecting executive safety.
Requirements
Who you are:
Required Qualifications
Minimum 4 years of experience in intelligence analysis.
Strong analytic writing skills with the ability to produce clear and actionable intelligence products.
Understanding of OPSEC principles and ethical intelligence practices.
Proficiency with commercial intelligence tools and monitoring platforms (e.g., Seerist, Crisis24, Dataminr, Shadow Dragon, Tangles, Ontic, etc).
Ability to work in distributed teams and handle sensitive information under confidentiality.
Ability to execute responsibilities discreetly and autonomously across diverse international environments and industry sectors.
Valid US Passport.
Preferred Qualifications
Prior experience supporting executive protection, corporate security, or government protection missions.
Experience integrating OSINT into operational risk management and travel security planning.
Familiarity with protest dynamics, extremist activity, and executive-specific threat behaviours.
Ability to operate independently with minimal supervision.
Trainings or certifications in OSINT or intelligence analysis.
Benefits
The base salary for this position has a range of $90 - $100k per year at the commencement of employment. Any offer is determined by overall experience and performance during the interview process. This is only part of the total compensation package.
All Employees
Remote Working
Laptop reimbursement
New starter package to buy hardware essentials (headphones, monitor, etc)
Learning & Development opportunities
US Employees
Medical, Dental, and Vision benefits coverage through Anthem for the employee and dependents
401k
Health Savings Account
Life Insurance
At IOG, we value diversity and always treat all employees and job applicants based on merit, qualifications, competence, and talent. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
$90k-100k yearly Auto-Apply 19d ago
Blockchain Intelligence Analyst
TRM Labs 4.3
Remote counterintelligence analyst job
TRM Labs is a blockchain intelligence company committed to fighting crime and creating a safer world. By leveraging blockchain data, threat intelligence, and advanced analytics, our products empower governments, financial institutions, and crypto businesses to combat illicit activity and global security threats. At TRM, you'll join a mission-driven, fast-paced team made up of experts in law enforcement, data science, engineering, and financial intelligence, tackling complex global challenges daily. Whether analyzing blockchain data, developing cutting-edge tools, or collaborating with global organizations, you'll have the opportunity to make a meaningful and lasting impact.
As a Blockchain Intelligence Analyst, you will drive TRM's collection, analysis, and reporting on key areas of the crypto economy (e.g., crypto exchanges, fraud). You will ensure that TRM has best-in-class intelligence through your subject matter expertise, first-principles problem solving, and ability to turn data into insights. You will collaborate with an experienced team of engineers, data scientists, and product managers to build scalable systems to detect, prevent, and mitigate cryptocurrency fraud and financial crime.
The impact you'll have here:
You'll track, analyze, and report on key areas of the crypto economy to detect suspicious activities.
Your OSINT skills will help uncover hidden threats and improve our security posture.
You'll provide key insights that contribute to real-world action against threat actors.
You'll collaborate with data and engineering teams to enhance the TRM product.
Your intelligence reports will help law enforcement, internal teams, and clients stay ahead of cyber risks.
What we're looking for:
Proven experience working in intelligence-related positions previously, ideally in Blockchain Intelligence (This is not an entry-level position).
OSINT Expertise
- Proficiency in using open-source tools to gather and analyze intelligence.
Analytical Skills
- Strong ability to synthesize and report complex information clearly and accurately.
Experience in Blockchain Analysis
- Knowledge of blockchain technologies, with a focus on tracing transactions and identifying malicious activity.
Communication & Collaboration
- Excellent communication skills to collaborate with cross-functional teams and produce actionable intelligence reports.
Ownership
- You demonstrate full ownership of your work, taking an 80/20 approach to accomplish objectives.
Certifications & Background
- Relevant certifications (e.g., GIAC, CEH) and experience in cybersecurity or intelligence gathering.
You have the ability to research in another language (Please specify the language(s) in your application).
About the team:
Our team values open communication and a collaborative work environment, where feedback and ideas are encouraged from all members.
We prioritize flexibility and adaptability, ensuring that everyone stays aligned through regular check-ins and progress updates. Operating with a strong focus on shared goals, we work together to meet deadlines while supporting individual growth and innovation.
Team members must be available for weekly meetings at 9AM PST and bi-weekly meetings at 8:30AM PST. We require at least 3-4 overlapping hours daily with the Pacific Timezone.
Learn about TRM Speed in this position:
Utilizes sound judgment and the 80/20 principle to drive rapid, high-impact outcomes.
Demonstrates the ability to iterate quickly in response to evolving threat landscapes.
Leverages creative problem-solving to ensure prompt and effective threat actor engagement to acquire attribution within 24 hours.
Employs a diverse set of methodologies to scale and optimize threat intelligence production for customer needs within 72 hours.
Life at TRM Labs
Leadership Principles
Our Leadership Principles shape everything we do-how we make decisions, collaborate, and operate day to day.
Impact-Oriented Trailblazer - We put customers first, driving for speed, focus, and adaptability.
Master Craftsperson - We prioritize speed, high standards, and distributed ownership.
Inspiring Colleague - We value humility, candor, and a one-team mindset.
Accelerate your Career
At TRM, you'll do work that matters-disrupting terrorist networks, recovering stolen funds, and protecting people around the world. You will:
Work alongside top experts and learn every day.
Embrace a growth mindset with development opportunities tailored to your role.
Take on high-impact challenges in a fast-paced, collaborative environment.
Thrive in a culture of coaching, where feedback is fast, direct, and built to help you level up.
What to Expect at TRM
TRM moves fast-
really fast
. We know a lot of startups say that, but we mean it. We operate with urgency, ownership, and high standards. As a result, you'll be joining a team that's highly engaged, mission-driven, and constantly evolving.
To support this intensity, we're also intentional about rest and recharge. We offer generous benefits, including PTO, Holidays, and Parental Leave for full time employees.
That said, TRM may not be the right fit for everyone. If you're optimizing for work life balance, we encourage you to:
Ask your interviewers how they personally approach balance within their teams, and
Reflect on whether this is the right season in your life to join a high-velocity environment.
Be honest with yourself about what energizes you-and what drains you
We're upfront about this because we want every new team member to thrive-not just survive.
The Stakes Are Real
Our work has direct, real-world impact:
Jumping online after hours to support urgent government requests tracing ransomware payments.
Delivering actionable insights during terrorist financing investigations.
Collaborating across time zones in real time during a major global hack.
Building new processes in days, not weeks, to stop criminals before they cash out.
Analyzing blockchain data to recover stolen savings and dismantle trafficking networks.
Thrive as a Global Team
As a remote-first company, TRM Labs is built for global collaboration.
We cultivate a strong remote culture through clear communication, thorough documentation, and meaningful relationships.
We invest in offsites, regional meetups, virtual coffee chats, and onboarding buddies to foster collaboration.
By prioritizing trust and belonging, we harness the strengths of a global team while staying aligned with our mission and values.
Join our mission!
We're looking for team members who thrive in fast-paced, high-impact environments and love building from the ground up. TRM is remote-first, with an exceptionally talented global team. If you enjoy solving tough problems and seeing your work make a difference for billions of people, we want you here. Don't worry if your experience doesn't perfectly match a job description- we value passion, problem-solving, and unique career paths. If you're excited about TRM's mission, we want to hear from you.
Recruitment agencies
TRM Labs does not accept unsolicited agency resumes. Please do not forward resumes to TRM employees. TRM Labs is not responsible for any fees related to unsolicited resumes and will not pay fees to any third-party agency or company without a signed agreement.
Privacy Policy
By submitting your application, you are agreeing to allow TRM to process your personal information in accordance with the TRM Privacy Policy
Learn More: Company Values | Interviewing | FAQs
$58k-83k yearly est. Auto-Apply 60d+ ago
Pharma Pipeline Intelligence Analyst (Remote)
Assistrx 4.2
Remote counterintelligence analyst job
AssistRx is a leading healthcare technology organization dedicated to accelerating patient access to life-changing therapies. Through our advanced, AI-enabled patient solutions platform, we partner with pharmaceutical manufacturers, specialty pharmacies, and healthcare providers to remove barriers, simplify complex processes, and improve the patient journey. Our portfolio-including iAssist , Hub Liteā¢, Prior Authorization, Benefits Verification, and connected specialty pharmacy services-empowers patients to start and stay on therapy faster. With a strong commitment to innovation, data-driven decision making, and compassionate care, AssistRx has earned its reputation as one of the most trusted leaders in specialty medication access. We combine technology, talent, and empathy to solve some of the most challenging problems in healthcare-and we're just getting started.
The Commercial Research Analyst plays a critical role in expanding AssistRx's growth pipeline by transforming pharmaceutical industry data into high-value commercial insights. This position supports Sales, Marketing, and Executive Leadership by researching drug development pipelines, identifying new account opportunities, and generating data-driven recommendations that strengthen our market positioning and accelerate business development.
This is a high-impact analytical role ideal for someone who thrives at the intersection of market intelligence, pharmaceutical research, and commercial enablement. Candidates will be successful if they are curious, resourceful, highly analytical, and comfortable translating complex market data into actionable insights for business stakeholders.
Market & Pipeline Intelligence
Conduct ongoing research on the FDA drug pipeline, clinical trial activity, company announcements, and market movements.
Identify high-value prospects by evaluating drug development stage, therapeutic category, and commercial readiness.
Monitor industry developments including M&A activity, new launches, indication expansions, and competitive landscape shifts.
Lead & Account Qualification
Evaluate potential client organizations using data from clinical registries, press releases, and industry databases.
Analyze buyer intent signals using platforms such as 6sense, ZoomInfo, LinkedIn Sales Navigator, or similar tools.
Build and maintain detailed profiles of high-priority life sciences accounts.
Commercial Insights & Reporting
Generate digestible reports, dashboards, and prospecting lists to support Sales and Commercial Leadership.
Provide strategic recommendations for account prioritization, territory planning, and outreach sequencing.
Collaborate with Marketing to align research insights with messaging, targeting, and campaign strategy.
Database & CRM Management
Maintain and enhance the master prospect database, ensuring accuracy, completeness, and usability.
Support CRM data quality initiatives across Salesforce or other systems.
Cross-Functional Collaboration
Partner closely with Sales Leadership to refine target segments and evaluate service fit by therapeutic area or product phase.
Coordinate with Marketing to ensure alignment between intelligence, ABM initiatives, and lead-generation efforts.
Requirements
Bachelor's degree in Life Sciences, Business, Data Analytics, or a related field.
2-4 years of experience in market research, commercial insights, sales research, business development support, or data analysis.
Industry experience within pharmaceuticals, biotech, life sciences, or healthcare strongly preferred.
Working knowledge of the drug development lifecycle, FDA approval pathways, and clinical trial registries.
Experience using 6sense, Demandbase, ZoomInfo, Sales Navigator, or similar prospect intelligence platforms.
Strong proficiency in Excel (pivot tables, lookups, data cleaning, analysis).
Excellent analytical, critical-thinking, and data interpretation skills.
Strong communication skills with the ability to convert complex data into clear, actionable insights.
Experience with Salesforce or CRM systems preferred.
PREFERRED QUALIFICATIONS
Experience researching the pharmaceutical pipeline via ClinicalTrials.gov, EvaluatePharma, TrialScope, or similar.
Prior experience supporting Sales or Commercial teams in life sciences.
Familiarity with account-based marketing (ABM) and commercial segmentation strategies.
Knowledge of specialty pharma, hub services, or patient access programs.
Benefits
Supportive, progressive, fast-paced environment
Competitive pay structure
Matching 401(k) with immediate vesting
Medical, dental, vision, life, & short-term disability insurance
Opportunity to impact patient outcomes through data-driven healthcare technology.
Collaborative and mission-driven culture that values innovation and continuous learning.
Access to cutting-edge cloud technologies and modern data engineering tools.
Competitive compensation, comprehensive benefits, and career growth opportunities
AssistRx, Inc. is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration without regard to race, religion, color, sex (including pregnancy, gender identity, and sexual orientation), parental status, national origin, age, disability, family medical history or genetic information, political affiliation, military service, or other non-merit based factors, or any other protected categories protected by federal, state, or local laws.
All offers of employment with AssistRx are conditional based on the successful completion of a pre-employment background check.
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. Sponsorship and/or work authorization is not available for this position.
AssistRx does not accept unsolicited resumes from search firms or any other vendor services. Any unsolicited resumes will be considered property of AssistRx and no fee will be paid in the event of a hire
$64k-86k yearly est. Auto-Apply 27d ago
Strategic Sourcing Analyst
M&T Bank 4.7
Remote counterintelligence analyst job
Works with business and support units to source suitable suppliers at the best price to meet requirements. Carries out the Strategic Sourcing process designed to maximize competition and leverage when selecting and contracting with chosen suppliers. Negotiates contracts generally up to $500K in value.
Primary Responsibilities:
For sourcing initiatives, work with management to identify an Executive Sponsor and a cross-functional project team to ensure appropriate buy-in, support and participation throughout the project.
Guide the Project Team through the Strategic Sourcing process and keep the Executive Sponsor and relevant senior managers informed of progress, setbacks and obstacles. Lead a kick-off meeting with the Project Team to clarify the objectives, strategy and proposed timeline of the sourcing initiative. Develop and execute Requests for Proposals (RFPs), Requests for Quotes (RFQs) and/or Requests for Information (RFIs) based on identified business needs, market conditions and corporate standards. Facilitate analysis, evaluation and scoring of supplier proposals against criteria established and agreed on by the team. Conduct multiple rounds of bids and coordinate activities such as supplier demonstrations, reference calls and on-site visits to short-list suppliers. Lead contract negotiations in conjunction with the Project Team and Legal to ensure we obtain the most competitive pricing and favorable terms possible.
Prepare sufficient documentation to inform Executive Sponsor and senior managers of recommendations and results of the sourcing initiative, including any achieved savings, customer implications and impacts to business operations.
Guide business and support units through the Third-Party Risk Management Program in conjunction with the Third-Party Risk Management team to ensure selected suppliers are properly risk-tiered, vetted and approved before executing a contract.
Research and analyze procurement trend data at the Bank and recommend savings opportunities to associated business lines and support functions.
Understand and adhere to the Company's risk and regulatory standards, policies and controls in accordance with the Company's Risk Appetite. Identify risk-related issues needing escalation to management.
Promote an environment that supports belonging and reflects the M&T Bank brand.
Maintain M&T internal control standards, including timely implementation of internal and external audit points together with any issues raised by external regulators as applicable.
Complete other related duties as assigned.
Scope of Responsibilities:
Strategic Sourcing is a structured process that maximizes competition and leverage to select the most suitable suppliers at the best price. As such, this position plays an important role in controlling expense and mitigating risk at the Bank. The position is responsible for ensuring contracts are papered properly, deals are well-documented, and the Bank receives the best value for each dollar spent.
Education and Experience Required:
Bachelor's degree and a minimum of 1 year proven financial and/or business experience, or in lieu of a degree, a combined minimum of 5 years' higher education and/or work experience, including a minimum of 1 year proven financial and/or business experience
Proficiency with personal computers including word processing, spreadsheet, presentation and database software
Strong time management skills
Detail oriented with strong organizational and analytical skills
Strong verbal and written communication skills
Education and Experience Preferred:
Experience writing Requests for Proposal (RFPs) and negotiating contracts
M&T Bank is committed to fair, competitive, and market-informed pay for our employees. The pay range for this position is $54,100.00 - $90,100.00 Annual (USD). The successful candidate's particular combination of knowledge, skills, and experience will inform their specific compensation. The range listed above corresponds to our national pay range for this role. The specific pay range applicable to you may vary based on your location.LocationClanton, Alabama, United States of America