Artificial Intelligence Researcher
Remote job
The Artificial Intelligence Researcher is responsible for developing and advancing innovative AI models, algorithms, and methodologies to solve complex problems and drive organizational growth. This role involves conducting original research, collaborating with cross-functional teams, publishing findings, and contributing to the application of state-of-the-art AI solutions in real-world scenarios. The ideal candidate demonstrates excellence in theoretical and applied machine learning, deep learning, or related AI domains.
Key Responsibilities:
Design, develop, and implement novel algorithms and machine learning models to address business and technical challenges.
Conduct original research in artificial intelligence, publishing findings in peer-reviewed journals and presenting at conferences as appropriate.
Collaborate with data scientists, engineers, and product teams to transition research innovations into scalable solutions.
Analyze large and complex datasets to validate model performance and drive improvements.
Stay current with developments in AI, machine learning, deep learning, and related fields, integrating advancements into ongoing research.
Document methodologies, experiments, and results following scientific best practices.
Participate in grant writing, patent applications, or research funding proposals as needed.
Ensure all work complies with ethical, legal, and organizational standards for research and data security.
Mentor junior researchers or interns as assigned.
Qualifications:
Ph.D. or Master's degree in Computer Science, Artificial Intelligence, Machine Learning, Mathematics, Statistics, or a closely related field.
Demonstrated research experience in AI/ML, evidenced by published papers, patents, or significant project contributions.
Proficiency in programming languages and frameworks commonly used in AI research (e.g., Python, TensorFlow, PyTorch, R, C++).
Strong analytical, problem-solving, and critical thinking skills.
Experience working with large-scale datasets and advanced statistical methods.
Excellent written and verbal communication abilities.
Ability to work independently and collaboratively in a remote environment.
U.S. residency is required; applications from outside the United States will not be considered.
Compensation and Benefits:
Annual Salary Range: $140,000 - $185,000, depending on experience, education, and location within the U.S.
Benefits Package:
Comprehensive health, dental, and vision insurance
401(k) retirement plan with employer match
Paid time off (vacation, holidays, sick leave)
Professional development funding (conferences, publications, training)
Flexible remote work arrangements
Employee wellness and assistance programs
Senior Cyber Intelligence Analyst | Remote
Remote job
Before you apply to a job, select your language preference from the options available at the top right of this page. Explore your next opportunity at a Fortune Global 500 organization. Envision innovative possibilities, experience our rewarding culture, and work with talented teams that help you become better every day. We know what it takes to lead UPS into tomorrow-people with a unique combination of skill + passion. If you have the qualities and drive to lead yourself or teams, there are roles ready to cultivate your skills and take you to the next level.
Job Description:
Job Summary
This position engages in the identification, tracking, monitoring, containment and mitigation of information security threats. He/She performs quality assurance functions to validate that existing methods of research are successful in identifying and documenting security incidents. This position defines procedures for analysis and makes adjustments as technologies and methodologies advance.
Responsibilities:
* Assesses, prioritizes and takes action on requests that improve existing Security Operation Center (SOC) tools and procedures.
* Partners with management to coordinate security incident response efforts to communicate information, drive resource actions and decisions, provide recommendations, and ensure resolution.
* Evaluates and analyzes complex malicious code through the use of tools including disassemblers, debuggers, hex editors, un-packers, virtual machines and network sniffers.
* Conducts reverse-engineering for known and suspected malware files.
* Investigates instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration.
* Performs research in the area of malicious software, vulnerabilities, and exploitation tactics, and recommend preventative or defensive actions.
* Produces reports detailing attributes and functionality of malware, and indicators that can be used for malware identification/detection, to include behavior, identified infrastructure used for command and control, and mitigation techniques.
* Analyses the relationship between a given sample of malware and other known samples/families of malware, and notable features that indicate the origin or sophistication of the malware and its authors.
Qualifications:
* 2-3 years' experience as Security Operations Center (SOC) Analyst including Incident Response and Handling roles
* Experience in Malware Reverse Engineering and Sandboxing
* Experience with SIEM Technology
* Significant experience with Linux, TCP/IP, UNIX, MS-Windows, IP Routing, Firewalls and IPS
* Understanding of behavioral based threat models, including ATT&CK, Cyber Kill Chain, Diamond Model, etc.
* Deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats
* Demonstrated experience using Open Source (OllyDbg, Radare, GDB, etc.) malware analysis tools
* Ability to analyze shellcode, and packed and obfuscated code, and their associated algorithms
* Ability to develop network and host based signatures to identify specific malware. Recommend heuristic or anomaly based detection methods
* Subject matter expertise in the detection, analysis and mitigation of malware
* Experience with Information Security Research, Malware Reverse Engineering, Cyber Threat Analysis, Windows Operating System and Data Analysis
* Knowledge of Research skills, Technical Writing, Information Security Research, Security Incident Response, Security Risk Assessment/Analysis
* Bachelor's Degree or International equivalent - Preferred
* Experience with multi-cloud technologies such as Google Cloud, Azure and AWS
Other Criteria:
* Job Grade: 20H
* Must be currently located in the same geographic location as the job or willing to relocate yourself -Required.
* Last day to apply is 01/06/2026 EOD
* Shift: Monday - Friday 7am to 5pm or 8am to 6pm
Employee Type:
Permanent
UPS is committed to providing a workplace free of discrimination, harassment, and retaliation.
Employer will sponsor visas for specific positions. UPS is an equal opportunity employer. UPS does not discriminate on the basis of race/color/religion/sex/national origin/veteran/disability/age/sexual orientation/gender identity or any other characteristic protected by law.
Threat Intelligence Analyst, Threat Defense
Remote job
About the Team
At DoorDash, we are building the industry's most scalable and reliable delivery network, securing the data and protecting the privacy of our consumers, merchants, and dashers. Our Threat Defense team, encompassing Threat Response, Threat Hunting, Threat Intelligence, and Detection Engineering, is crucial to this mission. We are a fast-paced, highly collaborative group committed to innovation, proactive defense, and understanding the evolving threat landscape. Our ultimate goal is to create a secure DoorDash environment through proactive threat preparation and rapid response, safeguarding our people, partners, customers, and technologies with unwavering vigilance.
About the Role
The Threat Intelligence Analyst will be a foundational member of the Threat Defense Team and integral component of the Cyber Defense | Security Organization. As a Threat Intelligence Analyst, you'll be at the forefront of DoorDash's defensive capabilities, responsible for identifying, analyzing, and disseminating critical threat information. You'll proactively monitor the external threat landscape, track emerging attack vectors, and assess the potential impact on DoorDash. This role involves deep dives into threat actor methodologies, Tactics, Techniques, and Procedures (TTPs), and campaigns, translating raw intelligence into actionable insights for our security teams.
You'll play a crucial role in enhancing our detection capabilities, informing our security posture, and ultimately safeguarding our ecosystem.
You will report into the Senior Manager, Threat Defense under the Director, Cyber Defense and Chief Information Security Officer.
You're excited about this opportunity because you will…
Develop and execute operational and tactical threat intelligence requirements, leveraging a combination of open source and proprietary intelligence.
Maintain up to date knowledge of global security trends and the latest cyber threats in order to identify and assess threats to the company.
Prepare and deliver threat intelligence products to cross-functional partners and senior stakeholders.
Work with cross-functional teams in a fast-paced environment.
Solve complex problems and think critically.
We're excited about you because…
4+ years of experience in a dedicated threat intelligence role.
A strong understanding of cyber threat intelligence lifecycle and frameworks (e.g., MITRE ATT&CK, Kill Chain).
Proficiency in collecting, analyzing, and synthesizing threat data from various sources (OSINT, commercial feeds, dark web forums).
Experience with threat intelligence platforms and security information and event management (SIEM) systems. Experience with scripting languages (e.g., Python) for data analysis and automation is a plus.
Ability to articulate complex technical information clearly and concisely to both technical and non-technical audiences.
Must be comfortable regularly exercising discretion and independent judgment in performing job duties, including evaluating options, making informed decisions, and determining appropriate courses of action within the scope of assigned responsibilities.
Applications for this position are accepted on an ongoing basis
Notice to Applicants for Jobs Located in NYC or Remote Jobs Associated With Office in NYC Only
We use Covey as part of our hiring and/or promotional process for jobs in NYC and certain features may qualify it as an AEDT in NYC. As part of the hiring and/or promotion process, we provide Covey with job requirements and candidate submitted applications. We began using Covey Scout for Inbound from August 21, 2023, through December 21, 2023, and resumed using Covey Scout for Inbound again on June 29, 2024.
The Covey tool has been reviewed by an independent auditor. Results of the audit may be viewed here: Covey
Compensation
The successful candidate's starting pay will fall within the pay range listed below and is determined based on job-related factors including, but not limited to, skills, experience, qualifications, work location, and market conditions. Base salary is localized according to an employee's work location. Ranges are market-dependent and may be modified in the future.
In addition to base salary, the compensation for this role includes opportunities for equity grants. Talk to your recruiter for more information.
DoorDash cares about you and your overall well-being. That's why we offer a comprehensive benefits package to all regular employees, which includes a 401(k) plan with employer matching, 16 weeks of paid parental leave, wellness benefits, commuter benefits match, paid time off and paid sick leave in compliance with applicable laws (e.g. Colorado Healthy Families and Workplaces Act). DoorDash also offers medical, dental, and vision benefits, 11 paid holidays, disability and basic life insurance, family-forming assistance, and a mental health program, among others.
To learn more about our benefits, visit our careers page here.
See below for paid time off details:
For salaried roles: flexible paid time off/vacation, plus 80 hours of paid sick time per year.
For hourly roles: vacation accrued at about 1 hour for every 25.97 hours worked (e.g. about 6.7 hours/month if working 40 hours/week; about 3.4 hours/month if working 20 hours/week), and paid sick time accrued at 1 hour for every 30 hours worked (e.g. about 5.8 hours/month if working 40 hours/week; about 2.9 hours/month if working 20 hours/week).
The national base pay range for this position within the United States, including Illinois and Colorado.$130,600-$192,000 USDAbout DoorDash
At DoorDash, our mission to empower local economies shapes how our team members move quickly, learn, and reiterate in order to make impactful decisions that display empathy for our range of users-from Dashers to merchant partners to consumers. We are a technology and logistics company that started with door-to-door delivery, and we are looking for team members who can help us go from a company that is known for delivering food to a company that people turn to for any and all goods.
DoorDash is growing rapidly and changing constantly, which gives our team members the opportunity to share their unique perspectives, solve new challenges, and own their careers. We're committed to supporting employees' happiness, healthiness, and overall well-being by providing comprehensive benefits and perks including premium healthcare, wellness expense reimbursement, paid parental leave and more.
Our Commitment to Diversity and Inclusion
We're committed to growing and empowering a more inclusive community within our company, industry, and cities. That's why we hire and cultivate diverse teams of people from all backgrounds, experiences, and perspectives. We believe that true innovation happens when everyone has room at the table and the tools, resources, and opportunity to excel.
Statement of Non-Discrimination: In keeping with our beliefs and goals, no employee or applicant will face discrimination or harassment based on: race, color, ancestry, national origin, religion, age, gender, marital/domestic partner status, sexual orientation, gender identity or expression, disability status, or veteran status. Above and beyond discrimination and harassment based on “protected categories,” we also strive to prevent other subtler forms of inappropriate behavior (i.e., stereotyping) from ever gaining a foothold in our office. Whether blatant or hidden, barriers to success have no place at DoorDash. We value a diverse workforce - people who identify as women, non-binary or gender non-conforming, LGBTQIA+, American Indian or Native Alaskan, Black or African American, Hispanic or Latinx, Native Hawaiian or Other Pacific Islander, differently-abled, caretakers and parents, and veterans are strongly encouraged to apply. Thank you to the Level Playing Field Institute for this statement of non-discrimination.
Pursuant to the San Francisco Fair Chance Ordinance, Los Angeles Fair Chance Initiative for Hiring Ordinance, and any other state or local hiring regulations, we will consider for employment any qualified applicant, including those with arrest and conviction records, in a manner consistent with the applicable regulation.
If you need any accommodations, please inform your recruiting contact upon initial connection.
Auto-ApplyIntelligence Analyst - RFI Triage (Remote, East Coast)
Remote job
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn't changed - we're here to stop breaches, and we've redefined modern security with the world's most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We're also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We're always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.
About the Role:
CrowdStrike Counter Adversary Operations, a core component of CrowdStrike, is seeking an Intelligence Analyst for its Analytical Support Team (AST) to support daily intelligence production and the development of customer Requests for Information (RFIs) responses. The Analyst will be required to write custom RFI responses using a variety of sources.
This position is instrumental in supporting internal intelligence teams and CrowdStrike's Intelligence customers by producing and developing written RFI responses.
Am I an RFI Triage Intelligence Analyst?
Do you love working in a fast-paced environment where you handle multiple, competing deadlines?
Do you like working with customers and interacting with numerous teams to answer intelligence questions?
Do you crave new and challenging work that varies day-to-day?
What You'll Do:
Triage, scope, and respond to CrowdStrike Intelligence customer RFIs
Identify relevant context such as priority intelligence requirements (PIR) or organizational threat profiles to fully interpret customer RFIs.
Proactively collect and synthesize large amounts of information to identify relevant and actionable intelligence and statistics summaries to address customers' RFIs on cyber threats, trends, and new developments.
Collaborate and coordinate with numerous intelligence teams and Subject Matter Experts (SMEs) using a variety of raw and processed data sources for RFIs responses and reviews
Support leadership and content management by compiling statistics on customer composition and readership, as needed
Identify areas and gaps for process improvements and trend analysis in AST, as needed.
What You'll Need:
Candidates must be consistent, highly organized self-starter with 3+ years applied experience with:
Intelligence Tradecraft: knowledge of Intelligence tradecraft, analysis, and terminologies.
Intelligence Writing: applied knowledge of the Intelligence writing process and structure including scoping, responding to customer RFI responses, and writing supporting evidence to produce quality finished intelligence products with minimal assistance.
Collaboration: An enthusiasm for collaboration, including being comfortable working in a team-oriented environment as well as across multiple teams to leverage SMEs.
Successful candidates will have experience in Research: Ability to demonstrate comprehensive, practical knowledge of research, collection skills, and analytic intelligence tradecraft methodology. Research management skills to organize numerous research leads and sources is essential. Excellent time management skills, including prioritizing, scheduling, and adapting as necessary to multiple, competing deadlines.
OSINT/Data Collection: Experience in assessing, interpreting, and vetting multiple data sources for relevance, reliability, and credibility including open-source regional media sources, network/endpoint telemetry, and other raw data sources. Ability to produce statistics/metrics to identify and demonstrate adversarial and targeting trends.
Cyber Threat Intelligence experience: Familiarity and understanding of cyber threat intelligence and technical terminology/tooling explaining tactics used by threat actors including MITRE ATT&CK TTPs, IOCs/IOAs. Applied knowledge of actor kill chains and customer implications.
Project Management experience: Strong project management skills with the ability to communicate RFI findings in writing to various customer stakeholders; ability to effectively communicate RFI tasks, guidance, and methodology with internal teams.
Bonus Points:
Understanding of contemporary scripting languages that can be used for task automation.
Experience using Jira, Elasticsearch, Kibana, and Salesforce.
#LI-Remote
#LI-AO1
Benefits of Working at CrowdStrike:
Remote-friendly and flexible work culture
Market leader in compensation and equity awards
Comprehensive physical and mental wellness programs
Competitive vacation and holidays for recharge
Paid parental and adoption leaves
Professional development opportunities for all employees regardless of level or role
Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
Vibrant office culture with world class amenities
Great Place to Work Certified™ across the globe
CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.
CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.
If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at ************************** for further assistance.
Find out more about your rights as an applicant.
CrowdStrike participates in the E-Verify program.
Notice of E-Verify Participation
Right to Work
CrowdStrike, Inc. is committed to fair and equitable compensation practices. Placement within the pay range is dependent on a variety of factors including, but not limited to, relevant work experience, skills, certifications, job level, supervisory status, and location. The base salary range for this position for all U.S. candidates is $85,000 - $120,000 per year, with eligibility for bonuses, equity grants and a comprehensive benefits package that includes health insurance, 401k and paid time off.
For detailed information about the U.S. benefits package, please click here.
Expected Close Date of Job Posting is:01-24-2026
Auto-Apply
About iCOUNTER
iCOUNTER is a predictive cyber risk intelligence firm; we counter threats before they happen. We partner SIGINT and HUMINT with AI enabling our customers to counter the rising frequency, complexity, and precision targeting they are facing from adversaries.
iCOUNTER provides continuous observation of third parties in the criminal underground, going beyond static assessments and security ratings. We triage and deliver these collections empowering our customers to counter threats before they strike. We reduce the noise that security teams face by only delivering actionable alerts and mitigation strategies.
Our Culture
We are growing rapidly and have significant expansion plans and growth capital. We foster a collaborative environment where deep cybersecurity expertise meets business acumen, enabling our professionals to solve complex security challenges while building lasting client partnerships. We pride ourselves on our integrity and ethics. You'll find smart, professional, mission-driven, hardworking, genuinely kind and good colleagues here.
We primarily work remotely but have hubs in Denver and Dallas.
Overview:
We are seeking a visionary Head of Intelligence to lead and transform iCOUNTER's global intelligence function. This role is responsible for overseeing the entire intelligence operation-from collection and analysis to dissemination-while driving innovation and automation to stay ahead of an ever-evolving threat landscape. As a senior leader, you will shape strategy, build scalable infrastructure, and ensure intelligence insights directly inform technology, product development, and client solutions.
This is a high-impact position requiring an experienced, adaptable leader who can elevate our intelligence capabilities and position iCOUNTER as the industry benchmark for predictive, actionable cyber threat intelligence.
Key Responsibilities:
Oversee all aspects of intelligence operations, including collection, analysis, and dissemination, ensuring alignment with organizational goals and client needs.
Design and implement automation systems that streamline collection and feed analysts and intelligence products with timely, high-quality data.
Direct the intelligence collection team in automated collection, ensuring operational excellence and innovation.
Partner with the CTO to ensure technology infrastructure supports intelligence requirements and enables advanced analytics and automation.
Collaborate closely with the CPO to integrate threat insights into product roadmaps and market intelligence initiatives.
Foster a culture of adaptability and innovation to meet the demands of a rapidly evolving threat landscape.
Serve as the senior point of contact for intelligence-related inquiries, client briefings, and executive updates.
Mentor analysts, elevate analytical rigor, and champion structured analytic techniques to reduce bias and enhance reliability.
Engage with industry groups, government partners, and external stakeholders to strengthen intelligence-sharing initiatives
Define and execute the intelligence operations strategy in alignment with iCOUNTER organizational goals.
Oversee the production of clear, accurate, and impactful intelligence reports tailored for diverse audiences, from technical teams to C-suite decision-makers.
Drive advanced analytical tradecraft, ensuring assessments are well-founded, timely, and actionable.
Direct the use of structured analytic techniques to reduce bias and enhance reliability.
Mentor and upskill analysts, fostering expertise in cyber threat analysis, intelligence writing, and operational rigor.
Design and deliver technical training programs to raise the overall capability of the team.
Foster a culture of continuous learning, innovation, and professional excellence.
Establish and refine processes for collection, analysis, and dissemination of intelligence.
Ensure adherence to best practices in intelligence cycle management and report production.
Integrate emerging technologies and methodologies to enhance operational efficiency and effectiveness.
Partner with Business and Client advisory teams to ensure intelligence insights inform technical defenses and client solutions.
Engage with external stakeholders, including industry groups and government partners, to strengthen intelligence-sharing initiatives.
Move effortlessly from the technical details to the big picture to identify critical areas for the team's attention, lead cross-functional initiatives to find solutions, and drive implementation of these improvements across multiple organizations
Partner closely with cross-functional teams, including product policy, legal, product, engineering, and communications, to align operations with company goals and inform product and policy roadmaps through data driven insights and recommendations
Qualifications
Proven experience (10+ years) in HUMINT and SIGINT intelligence operations, with a strong background in cyber threat intelligence or related fields.
Demonstrated expertise in intelligence analysis methodologies and structured analytic techniques.
Exceptional writing skills, with the ability to distill complex technical information into clear, concise, and actionable reports.
Strong leadership track record, with experience training and mentoring teams.
Drive continuous improvement in processes, analyst tooling, and team performance to optimize operational efficiency and effectiveness, including partnering with product teams to influence and develop technology and machine-learning solutions that enhance consistency and accuracy
Deep understanding of the global cyber threat landscape, adversary TTPs, and emerging attack vectors.
Ability to operate at both strategic and tactical levels, balancing long-term vision with day-to-day execution.
Relevant certifications (e.g., GCTI, CISSP, GOSI) preferred but not required.
Behaviors/Values
We have created a fantastic corporate culture - our values drive our behaviors. Here are the expectations:
Passion for cybersecurity and a commitment to maintaining the highest standards of security.
Ability to work collaboratively in a fast-paced, team-oriented environment.
Respect for all team members at all levels of experience.
Integrity is paramount; honesty is a core value at iCOUNTER.
You will bring your best of breed expertise in a collaborate approach to make our program better.
Take ownership of results
Apollo/iCOUNTER is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. Apollo/iCOUNTER provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Successful completion of a Background Check is required for employment with iCOUNTER
Lead Social Intelligence Analyst
Remote job
Method+Mastery has an immediate opening for an experienced, talented, energetic, self-starting Social Intelligence Analyst to join our team and help our Fortune 50 clients maximize their marketing and communications efforts through research and measurement on a variety of global social and earned media campaigns. Our team is responsible for analyzing and synthesizing data to provide actionable insights and tactical recommendations to our clients. Positions are available in Texas, California, Maryland, Virginia, Illinois, Missouri, Michigan, Massachusetts, and Washington, D.C. This role requires candidates to work primarily during Pacific Time business hours in order to collaborate effectively with both our team and our clients. While some flexibility may be possible, the majority of your availability should align with PT to ensure smooth communication and support for client needs. This position offers the opportunity for a hybrid set-up with work from home and work from office flexibility.
Methods+Mastery is an entrepreneurial, collaborative environment that values talented, creative people who like to work with others to create cutting-edge programs for our clients. We're seeking someone who is passionate about social, data and analytic tools. Someone who has an innate curiosity and the desire to find out "why?" Our team is growing at an amazing rate, and this is an opportunity to produce work for top clients in an entrepreneurial and collaborative environment that values team above all. We do great work - and hire only great people, too.
Methods+Mastery is actively committed to increasing our team's diversity, aggressively eliminating systemic barriers to equity, and fostering a culture where different backgrounds and perspectives are respected and celebrated. We firmly believe a team of many diverse perspectives not only makes M+M a better place to work, it is also critically important for producing creative and thoughtful work that represents the world we live in. To that end, we strongly encourage applications from women, people of color, members of the LGBTQ+ community, veterans, individuals with disabilities, and neurodivergent people.
The anticipated salary range for this position is $85,000 - $135,000.
Salary is based on a range of factors that include relevant experience, knowledge, skills, other job-related qualifications, and geography. A range of medical, dental, vision, 401(k) matching, paid time off, and/or other benefits also are available.
Sound like what you're looking for?
**Responsibilities**
+ A senior role on the Insights & Analytics team that leads work from start to finish, from interrogating client briefs, to developing methodologies, to leading project teams and delivering impactful business intelligence and recommendations in a variety of formats.
+ Act as a client and project lead analyst to develop goals, KPIs, and measurement methodologies, and to deliver a variety of products, including performance reports, cultural/trend analyses, audience profiles, influencer assessments, and other intelligence to inform and drive business objectives and decision making.
+ Consult clients with a POV on the marketing intelligence industry and its trends and best practices.
+ Mentor junior analysts and develop team training modules.
+ Partner collaboratively with client leads to liaise across all parties, including clients, vendors, creative staff, strategists, and operations.
+ Stay current with the latest social measurement trends, as well as relevant industry trends.
**Qualifications**
Must-haves:
+ 6-8+ years of total experience gained in digital marketing and/or analytics.
+ Ability to understand client business needs and objectives and to develop project proposals tailored to them, inclusive of methodologies and team roles.
+ Strong analytical skills; must be excellent in analyzing and interpreting social-related data from standard software packages and client databases (e.g., Brandwatch, Netbase Quid, Talkwalker, Sprinklr, etc.)
+ Strong experience with measurement, benchmarking, and data interpretation in Excel or Google Sheets.
+ Ability to collaborate and work well with others, and experience leading analyst teams on digital measurement, social analytics, and intelligence reporting/research projects.
+ Commitment to staying current on digital measurement and marketing intelligence industry best practices.
+ Ability to quickly pattern spot and surface actionable insights by distilling complex data into stories supported by KPIs and visualizations / dashboards / scorecards.
+ Experience writing and presenting clear and concise deliveries for clients that summarize data insights, outcomes, implications, and recommendations.
+ Excellent verbal and written communication skills to effectively communicate project parameters, status updates, and outcomes to internal and external stakeholders.
Nice to haves:
+ Experience providing evaluative volumetric and content analysis with media monitoring tools such as Onclusive, Zignal, or Newswhip.
+ Experience with real-time listening for real-time engagement (i.e., crisis or event/launch).
+ Experience with tools such as Tableau, Google Looker Studio, or Microsoft Power BI.
+ Experience with the Google suite of tools (Google Sheets, Google AI Studio, or Google Cloud Platform).
+ Experience with Google Analytics or other web analytics tools.
+ Experience with market research and consumer profiling tools such as YouGov, MRI Simmons, or GlobalWebIndex.
+ Experience with paid media and social boosting measurement.
+ Experience with influencer performance program development and measurement.
+ Experience using AI tools to create more efficient processes without sacrificing quality or integrity.
\#LIHybrid
Research Data Intelligence Analyst (Epic Clarity/Caboodle) - Remote
Remote job
**Grow your career at Cedars-Sinai!** The Enterprise Information Services (EIS) team at Cedars-Sinai understands that true clinical transformation and the optimization of a clinical information systems implementation is fueled through the alignment of the right people, processes, and technologies.
**Why work here?**
Cedars-Sinai placed in the top 20 on Newsweek's " World's Best Smart Hospitals 2024 " list, which highlights hospitals that have excelled in the utilization of electronic functionalities, telemedicine, digital imaging, artificial intelligence and robotics.
The organization's Healthtech excellence was acknowledged again, this time by the esteemed " CHIME Digital Health Most Wired " recognition program. Cedars-Sinai was assigned a Level 10-the most prestigious level of certification-among more than 300 surveyed healthcare organizations. Cedars-Sinai netted high scores across multiple verticals and particularly excelled in areas of infrastructure, interoperability, and population health innovation.
**What will you be doing in this role:**
The Research Data Intelligence Analyst role is heavily focused on reporting, with a primary responsibility for delivering accurate, timely, and high-quality reports that support researchers conducting both prospective and retrospective studies. Analysts will work extensively with Epic's Clarity and Caboodle data models, producing multiple large scale reports each week and managing datasets ranging from hundreds of thousands to millions of records. Because this work involves sensitive patient information, the role requires strict adherence to HIPAA and PHI privacy standards as well as a strong attention to detail to ensure data integrity and compliance. The position also involves intermediate level design, build, and implementation of reporting solutions, applying operational knowledge to translate research needs into reliable, functional outputs. In addition to reporting, the analyst provides support for research applications such as REDCap, OnCore, I2B2, OMOP, and DEEP6, and assists end users through training, troubleshooting, and client interactions.
+ Deliver accurate, timely, and high-quality reports using Epic's Clarity and Caboodle data models, often working with datasets ranging from hundreds of thousands to millions of records.
+ Ensure all reporting adheres to HIPAA and PHI requirements, maintaining strict data privacy and integrity standards.
+ Translate research and operational requirements into actionable reporting solutions, working closely with researchers and stakeholders to meet study needs.
+ Provide support for research applications such as REDCap, OnCore, I2B2, OMOP, and DEEP6, including troubleshooting and user assistance.
+ Assist researchers and staff through training, hands-on guidance, and client support interactions.
+ Contribute to the design, build, and implementation of reporting tools and data solutions, applying knowledge of applications and workflows.
**Qualifications**
**Experience Requirements:**
Three (3) plus years of experience in Epic Clarity and Caboodle data models, research data extraction, report delivery, grant support, and application support.
Solid grasp of SQL experience.
**Educational Requirements:**
High School Diploma/GED.
Bachelor's degree in Computer Sciences, Mathematics, or related subject area. (preferred)
Epic Clarity and/or Caboodle Certifications highly preferred.
\#LI-Remote
**Req ID** : 11582
**Working Title** : Research Data Intelligence Analyst (Epic Clarity/Caboodle) - Remote
**Department** : Research Data Services
**Business Entity** : Cedars-Sinai Medical Center
**Job Category** : Information Technology
**Job Specialty** : Bus Intelligence/Reporting
**Overtime Status** : EXEMPT
**Primary Shift** : Day
**Shift Duration** : 8 hour
**Base Pay** : $96,324.80 - $154,128
Cedars-Sinai is an EEO employer. Cedars-Sinai does not unlawfully discriminate on the basis of the race, religion, color, national origin, citizenship, ancestry, physical or mental disability, legally protected medical condition (cancer-related or genetic characteristics or any genetic information), marital status, sex, gender, sexual orientation, gender identity, gender expression, pregnancy, age (40 or older), military and/or veteran status or any other basis protected by federal or state law.
Embedded Lead Intelligence Analyst
Remote job
About Sibylline Sibylline is a leading intelligence and strategic risk consultancy in the security sector. Since 2010 we have supported businesses, governments and NGOs through the provision of high-quality risk analysis, due diligence and consultancy services.
The firm provides an innovative, entrepreneurial and fast-growing working environment, offering employees ever greater exposure to high profile clients and challenges. Sibylline offers fantastic opportunities for career progression within a successful company, and we aim to help our employees to build their own personal profiles as well-regarded analysts within the broader industry.
Key attributes of Sibylline employees are:
Self-motivated, and auto-improving individuals who can couple initiative and boldness with good judgement
Excellent written and spoken English
Clarity of thought and analytical flair
Strong, demonstrable interest in security and intelligence
The ability to work under pressure, demonstrate leadership when required but also be able to collaborate effectively in teams
Excellent attention to detail
Job Description
Position Summary
We are looking for an experienced Lead Intelligence Analyst to join us in an embedded role for a global social media client. You will be based in the client's Global Physical Security Intelligence Team, and contributing to international geopolitical and security analysis, strategic risk assessments and advisory services. In this role, you will assist the client in making decisions about the safety and security of its people, assets, operations, and reputation in the Americas region.
You will be responsible for conducting leveraging advanced analytical and investigative techniques to identify and assess risks to the client's business, provide actionable intelligence and support decision making for key security functions, including protective intelligence, crisis management and travel security. You will monitor intelligence sources, conduct risk assessments and produce strategic and tactical intelligence products. You will also be responsible for overseeing a small team of embedded intelligence analysts and its delivery of high-quality and actionable strategic and protective intelligence insights.
You will proactively engage with the client and stakeholders on intelligence needs and priorities. You will act as line manager for the embedded team, supporting each analyst on training, performance management, and continuous improvement.
This is an onsite role at the client's San Jose office, working Monday to Friday 9am - 6pm, with the potential to work remotely one day a week. There may be occasional need to work out-of-hours during emergencies and time-sensitive matters, including holidays and weekends.
Essential Functions / Responsibilities
Investigate threat actors, including those operating in illicit online communities, and assess their tactics, techniques, and procedures (TTPs)
Conduct investigations and threat assessments for persons/groups of interest as part of the overall management of threats to the client's employees, assets, and operations
Conduct OSINT analysis, including deep and dark web monitoring
Develop and implement protective intelligence gathering, assessment, and dissemination protocols
Monitor open-source and vendor intelligence feeds to identify risks to business operations in the Americas region
Conduct comprehensive risk assessments for personnel, assets, operations, travel, and special events
Produce strategic and tactical reports to deliver proactive and in-depth analysis and actionable insight to client stakeholders, to enable them to drive mitigation measures
Deliver situational awareness reporting to support crisis response and business continuity
Manage intelligence requirements, centralise relevant sources, and ensure comprehensive intelligence coverage
Establish and maintain relationships with internal stakeholders to align intelligence efforts with business needs
Lead cross-functional intelligence projects around high-impact events and emerging threats
Safeguard sensitive and confidential information
Display innovation, implementing the latest techniques, tools and best practices to support a global intelligence function
Work with the embedded analysts to prepare and deliver credible, timely, and actionable intelligence products and verbal briefings to clearly and accurately inform decision making
Set team priorities, manage deadlines, and provide continuous editorial feedback and mentoring support to ensure high-quality service delivery
Assist Sibylline with the day-to-day management of the client's account, facilitating the escalation of problems, challenges and new opportunities as required
Qualifications
Knowledge, Skills, and Abilities
Strong proficiency in OSINT sources, methods and tools (e.g., Brandwatch, Liferaft, Skopenow, Flashpoint) and investigative resources (e.g., Clear, LexisNexis), including deep and dark web sources
Strong commercial awareness, with the ability to interpret and collect intelligence information, track threats and geopolitical developments, and determine their impact to business staff, assets, operations and reputation
High-level experience in geopolitical risk, violent actor behaviours and activities, and other risk areas relevant to a global tech company
Experience leveraging data analysis tools and techniques; SQL and/or Python preferred
Excellent ability to deliver verbal and written briefings to stakeholders, customise intelligence output to stakeholder needs, and build and maintain strong stakeholder relationships
Advanced analytical and problem-solving skills, attention to detail, and ability to manage multiple priorities in a fast-paced environment
Experience working cross-functionally across global teams and adapting to evolving intelligence needs
Experience in managing complex projects and priorities with a high degree of autonomy
Ability to innovate and identify potential opportunities to enhance efficiency and/or effectiveness within own area of work, including developing own knowledge to increase effectiveness
Requirements
Bachelor's degree in related field, such as International Relations, Security Studies, Journalism, Business Management; Masters degree preferred.
5+ years of experience in intelligence collection, analysis, and production, with a focus on business risk and security, investigating threat actors, documenting TTPs, and contributing to tactical, operational, and strategic intelligence
Excellent written and verbal communication skills in English, and fluency in either Portuguese or Spanish (ideally both)
1+ years line management experience
Additional Information
Work Environment/Physical Requirements
This position is largely self-directed and requires understanding and compliance with company policies, procedures, and values. The position works in an on-site office environment utilizing a computer and standard office equipment. While performing the duties of this job, the employee is regularly required to interact collaboratively with the team and stakeholders, and communicate via phone, videophone, or text messaging. The employee may be required to occasionally lift and/or move up to 20 pounds. The position may require travel up to 10%.
Benefits
Salary Range: $130,000 - $157,500
401(k) up to 5% matching
Medical/Dental/Vision
Basic Life and AD&D Insurance
Long Term/Short Term Disability
PTO: 160 hours (20 days) accrued per year
Sick: 80 hours sick time front loaded
10 Holidays
Employee Assistance Program and Employee Discount Program
Interview Process
Initial call with our Talent Acquisition team member
Timed written assessment (arranged at the time that suits you) to test writing and analytical capability
Panel interview with some of the team members and hiring managers at Sibylline
Meet and Greet with the client
Research indicates that certain groups are less likely to apply for a position unless they meet every single requirement. If you feel you meet some of the requirements and can offer a unique perspective to this role, we strongly encourage you to apply-you might be the perfect fit we're looking for!
Sibylline is committed to the recruitment and selection of candidates without regard for sexual orientation, gender, ethnicity, age, political beliefs, culture and lifestyle. We are committed to fostering a business culture that reflects these values and promotes equal opportunities.
Senior Cyber Threat Intelligence Analyst
Remote job
Valiant Solutions is seeking a Senior Cyber Threat Intelligence Analyst to join our rapidly growing and innovative cybersecurity team!
Named one of the Best Places to Work in the Washington DC area for 11 consecutive years, Valiant is proud of our employee-centric culture and commitment to excellence. If you are interested in learning more about Valiant and this opportunity, we invite you to apply now!
This position allows for 100% remote work. Remote work necessitates a high level of trust in our employees, and we strictly adhere to the details found below in our Remote Work Policy.
U.S. Citizenship is required due to federal contract obligations, along with the ability to successfully pass a federal background investigation.
Required Experience
8 years' experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs).
8 years' experience in collecting and aggregating threat intelligence from various sources, such as open-source intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization.
8 years' experience in producing high-quality written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization.
5 years working in an office environment with technical IT personnel.
5 years of experience with Microsoft Office Tools such as Word, PowerPoint, Excel, and OneNote
5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.
Bachelor's degree in Cybersecurity is preferred
Security + is required, and Network + or equivalent is preferred
Responsibilities
Conduct in-depth analysis of cyber threats-including malware, phishing campaigns, and other attack vectors-to identify patterns, indicators of compromise (IOCs), and adversary tactics, techniques, and procedures (TTPs).
Aggregate and evaluate threat intelligence from diverse sources such as open-source intelligence (OSINT), dark web forums, and commercial feeds to identify relevant and actionable insights for the organization.
Produce high-quality written reports, executive briefings, and presentations to effectively communicate threat intelligence assessments and recommendations to technical teams and leadership stakeholders within 24 hours or sooner of the request.
Collaborate closely with IT personnel in a dynamic office environment to support proactive threat identification, risk mitigation, and incident response efforts.
Utilize cybersecurity tools and platforms-including Threat Intelligence Platforms (TIPs), Security Information and Event Management (SIEM) systems, and malware analysis tools-to conduct threat research and enrich investigative findings. (e.g. Mandiant Threat Intelligence)
Map TTPs to the MITRE ATT&CK framework to aid in correlation to attack vendors with specific threat actors.
Maintain proficiency with Microsoft Office tools (Word, PowerPoint, Excel, and OneNote) for drafting reports, visualizing data, and delivering professional-grade documentation.
Utilize SharePoint to efficiently manage, organize, and share documents, collaborate on team projects, and track tasks in a user-friendly environment.
Support the continuous improvement of threat intelligence processes and capabilities in alignment with cybersecurity best practices and organizational goals.
Leverage a strong foundational knowledge in cybersecurity, supported by industry certifications such as Security+ (required) and Network+ (preferred), to inform threat assessments and strategic planning.
Must be a team player and have a proven track record of being able to collaborate with other cybersecurity teams.
About Valiant Solutions
Valiant Solutions is a security-focused IT solutions provider with public clients nationwide. Named one of the fastest growing privately held companies by Inc. 5000, Washington Technology's Fast 50, and Washington Business Journal's Best Places to Work in the D.C. area, Valiant Solutions prides itself on providing its employees with great benefits and career development opportunities. As a company, we are just as committed to growing careers as we are to building world-class IT solutions, all while enjoying an unparalleled work-life balance. We are in a phase of tremendous growth and building the team that will take us to the next level. We seek people whose talents and accomplishments will contribute to a thriving company, who have the character to support their capacity, and can make a positive impact on our culture. Alongside our talented team, you'll learn to think quickly on your feet and expand your own personal and professional skill set. Our management team will inspire you to consider new perspectives and challenge you to become a better practitioner in the fast-paced industry of IT security. We hire people we respect - and we trust them to deliver results leveraging their expertise. If you would enjoy working in a dynamic environment as part of a stellar team of professionals, then we invite you to apply online today.
Benefits Snapshot (includes, but not limited to)
Valiant pays 99% of the Medical, Dental, and Vision Coverage for Full-time Employees
Valiant contributes 25% towards Health Coverage for Family and Dependents
100% Paid Short Term Disability and Life Insurance Policy for Full-time Employees
100% Paid Certifications
401K Matching up to 4%
Paid Time Off
Paid Federal Holidays
Paid Time On - 40 hours to pursue innovation
Wellness & Fitness Program
Valiant University - Online Education and Training Portal
Reimbursement for Public Transit and Parking
FSA programs for: Medical Costs, Dependent Care, Transit, and Parking
Referral Bonuses
The salary range for this position is a general guideline and not a guarantee of compensation or salary. It has been benchmarked in relation to the scope of the role, market rate, and internal equity. The salary for this role is expected to be in the $135,000 - $149,000 range. Where a candidate falls within the band can be determined based on one or more of the following: skillset, experience level, achievements, education, geographic location, security clearance, involvement in corporate tasks, and other non-discriminatory factors. In addition to the base salary, this role will include benefits as described above. Valiant reserves the right to adjust the salary range, experience requirements, and position responsibilities at any time without prior notice.
Remote Work Policy
Remote work necessitates a high level of trust in our employees. To ensure that employee performance does not suffer in a remote work environment, all employees who telecommute are expected to have a quiet and distraction-free workspace with adequate internet, dedicate their full attention and availability to their job duties during working hours, and maintain a schedule during core business hours that align with those of their coworkers and Valiant's clients. In alignment with Valiant's inclusive and engaging environment, cameras are encouraged and can be required to be on during virtual video conferences. Additionally, in alignment with the Office of the Inspector General's effort to eliminate conflicting employment, all Valiant employees are required to disclose any current or future outside employment engagements. During onboarding and throughout employment, employees must disclose any current activities or intent to engage in outside employment or other professional activities and obtain written approval. Employees may not solicit or conduct any outside business during core business hours for Valiant Solutions and our clients.
Equal Employment Opportunity
Valiant Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, genetic information, marital status, or veteran status, in accordance with applicable law.
Physical Demands
Sitting or standing at a desk for prolonged periods of time and consistent operation of a computer. Frequent communication and exchanging of accurate information via electronic communication, phones, and in person. Occasionally lift and/or move moderate amounts of weight, typically less than 20 pounds. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of the job.
Authorization to Share Resume and Personal Information
By submitting your resume for this position, you authorize Valiant Solutions to share your resume, as well as, personal information included on the resume, with its subsidiaries, affiliates and teaming partners for the purpose of considering you for this position and other available positions requiring comparable skills, education and experience. Should Valiant Solutions or its affiliates and teaming partners wish to initiate pre-employment discussions, you will be asked to complete an employment application and related employment documents.
#LI-JM1
Auto-ApplyBrand Intelligence Analyst
Remote job
The Brand Intelligence Analyst works in the office as part of the larger Global Corporate Communications Group. Help oversee the monitoring and protection of the Fisher Investments brand in traditional (print, online, broadcast) and social media. Strategically planning and implementing social media campaigns to achieve specific reputational goals. They analyze, report and elevate findings to management to help build awareness and make informed business recommendations.
The Day-to-Day:
Conduct social listening, identifying client and prospective service opportunities and addressing as appropriate
Analyze reputational situations, gathering research across multiple data sources to make a business recommendation
Identify and proactively inform management of potential brand threats, providing comprehensive risk assessment and recommendation
Distill brand media coverage into important highlights and observations for management
Maintain knowledge of evolving and new online platforms, including the latest security enhancements
Research and implement new processes
Identify gaps in our existing processes and technologies, recommending and implementing change to improve
Develop and implement social media campaigns to achieve specific reputational goals, including content creation and community interaction
Your Qualifications:
Bachelor's degree or equivalent combination of education and experience required
Highly developed qualitative and quantitative skills required
Analyze various situations, develop creative solutions and adapt to changes in a fast paced, team environment
Experience managing ad campaigns preferred
Prior experience using social media management tools (Sprout, Hootsuite)
Prior experience using social listening tools (Brandwatch, Talkwalker)
Compensation:
$80,200-$120,000 base salary per year in the state of WA - New hires should expect to start at the lower end of the range depending on experience
Eligible for a discretionary bonus based on firm and individual performance
Why Fisher Investments:
We work for a bigger purpose: bettering the investment universe. We take great pride in our inclusive culture, our learning and development framework customized for every employee, and our Great Place to Work Certification. It's the people that make the Fisher purpose possible, and we invest in them by offering exceptional benefits like:
100% paid medical, dental and vision premiums for you and your qualifying dependents
A 50% 401(k) match, up to the IRS maximum
20 days of PTO, plus 10 paid holidays
Family Support programs including 8 week Paid Primary Caregiver Leave, $10,000 fertility, family forming, and hormonal health assistance, and back-up child, adult, and elder care
This is an in-office role. Based on your role, tenure, and performance eligibility you may have the opportunity to participate in our hybrid work from home program. This program is subject to change.
FISHER INVESTMENTS IS AN EQUAL OPPORTUNITY EMPLOYER
Auto-ApplyCreative Writing Intelligence Analyst
Remote job
Were recruiting Creative Writers for research projects with leading AI labs.
These projects will involve you using your own writing style and taste to complete a variety of writing tasks. Sample tasks include writing novel content such as speeches, dialogues, narratives etc. and critiquing AI-generated literature.
Job vacancy link: ****************************
You are a good fit if you:
Have experience in one of the following domains:
Writing fiction, poetry or screenplays
Working as a columnist, critic or opinion writer
Speechwriting/ghostwriting
Marketing with Social Media or Branding experience
Details about the role:
Pay is $35-50/hr
Expect 15-20 hours of work per week
The work is fully remote and asynchronous so you can do it around your schedule
Job vacancy link: ****************************
Pharmacy Data Intelligence Analyst
Remote job
The Pharmacy Data Intelligence Analyst will play a crucial role in analyzing pharmacy data to improve efficiency, reduce costs, and ensure medication safety. This role will gather and analyze data to identify areas for improvement in pharmacy-related services and operations. The Pharmacy Data Intelligence Analyst will collaborate with pharmacy team and management across various settings to promote new opportunities for the organization and assist with implementing new solutions based on data findings.
Job Description:
Baptist Health is looking for a Pharmacy Data Intelligence Analyst. This is a remote opportunity for residents of KY or IN.
Gather and integrate data from disparate healthcare data sources (e.g., electronic health records, claims data, financial data).
Clean, validate, and prepare data for analysis ensuring data accuracy and consistency by correcting errors, handling missing values, and standardizing formats.
Perform statistical analysis and modeling to identify trends, patterns, and correlations within healthcare data. Translating and summarizing complex data into clear, concise, and actionable insights for non-technical audiences.
Develop and maintain data visualizations (e.g., dashboards, reports) to effectively communicate findings to stakeholders.
Compile analyzed data into a structured report tailored for a specific audience.
Present data in a visually appealing and easy-to-understand way using charts, graphs, tables, or dashboards.
Generate patient data to provide a deep knowledge of patient dynamics in real-world settings and create personalized solutions to improve care.
Collaborate to understand data needs and create comprehensive data maps to integrate data from a variety of sources within the EHR.
Analyze patient data from various sources (e.g., electronic health records, patient satisfaction surveys, claims data) to identify trends, patterns, and areas for improvement. Conduct root cause analysis to identify factors contributing to poor patient outcomes.
Collaborate with clinical services and patient care services to identify patient population and associated disease states and correlate data points for better patient outcomes.
Collaborate with physicians, nurses, and other healthcare professionals to understand patient medication needs and challenges.
Incorporate industry benchmarks to illustrate baseline metrics and current state when publishing charts, graphs, pivot tables and other diagrams.
Provide 340B program compliance reports for qualified patients, drugs, providers, vendors, payers, and locations.
Publish quality analytics to include weekly or monthly dashboards, productivity, ad-hoc projects, and/or KPI used by directors and managers to improve processes and maintain a pulse of daily operations.
Support Pharmacy and Therapeutics Committee functions by providing financial data to be used in the drug evaluation process.
Minimum Experience Required
Associate/Bachelor's degree in Information Technology, Business Management, Finance, Accounting, or Hospital Administration preferred, or the equivalent combination of education and experience.
Minimum 5 years of Data science or programming experience in lieu of degree.
Direct experience in data analysis and/or health care planning background is preferred.
Excellent Benefits Package
5 days of Paid Time Off available for use upon hire (full-time)
PTO Sell Back Program
Compassionate Leave Sharing Program (PTO Donation)
Company paid Maternity and Paternity Leave
Bereavement Leave (includes pets)
Employee Support Fund, for employees in need of emergency financial support
Retirement plans with company match
Company paid Basic Life Insurance & Long-Term Disability
Health Insurance, Pharmacy, Dental, Vision and much more!
Work Experience
Education
If you would like to be part of a growing family focused on supporting clinical excellence, teamwork and innovation, we urge you to apply now!
Baptist Health is an
Equal Employment Opportunity
employer.
Auto-ApplyLead Revenue Cycle Intelligence Analyst
Remote job
Lead Revenue Cycle Intelligence Analyst - (10032391) Description Join the transformative team at City of Hope, where we're changing lives and making a real difference in the fight against cancer, diabetes, and other life-threatening illnesses. City of Hope's growing national system includes its Los Angeles campus, a network of clinical care locations across Southern California, a new cancer center in Orange County, California, and treatment facilities in Atlanta, Chicago and Phoenix.
Our dedicated and compassionate employees are driven by a common mission: To deliver the cures of tomorrow to the people who need them today.
Position SummaryThe Lead Revenue Cycle BI Strategist serves as a senior analytics expert and thought partner within the Revenue Cycle Intelligence team.
This role is responsible for designing, developing, and delivering advanced business intelligence solutions that drive operational excellence, financial performance, and strategic decision-making.
The Strategist translates complex data into actionable insights, collaborates with cross-functional teams, and supports enterprise initiatives through predictive modeling, visualization, and performance analytics.
ResponsibilitiesDesign and develop advanced dashboards, reports, and analytic tools to monitor and improve revenue cycle performance and strategy.
Partner with operational leaders to define KPIs, identify trends, and deliver actionable insights that enhance financial outcomes.
Lead data exploration and predictive modeling initiatives to support forecasting, reimbursement optimization, and payer analysis.
Ensure accuracy, governance, and consistency of data across reporting platforms and analytics workflows.
Mentor and support junior analysts by sharing expertise, fostering development, and providing technical guidance.
Collaborate on system implementations, upgrades, and the integration of new data sources into reporting structures.
Qualifications QualificationsEducation (Minimum): Bachelor's degree in Health Administration, Business, Finance, or a related field.
Experience (Minimum): 5+ years of progressive leadership experience in healthcare revenue cycle, finance, strategy, or performance improvement.
Education (Preferred): Master's degree or equivalent advanced degree.
Certifications (Preferred): CRCR, CHFP, CPA, Lean Six Sigma, or equivalent.
Additional InformationCOH employees may apply for a transfer or promotion to job openings for which they meet the minimum qualifications if they meet the following criteria:Employed at COH in current role for at least one year, unless otherwise stipulated in an applicable collective bargaining agreement.
Are in good standing and have no current performance issues.
City of Hope employee pay is based on the following criteria: work experience, qualifications, and work location.
To learn more about our Comprehensive Benefits, please CLICK HERE.
City of Hope is an equal opportunity employer.
Primary Location: US-Nationwide-USA-Remote-US-RemoteJob: Accounting/FinanceWork Force Type: RemoteShift: DaysJob Posting: Sep 30, 2025Minimum Hourly Rate ($): 61.
997400Maximum Hourly Rate ($): 99.
196200
Auto-ApplyIntelligence Analyst
Remote job
Intelligence AnalystEmployment Type: Full-Time, Experienced Contact Government Services is hiring an Intelligence Analyst ready to be a member of a dynamic and fast paced intel analysis program for a federal agency supporting the US Government's threat watchlisting and screening mission.
As an Intelligence Analyst, you will provide embedded analysis and reach back support to a federal agency and their partners.
You will provide multi-source intelligence analysis and fusion that integrates existing national-level products and databases to define patterns of operations.
As required, you will interact directly with government leadership and deployed intelligence consumers during the development of intelligence products and ongoing screening operations to meet intelligence requirements across the watchlist enterprise.
Duties may include the processing and verification of national security threat actor nominations, data integrity/quality control, encounter management, information sharing, and/or multiple discipline intelligence analysis.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology.
To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others.
Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Primary Responsibilities Apply complex direction, including standard operating procedures and operations manuals documentation as well as appropriate oral and written guidance received.
Communicates clearly and effectively, both orally and in writing, in order to tactfully and persuasively advise and guide executive management relative to a variety of issues which can be delicate in nature; includes making presentations and preparing complete, clear, and concise formal and informal reports, correspondence, briefings, charts, tables, and graphs that are distributed throughout the government and its partner agencies.
Conduct research and analysis of data, information, and intelligence to produce a wide range of finished all-source intelligence products.
Finished intelligence products shall include standard and non-standard Agency products as well as briefings for the tactical and strategic customers You should be able to provide daily feedback to the team lead.
Basic Qualifications The ability to learn the range of pertinent laws, regulations, policies, and precedents which affect the program Effective problem-solving, analytic, written and oral communication skills Capacity to work as part of a team to provide multi-faceted intelligence products and support to operational units and Intelligence Community components Knowledge with Microsoft Outlook applications Ability to work with and engage the customer daily Active Top Secret clearance and eligible for a CI Polygraph Preferred Qualifications Experience working with IC tools and databases Degree in security or intelligence studies with a recommended focus on terrorism or other transnational security threats is highly desired Two to seven years of Experience Familiarity with programs and software such as Palantir, ESRI, Intel Analyst, ETC.
Completion certificate from a commercial, military, or US government all source analysis training course or a specialized intelligence career field.
Skills and attributes for success:- Drafting and development of technical documentation related to a variety of projects in the IT space.
- Work closely with project stakeholders to establish technical processes and procedures.
- Document projects through the SDLC.
- Provide status reports for multiple ongoing projects and related documentation efforts.
- Assist with both user and admin level documentation.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources.
We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs.
We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government-contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees.
Therefore, we offer a comprehensive benefits package.
- Health, Dental, and Vision- Life Insurance- 401k- Flexible Spending Account (Health, Dependent Care, and Commuter)- Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer.
Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation! Explore additional job opportunities with CGS on our Job Board:*******************
com/join-our-team/For more information about CGS please visit: ************
cgsfederal.
com or contact:Email: info@cgsfederal.
com #CJ
Auto-ApplyProtective Intelligence Analyst - Executive Protection Support
Remote job
Who are we?
IOG, is a technology company focused on Blockchain research and development. We are renowned for our scientific approach to blockchain development, emphasizing peer-reviewed research and formal methods to ensure security, scalability, and sustainability. Our projects include decentralized finance (DeFi), governance, and identity management, aiming to advance the capabilities and adoption of blockchain technology globally.
We invest in the unknown, applying our curiosity and desire for positive change to everything we do. By fueling creativity, innovation, and progress within our teams, our products and services are designed for people to be fearless, to be changemakers.
What the role involves:
The Protective Intelligence team seeks a skilled Open Source Intelligence Analyst to provide support for executive movements, travel, and event security. This analyst will play a critical role in ensuring proactive situational awareness, supporting executive protection operations through open-source intelligence (OSINT) monitoring, travel assessments, and threat investigations. The position requires close coordination with Executive Protection (EP) agents, the Security Operations Center (SOC), and corporate leadership to identify, assess, and mitigate risks to executives, facilities, and company interests.
Conduct continuous open-source and social-media monitoring to identify threats, hostile activity, or emerging risks targeting executives, events, or company facilities.
Analyze online chatter, protest activity, and criminal or extremist indicators to provide timely alerts to the Executive Protection (EP) team and the Security Operations Center (SOC).
Produce pre-travel and event intelligence briefs evaluating destination threat environments, including crime, terrorism, unrest, health, and environmental risks.
Support EP advance planning by providing intelligence on neighborhoods, routes, and venues; identify areas of concern and recommend mitigation measures.
Monitor global and local developments affecting executives while in transit; issue real-time updates on incidents, unrest, or hazards near executive locations.
Conduct Person of Interest (POI) investigations to assess intent, capability, and threat level of individuals or groups exhibiting concerning behavior toward executives.
Monitor social-media activity along executive travel routes, hotels, and venues to detect localized security concerns or emerging threats.
Utilize analytical tools and recognition technologies to identify or confirm potential threat actors in proximity to executive movements.
Prepare concise intelligence summaries or advisories highlighting security developments relevant to executive protection operations.
Maintain automated travel monitoring and alert systems for active and planned executive travel.
Serve as primary intelligence liaison to the EP Detail, ensuring clear information flow, deconfliction, and operational alignment.
Develop and track early warning indicators signaling potential escalation or emerging threat activity to enable proactive risk mitigation.
Support after-hours or on-call operations during executive travel.
Travel domestically or internationally (up to 50%) in support of special assignments or executive movements.
Lead monthly global risk assessments focused on security trends, terrorism, civil unrest, and geopolitical volatility affecting executive safety.
Requirements
Who you are:
Required Qualifications
Minimum 4 years of experience in intelligence analysis.
Strong analytic writing skills with the ability to produce clear and actionable intelligence products.
Understanding of OPSEC principles and ethical intelligence practices.
Proficiency with commercial intelligence tools and monitoring platforms (e.g., Seerist, Crisis24, Dataminr, Shadow Dragon, Tangles, Ontic, etc).
Ability to work in distributed teams and handle sensitive information under confidentiality.
Ability to execute responsibilities discreetly and autonomously across diverse international environments and industry sectors.
Valid US Passport.
Preferred Qualifications
Prior experience supporting executive protection, corporate security, or government protection missions.
Experience integrating OSINT into operational risk management and travel security planning.
Familiarity with protest dynamics, extremist activity, and executive-specific threat behaviours.
Ability to operate independently with minimal supervision.
Trainings or certifications in OSINT or intelligence analysis.
Benefits
The base salary for this position has a range of $90 - $100k per year at the commencement of employment. Any offer is determined by overall experience and performance during the interview process. This is only part of the total compensation package.
All Employees
Remote Working
Laptop reimbursement
New starter package to buy hardware essentials (headphones, monitor, etc)
Learning & Development opportunities
US Employees
Medical, Dental, and Vision benefits coverage through Anthem for the employee and dependents
401k
Health Savings Account
Life Insurance
At IOG, we value diversity and always treat all employees and job applicants based on merit, qualifications, competence, and talent. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Auto-ApplySr. Cyber Threat Intelligence Analyst
Remote job
cFocus Software seeks a Senior Cyber Threat Intelligence Analyst to join our program supporting AOUSC. This position is fully remote. This position requires active Public Trust clearance. Qualifications:
8 years' experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs).
8 years' experience in collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization.
8 years' experience in producing high-quality written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization.
5 years working in an office environment with technical IT personnel.
5 years of experience with Microsoft Office Tools such as Word, PowerPoint, Excel, and OneNote
5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.
Bachelor's degree in Cybersecurity preferred
Security + is required and Network + or equivalent is preferred
Duties:
Identify emerging cyber threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds.
Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks. This includes analyzing malware samples, phishing emails, and other threat artifacts to understand threat actor TTPs.
Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner.
Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies.
Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies.
Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis, helping to prioritize security investments and initiatives to mitigate emerging threats effectively.
Provide mentorship, guidance, and training to other contractor's employees, including sharing knowledge and best practices to build a skilled and cohesive cyber threat intelligence team.
Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities.
Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities based on threat intelligence data, enabling informed decisions on patching and remediation efforts.
Provide written recommendations on Government drafts of executive summaries and briefings.
Provide recommendations and input on other content and presentations.
Incorporate data from Mandiant, federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies.
Examine malware samples from diverse sources using reverse engineering techniques to uncover capabilities, origins, and threat actor methodologies.
Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms.
Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time.
Auto-ApplyBlockchain Intelligence Analyst
Remote job
TRM Labs is a blockchain intelligence company committed to fighting crime and creating a safer world. By leveraging blockchain data, threat intelligence, and advanced analytics, our products empower governments, financial institutions, and crypto businesses to combat illicit activity and global security threats. At TRM, you'll join a mission-driven, fast-paced team made up of experts in law enforcement, data science, engineering, and financial intelligence, tackling complex global challenges daily. Whether analyzing blockchain data, developing cutting-edge tools, or collaborating with global organizations, you'll have the opportunity to make a meaningful and lasting impact.
As a Blockchain Intelligence Analyst, you will drive TRM's collection, analysis, and reporting on key areas of the crypto economy (e.g., crypto exchanges, fraud). You will ensure that TRM has best-in-class intelligence through your subject matter expertise, first-principles problem solving, and ability to turn data into insights. You will collaborate with an experienced team of engineers, data scientists, and product managers to build scalable systems to detect, prevent, and mitigate cryptocurrency fraud and financial crime.
The impact you'll have here:
You'll track, analyze, and report on key areas of the crypto economy to detect suspicious activities.
Your OSINT skills will help uncover hidden threats and improve our security posture.
You'll provide key insights that contribute to real-world action against threat actors.
You'll collaborate with data and engineering teams to enhance the TRM product.
Your intelligence reports will help law enforcement, internal teams, and clients stay ahead of cyber risks.
What we're looking for:
Proven experience working in intelligence-related positions previously, ideally in Blockchain Intelligence (This is not an entry-level position).
OSINT Expertise
- Proficiency in using open-source tools to gather and analyze intelligence.
Analytical Skills
- Strong ability to synthesize and report complex information clearly and accurately.
Experience in Blockchain Analysis
- Knowledge of blockchain technologies, with a focus on tracing transactions and identifying malicious activity.
Communication & Collaboration
- Excellent communication skills to collaborate with cross-functional teams and produce actionable intelligence reports.
Ownership
- You demonstrate full ownership of your work, taking an 80/20 approach to accomplish objectives.
Certifications & Background
- Relevant certifications (e.g., GIAC, CEH) and experience in cybersecurity or intelligence gathering.
You have the ability to research in another language (Please specify the language(s) in your application).
About the team:
Our team values open communication and a collaborative work environment, where feedback and ideas are encouraged from all members.
We prioritize flexibility and adaptability, ensuring that everyone stays aligned through regular check-ins and progress updates. Operating with a strong focus on shared goals, we work together to meet deadlines while supporting individual growth and innovation.
Team members must be available for weekly meetings at 9AM PST and bi-weekly meetings at 8:30AM PST. We require at least 3-4 overlapping hours daily with the Pacific Timezone.
Learn about TRM Speed in this position:
Utilizes sound judgment and the 80/20 principle to drive rapid, high-impact outcomes.
Demonstrates the ability to iterate quickly in response to evolving threat landscapes.
Leverages creative problem-solving to ensure prompt and effective threat actor engagement to acquire attribution within 24 hours.
Employs a diverse set of methodologies to scale and optimize threat intelligence production for customer needs within 72 hours.
Life at TRM Labs
Leadership Principles
Our Leadership Principles shape everything we do-how we make decisions, collaborate, and operate day to day.
Impact-Oriented Trailblazer - We put customers first, driving for speed, focus, and adaptability.
Master Craftsperson - We prioritize speed, high standards, and distributed ownership.
Inspiring Colleague - We value humility, candor, and a one-team mindset.
Accelerate your Career
At TRM, you'll do work that matters-disrupting terrorist networks, recovering stolen funds, and protecting people around the world. You will:
Work alongside top experts and learn every day.
Embrace a growth mindset with development opportunities tailored to your role.
Take on high-impact challenges in a fast-paced, collaborative environment.
Thrive in a culture of coaching, where feedback is fast, direct, and built to help you level up.
What to Expect at TRM
TRM moves fast-
really fast
. We know a lot of startups say that, but we mean it. We operate with urgency, ownership, and high standards. As a result, you'll be joining a team that's highly engaged, mission-driven, and constantly evolving.
To support this intensity, we're also intentional about rest and recharge. We offer generous benefits, including PTO, Holidays, and Parental Leave for full time employees.
That said, TRM may not be the right fit for everyone. If you're optimizing for work life balance, we encourage you to:
Ask your interviewers how they personally approach balance within their teams, and
Reflect on whether this is the right season in your life to join a high-velocity environment.
Be honest with yourself about what energizes you-and what drains you
We're upfront about this because we want every new team member to thrive-not just survive.
The Stakes Are Real
Our work has direct, real-world impact:
Jumping online after hours to support urgent government requests tracing ransomware payments.
Delivering actionable insights during terrorist financing investigations.
Collaborating across time zones in real time during a major global hack.
Building new processes in days, not weeks, to stop criminals before they cash out.
Analyzing blockchain data to recover stolen savings and dismantle trafficking networks.
Thrive as a Global Team
As a remote-first company, TRM Labs is built for global collaboration.
We cultivate a strong remote culture through clear communication, thorough documentation, and meaningful relationships.
We invest in offsites, regional meetups, virtual coffee chats, and onboarding buddies to foster collaboration.
By prioritizing trust and belonging, we harness the strengths of a global team while staying aligned with our mission and values.
Join our mission!
We're looking for team members who thrive in fast-paced, high-impact environments and love building from the ground up. TRM is remote-first, with an exceptionally talented global team. If you enjoy solving tough problems and seeing your work make a difference for billions of people, we want you here. Don't worry if your experience doesn't perfectly match a job description- we value passion, problem-solving, and unique career paths. If you're excited about TRM's mission, we want to hear from you.
Recruitment agencies
TRM Labs does not accept unsolicited agency resumes. Please do not forward resumes to TRM employees. TRM Labs is not responsible for any fees related to unsolicited resumes and will not pay fees to any third-party agency or company without a signed agreement.
Privacy Policy
By submitting your application, you are agreeing to allow TRM to process your personal information in accordance with the TRM Privacy Policy
Learn More: Company Values | Interviewing | FAQs
Auto-ApplyPharma Pipeline Intelligence Analyst (Remote)
Remote job
AssistRx is a leading healthcare technology organization dedicated to accelerating patient access to life-changing therapies. Through our advanced, AI-enabled patient solutions platform, we partner with pharmaceutical manufacturers, specialty pharmacies, and healthcare providers to remove barriers, simplify complex processes, and improve the patient journey. Our portfolio-including iAssist , Hub Lite™, Prior Authorization, Benefits Verification, and connected specialty pharmacy services-empowers patients to start and stay on therapy faster. With a strong commitment to innovation, data-driven decision making, and compassionate care, AssistRx has earned its reputation as one of the most trusted leaders in specialty medication access. We combine technology, talent, and empathy to solve some of the most challenging problems in healthcare-and we're just getting started.
The Commercial Research Analyst plays a critical role in expanding AssistRx's growth pipeline by transforming pharmaceutical industry data into high-value commercial insights. This position supports Sales, Marketing, and Executive Leadership by researching drug development pipelines, identifying new account opportunities, and generating data-driven recommendations that strengthen our market positioning and accelerate business development.
This is a high-impact analytical role ideal for someone who thrives at the intersection of market intelligence, pharmaceutical research, and commercial enablement. Candidates will be successful if they are curious, resourceful, highly analytical, and comfortable translating complex market data into actionable insights for business stakeholders.
Market & Pipeline Intelligence
Conduct ongoing research on the FDA drug pipeline, clinical trial activity, company announcements, and market movements.
Identify high-value prospects by evaluating drug development stage, therapeutic category, and commercial readiness.
Monitor industry developments including M&A activity, new launches, indication expansions, and competitive landscape shifts.
Lead & Account Qualification
Evaluate potential client organizations using data from clinical registries, press releases, and industry databases.
Analyze buyer intent signals using platforms such as 6sense, ZoomInfo, LinkedIn Sales Navigator, or similar tools.
Build and maintain detailed profiles of high-priority life sciences accounts.
Commercial Insights & Reporting
Generate digestible reports, dashboards, and prospecting lists to support Sales and Commercial Leadership.
Provide strategic recommendations for account prioritization, territory planning, and outreach sequencing.
Collaborate with Marketing to align research insights with messaging, targeting, and campaign strategy.
Database & CRM Management
Maintain and enhance the master prospect database, ensuring accuracy, completeness, and usability.
Support CRM data quality initiatives across Salesforce or other systems.
Cross-Functional Collaboration
Partner closely with Sales Leadership to refine target segments and evaluate service fit by therapeutic area or product phase.
Coordinate with Marketing to ensure alignment between intelligence, ABM initiatives, and lead-generation efforts.
Requirements
Bachelor's degree in Life Sciences, Business, Data Analytics, or a related field.
2-4 years of experience in market research, commercial insights, sales research, business development support, or data analysis.
Industry experience within pharmaceuticals, biotech, life sciences, or healthcare strongly preferred.
Working knowledge of the drug development lifecycle, FDA approval pathways, and clinical trial registries.
Experience using 6sense, Demandbase, ZoomInfo, Sales Navigator, or similar prospect intelligence platforms.
Strong proficiency in Excel (pivot tables, lookups, data cleaning, analysis).
Excellent analytical, critical-thinking, and data interpretation skills.
Strong communication skills with the ability to convert complex data into clear, actionable insights.
Experience with Salesforce or CRM systems preferred.
PREFERRED QUALIFICATIONS
Experience researching the pharmaceutical pipeline via ClinicalTrials.gov, EvaluatePharma, TrialScope, or similar.
Prior experience supporting Sales or Commercial teams in life sciences.
Familiarity with account-based marketing (ABM) and commercial segmentation strategies.
Knowledge of specialty pharma, hub services, or patient access programs.
Benefits
Supportive, progressive, fast-paced environment
Competitive pay structure
Matching 401(k) with immediate vesting
Medical, dental, vision, life, & short-term disability insurance
Opportunity to impact patient outcomes through data-driven healthcare technology.
Collaborative and mission-driven culture that values innovation and continuous learning.
Access to cutting-edge cloud technologies and modern data engineering tools.
Competitive compensation, comprehensive benefits, and career growth opportunities
AssistRx, Inc. is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration without regard to race, religion, color, sex (including pregnancy, gender identity, and sexual orientation), parental status, national origin, age, disability, family medical history or genetic information, political affiliation, military service, or other non-merit based factors, or any other protected categories protected by federal, state, or local laws.
All offers of employment with AssistRx are conditional based on the successful completion of a pre-employment background check.
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. Sponsorship and/or work authorization is not available for this position.
AssistRx does not accept unsolicited resumes from search firms or any other vendor services. Any unsolicited resumes will be considered property of AssistRx and no fee will be paid in the event of a hire
Auto-ApplyAnalyst, Online Threat Intelligence
Remote job
An Analyst on Control Risks' Online Threat Intelligence (OTI) team will:
Conduct and lead operational delivery of open-source intelligence investigations.
Work with the regional OTI team in scoping, delivering and peer reviewing intelligence product for our clients.
Work with the team leadership to ensure effective team coordination, both within region and with other OTI regional hubs across our 24/7 intelligence function.
Tasks and responsibilities
Intelligence Assessments
Lead on complex intelligence investigations, utilizing a broad range of sources to provide analytical conclusions and advice to our clients.
Take a lead role in organizing, conducting and reviewing threat monitoring deliverables and threat and exposure assessments.
Lead and deliver person of interest assessments (POI), utilizing open sources to measure the intent and capability of online threat actors to cause harm to our clients.
Provide tactical level insights to our clients related to their threat environment and broader industry trends.
Produce high-quality written analysis in a time-sensitive manner.
Work collaboratively across regional delivery teams, ensuring standardization of intelligence output for global engagements.
Innovate and provide engaging solutions to the objectives of different stakeholders. Work with regional OTI leadership to identifying opportunities for methodology development.
Consulting responsibilities
Hold scoping conversations with existing and prospective clients as a subject matter expert. Provide insight into how OTI deliverables can bring value to our clients.
Provide client ready proposals that address the needs of our clients across the range of OTI deliverables.
Support the regional threat intelligence leads in the coordination and of the regional team.
Brief external stakeholders on intelligence product, including key findings, analysis and recommended mitigation actions for our clients.
Innovate and provide engaging solutions to the challenges of our clients, proactively anticipating their security needs.
Develop an understanding of the broader complimentary offerings of other teams within Digital Risks.
Operations and Business Management
Provide a key role in ensuring adherence to KPI metrics, using those insights to inform operational and commercial decisions.
Serve as a key point of contact for training and peer reviewing junior team members in the production of high quality timely deliverables.
Adhere to all SOPs and operational requirements of the team. Ensure that all policies are maintained and followed throughout.
Requirements
Candidates must be legally authorized to work in the US on a permanent basis without sponsorship.
Candidates must possess unrestricted US work authorization.
Three to five years' experience in a threat intelligence role, with primary responsibility for running complex intelligence investigations.
Deep investigative experience in identifying and analyzing information from open sources, social media and deep and dark web avenues.
Track record of facilitating client relationships with intelligence and security subject matter experts.
Experience of conducting business development opportunities including scoping conversations, briefings and development of proposals.
Demonstrable experience of coordinating intelligence product, including collection planning and reviewing intelligence output from peers.
Developed understanding of the interaction between threatening online behavior and physical security incidents.
A strong understanding and practical knowledge of the intelligence cycle, source evaluation and techniques used to ensure objectivity, actionability and relevance of intelligence product.
Graduate degree in Security Studies, Intelligence, Threat Intelligence or related fields.
Preferred: Knowledge of additional non-English languages.
The base salary range for this position is $90,000-$95,000 per year. Exact compensation offered may vary depending on job-related knowledge, skills, and experience.
Control Risks is committed to a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age or veteran status. If you require any reasonable adjustments to be made in order to participate fully in the interview process, please let us know and we will be happy to accommodate your needs.
Control Risks participates in the E-Verify program to confirm employment authorization of all newly hired employees. The E-Verify process is completed during new hire onboarding and completion of the Form I-9, Employment Eligibility Verification, at the start of employment. E-Verify is not used as a tool to pre-screen candidates. For more information on E-Verify, please visit
**************
Benefits
Control Risks offers a competitively positioned compensation and benefits package that is transparent and summarized in the full job offer.
Control Risks supports hybrid working arrangements, wherever possible, that emphasize the value of in-person time together - in the office and with our clients - while continuing to support flexible and remote working.
Medical Benefits, Prescription Benefits, FSA, Dental Benefits, Vision Benefits, Life and AD&D, Voluntary Life and AD&D, Disability Benefits, Voluntary Benefits, 401 (K) Retirement, Nationwide Pet Insurance, Employee Assistance Program.
As an equal opportunities employer, we encourage suitably qualified applicants from a wide range of backgrounds to apply and join us and are fully committed to equal treatment, free from discrimination, of all candidates throughout our recruitment process.
Auto-ApplySenior Cyber Threat Intelligence Analyst
Remote job
About PUNCH:
We're problem solvers first & foremost
. PUNCH's origin story involves frustration with available INFOSEC tools and techniques-we came up thru the industry using these inefficient tools and techniques and decided there had to be a
better
way. We bring this laser focus on efficiency to every customer engagement.
We have trust as a hallmark in everything we do
. PUNCH provides its team members with the maximum amount of ownership over their careers, the direction of the company, and the flexibility & freedom to accomplish their job without interference. Trust requires accountability; we live that, company-wide.
We back each other up
. PUNCH is a supportive place to work. We've worked hard to create an environment that makes people better, encourages team work, and rewards a “pitch in” mentality.
We give back.
To those in need. To the community. To the industry.
Does this sound like you?
In this Role You Will: Consult and advise a commercial client with maturing and expanding an established CTI program. Relevant experience includes:
Significant experience with analyzing and tracking cyber threats at the strategic, operational and tactical level.
Substantial background in developing CTI products and services for Cybersecurity teams, and other portions of an organization, is highly preferred.
Experience with evolving CTI out of a traditional security function is a plus.
Ability to manage multiple, simultaneous projects while being able to shift priority based on customer need.
Comfortability with managing client expectations, and proactively communicating issues to leadership.
Proficient at documenting processes and procedures.
Capability & willingness to mentor and teach others.
Experience with CIRT/SOC security tools and services, as well as Microsoft 365 and Azure ecosystems preferred.
Ability to communicate to all Levels of an Organization and Technical Backgrounds.
Previous experience within Healthcare industries is a plus.
Strong preference for prior all-source analysts with cybersecurity experience
Key Requirements: 5+ years of diverse corporate and/or government cybersecurity experience. Familiarity with Microsoft 365, Azure, and services within the Microsoft ecosystem. Proven management/mentoring experience.
Must Haves: Significant strategic, operational and tactical intelligence experience within a corporate environment. Experience within the Microsoft Azure ecosystem.
Remote work is available with this position.