Post job

Intelligence research specialist work from home jobs - 41 jobs

  • Artificial Intelligence Researcher

    Generalwebers

    Remote job

    The Artificial Intelligence Researcher is responsible for developing and advancing innovative AI models, algorithms, and methodologies to solve complex problems and drive organizational growth. This role involves conducting original research, collaborating with cross-functional teams, publishing findings, and contributing to the application of state-of-the-art AI solutions in real-world scenarios. The ideal candidate demonstrates excellence in theoretical and applied machine learning, deep learning, or related AI domains. Key Responsibilities: Design, develop, and implement novel algorithms and machine learning models to address business and technical challenges. Conduct original research in artificial intelligence, publishing findings in peer-reviewed journals and presenting at conferences as appropriate. Collaborate with data scientists, engineers, and product teams to transition research innovations into scalable solutions. Analyze large and complex datasets to validate model performance and drive improvements. Stay current with developments in AI, machine learning, deep learning, and related fields, integrating advancements into ongoing research. Document methodologies, experiments, and results following scientific best practices. Participate in grant writing, patent applications, or research funding proposals as needed. Ensure all work complies with ethical, legal, and organizational standards for research and data security. Mentor junior researchers or interns as assigned. Qualifications: Ph.D. or Master's degree in Computer Science, Artificial Intelligence, Machine Learning, Mathematics, Statistics, or a closely related field. Demonstrated research experience in AI/ML, evidenced by published papers, patents, or significant project contributions. Proficiency in programming languages and frameworks commonly used in AI research (e.g., Python, TensorFlow, PyTorch, R, C++). Strong analytical, problem-solving, and critical thinking skills. Experience working with large-scale datasets and advanced statistical methods. Excellent written and verbal communication abilities. Ability to work independently and collaboratively in a remote environment. U.S. residency is required; applications from outside the United States will not be considered. Compensation and Benefits: Annual Salary Range: $140,000 - $185,000, depending on experience, education, and location within the U.S. Benefits Package: Comprehensive health, dental, and vision insurance 401(k) retirement plan with employer match Paid time off (vacation, holidays, sick leave) Professional development funding (conferences, publications, training) Flexible remote work arrangements Employee wellness and assistance programs
    $140k-185k yearly 11d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Senior Cyber Intelligence Analyst | Remote

    UPS 4.6company rating

    Remote job

    Before you apply to a job, select your language preference from the options available at the top right of this page. Explore your next opportunity at a Fortune Global 500 organization. Envision innovative possibilities, experience our rewarding culture, and work with talented teams that help you become better every day. We know what it takes to lead UPS into tomorrow-people with a unique combination of skill + passion. If you have the qualities and drive to lead yourself or teams, there are roles ready to cultivate your skills and take you to the next level. Job Description: Job Summary This position engages in the identification, tracking, monitoring, containment and mitigation of information security threats. He/She performs quality assurance functions to validate that existing methods of research are successful in identifying and documenting security incidents. This position defines procedures for analysis and makes adjustments as technologies and methodologies advance. Responsibilities: Assesses, prioritizes and takes action on requests that improve existing Security Operation Center (SOC) tools and procedures. Partners with management to coordinate security incident response efforts to communicate information, drive resource actions and decisions, provide recommendations, and ensure resolution. Evaluates and analyzes complex malicious code through the use of tools including disassemblers, debuggers, hex editors, un-packers, virtual machines and network sniffers. Conducts reverse-engineering for known and suspected malware files. Investigates instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration. Performs research in the area of malicious software, vulnerabilities, and exploitation tactics, and recommend preventative or defensive actions. Produces reports detailing attributes and functionality of malware, and indicators that can be used for malware identification/detection, to include behavior, identified infrastructure used for command and control, and mitigation techniques. Analyses the relationship between a given sample of malware and other known samples/families of malware, and notable features that indicate the origin or sophistication of the malware and its authors. Qualifications: 2-3 years' experience as Security Operations Center (SOC) Analyst including Incident Response and Handling roles Experience in Malware Reverse Engineering and Sandboxing Experience with SIEM Technology Significant experience with Linux, TCP/IP, UNIX, MS-Windows, IP Routing, Firewalls and IPS Understanding of behavioral based threat models, including ATT&CK, Cyber Kill Chain, Diamond Model, etc. Deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats Demonstrated experience using Open Source (OllyDbg, Radare, GDB, etc.) malware analysis tools Ability to analyze shellcode, and packed and obfuscated code, and their associated algorithms Ability to develop network and host based signatures to identify specific malware. Recommend heuristic or anomaly based detection methods Subject matter expertise in the detection, analysis and mitigation of malware Experience with Information Security Research, Malware Reverse Engineering, Cyber Threat Analysis, Windows Operating System and Data Analysis Knowledge of Research skills, Technical Writing, Information Security Research, Security Incident Response, Security Risk Assessment/Analysis Bachelor's Degree or International equivalent - Preferred Experience with multi-cloud technologies such as Google Cloud, Azure and AWS Other Criteria: Job Grade: 20H Must be currently located in the same geographic location as the job or willing to relocate yourself -Required. Last day to apply is 01/06/2026 EOD Shift: Monday - Friday 7am to 5pm or 8am to 6pm Employee Type: Permanent UPS is committed to providing a workplace free of discrimination, harassment, and retaliation. Employer will sponsor visas for specific positions. UPS is an equal opportunity employer. UPS does not discriminate on the basis of race/color/religion/sex/national origin/veteran/disability/age/sexual orientation/gender identity or any other characteristic protected by law.
    $75k-100k yearly est. Auto-Apply 4d ago
  • Lead Investigator: 1099

    Kentech Consulting 3.9company rating

    Remote job

    Responsive recruiter KENTECH Consulting Inc. is an award-winning background technology screening company. We are the creators of innovative projects such as eKnowID.com, the first consumer background checking system of its kind, and ClarityIQ, a high-tech and high-touch investigative case management system. MISSION We're on a mission to help the world make clear and informed hiring decisions. VALUE In order to achieve our mission, our team embodies the core values aligned with it: Customer Focused: We are customer-focused and results-driven. Growth Minded: We believe in collaborative learning and industry best practices to deliver excellence. Fact Finders: We are passionate investigators for discovery and truth. Community and Employee Partnerships: We believe there is no greater power for transformation than delivering on what communities and employees care about. IMPACT As a small, agile company, we seek high performers who appreciate that their efforts will directly impact our customers and help shape the next evolution of background investigations. KENTECH Consulting Inc. is seeking a highly skilled and detail-oriented Background Investigator to conduct impartial, fact-based pre-employment investigations for municipal government agencies. This role requires strong investigative skills, excellent research abilities, and a commitment to maintaining accuracy and confidentiality. As a remote investigator, you will analyze applications, conduct interviews, research public records, and compile detailed reports. If you have a background in journalism, criminal investigations, or investigative reporting, this is an excellent opportunity to apply your skills in a fast-paced and high-impact environment. Key Responsibilities • Conduct pre-employment investigations on law enforcement and government candidates. • Research and analyze applications, employment records, criminal histories, and public records to verify candidate qualifications. • Conduct in-depth interviews through phone or virtual platforms to gather insights. • Execute criminal background checks and civil lawsuit verifications using public records. • Identify gaps or inconsistencies and determine the best approach to obtain accurate information. • Prepare comprehensive investigative reports with a high level of accuracy and clarity. • Maintain professional and timely communication with clients and agency stakeholders. • Organize information and manage caseloads efficiently to meet deadlines. Qualifications and Experience • College degree in Journalism, Criminal Justice, Political Science, Pre-Law, Paralegal, or a related field. • Five or more years of investigative or related experience, including journalism, investigative reporting, or criminal investigations. • Strong interviewing skills for both remote and in-person interviews. • Strong analytical and writing skills with the ability to interpret findings and deliver clear reports. • Proven ability to handle confidential information with professionalism and discretion. • Proficiency in Google Docs, Excel, and investigative tools or software. • Ability to pass a Security Clearance to obtain a Permanent Employee Registration Card (PERC) or already possess one. • Ability to complete a minimum of five cases per week. Key Soft Skills • Attention to detail with a focus on accuracy and clarity. • Ethical integrity and the ability to conduct unbiased investigations. • Clear and professional communication across interviews, reporting, and client interactions. • Strong investigative mindset with the ability to identify gaps and analyze findings. • Effective time management and the ability to handle multiple cases while meeting deadlines. Compensation and Benefits • 1099: 200 dollars per case. Apply Now If you are a meticulous investigator with a strong analytical mindset, we would love to hear from you. KENTECH Consulting Inc. is an equal opportunity employer. We celebrate diversity and remain committed to fostering an inclusive workplace. This is a remote position. Compensation: $200.00 per day We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law. 🌐 WHO WE ARE KENTECH Consulting, Inc. is a premier U.S.-based background investigation solutions firm and licensed Private Detective Agency. Our team of investigative experts blends cutting-edge technology with industry insight to deliver fast, accurate, and comprehensive reports. With deep cross-industry experience, we provide fully compliant investigative services that meet the high demands of today's business environment. 🔎 WHAT WE DO We offer customized background screening solutions tailored to meet the needs of diverse industries. Our advanced tools and digital platforms allow us to conduct background and security checks up to 75% faster than traditional methods. With real-time access to over 500 million records, KENTECH is a trusted authority in background checking technology across the U.S. 🌟 OUR VISION To help the world make clear and informed decisions. 🎯 OUR MISSION To deliver fast, accurate, and secure background investigations on a global scale-supporting safer hiring decisions and stronger communities. 🚀 CAREERS AT KENTECH We're building a team of remarkable individuals who are: ✅ Critical thinkers and problem solvers who see challenges as opportunities ✅ Driven professionals who create meaningful impact through their ideas and results ✅ Mission-driven collaborators who believe in the power of digital identity to create safer environments ✅ Naturally curious and eager to innovate in an ever-changing landscape ✅ Team players who believe in the value of camaraderie, laughter, and high standards 💼 WHO THRIVES HERE? People who never back down from a tough challenge Professionals who bring their best every day-and uplift others around them Individuals who value purpose, performance, and a good laugh Teammates who want to shape the future of digital security and identification You, if you're reading this and thinking: “This sounds like my kind of place.” 🎉 YOUR NEXT CHAPTER STARTS HERE Ready to do work that matters with people who care? Explore our current openings-your future team is waiting.
    $200 daily Auto-Apply 60d+ ago
  • Threat Intelligence Analyst, Threat Defense

    Doordash 4.4company rating

    Remote job

    About the Team At DoorDash, we are building the industry's most scalable and reliable delivery network, securing the data and protecting the privacy of our consumers, merchants, and dashers. Our Threat Defense team, encompassing Threat Response, Threat Hunting, Threat Intelligence, and Detection Engineering, is crucial to this mission. We are a fast-paced, highly collaborative group committed to innovation, proactive defense, and understanding the evolving threat landscape. Our ultimate goal is to create a secure DoorDash environment through proactive threat preparation and rapid response, safeguarding our people, partners, customers, and technologies with unwavering vigilance. About the Role The Threat Intelligence Analyst will be a foundational member of the Threat Defense Team and integral component of the Cyber Defense | Security Organization. As a Threat Intelligence Analyst, you'll be at the forefront of DoorDash's defensive capabilities, responsible for identifying, analyzing, and disseminating critical threat information. You'll proactively monitor the external threat landscape, track emerging attack vectors, and assess the potential impact on DoorDash. This role involves deep dives into threat actor methodologies, Tactics, Techniques, and Procedures (TTPs), and campaigns, translating raw intelligence into actionable insights for our security teams. You'll play a crucial role in enhancing our detection capabilities, informing our security posture, and ultimately safeguarding our ecosystem. You will report into the Senior Manager, Threat Defense under the Director, Cyber Defense and Chief Information Security Officer. You're excited about this opportunity because you will… Develop and execute operational and tactical threat intelligence requirements, leveraging a combination of open source and proprietary intelligence. Maintain up to date knowledge of global security trends and the latest cyber threats in order to identify and assess threats to the company. Prepare and deliver threat intelligence products to cross-functional partners and senior stakeholders. Work with cross-functional teams in a fast-paced environment. Solve complex problems and think critically. We're excited about you because… 4+ years of experience in a dedicated threat intelligence role. A strong understanding of cyber threat intelligence lifecycle and frameworks (e.g., MITRE ATT&CK, Kill Chain). Proficiency in collecting, analyzing, and synthesizing threat data from various sources (OSINT, commercial feeds, dark web forums). Experience with threat intelligence platforms and security information and event management (SIEM) systems. Experience with scripting languages (e.g., Python) for data analysis and automation is a plus. Ability to articulate complex technical information clearly and concisely to both technical and non-technical audiences. Must be comfortable regularly exercising discretion and independent judgment in performing job duties, including evaluating options, making informed decisions, and determining appropriate courses of action within the scope of assigned responsibilities. Applications for this position are accepted on an ongoing basis Notice to Applicants for Jobs Located in NYC or Remote Jobs Associated With Office in NYC Only We use Covey as part of our hiring and/or promotional process for jobs in NYC and certain features may qualify it as an AEDT in NYC. As part of the hiring and/or promotion process, we provide Covey with job requirements and candidate submitted applications. We began using Covey Scout for Inbound from August 21, 2023, through December 21, 2023, and resumed using Covey Scout for Inbound again on June 29, 2024. The Covey tool has been reviewed by an independent auditor. Results of the audit may be viewed here: Covey Compensation The successful candidate's starting pay will fall within the pay range listed below and is determined based on job-related factors including, but not limited to, skills, experience, qualifications, work location, and market conditions. Base salary is localized according to an employee's work location. Ranges are market-dependent and may be modified in the future. In addition to base salary, the compensation for this role includes opportunities for equity grants. Talk to your recruiter for more information. DoorDash cares about you and your overall well-being. That's why we offer a comprehensive benefits package to all regular employees, which includes a 401(k) plan with employer matching, 16 weeks of paid parental leave, wellness benefits, commuter benefits match, paid time off and paid sick leave in compliance with applicable laws (e.g. Colorado Healthy Families and Workplaces Act). DoorDash also offers medical, dental, and vision benefits, 11 paid holidays, disability and basic life insurance, family-forming assistance, and a mental health program, among others. To learn more about our benefits, visit our careers page here. See below for paid time off details: For salaried roles: flexible paid time off/vacation, plus 80 hours of paid sick time per year. For hourly roles: vacation accrued at about 1 hour for every 25.97 hours worked (e.g. about 6.7 hours/month if working 40 hours/week; about 3.4 hours/month if working 20 hours/week), and paid sick time accrued at 1 hour for every 30 hours worked (e.g. about 5.8 hours/month if working 40 hours/week; about 2.9 hours/month if working 20 hours/week). The national base pay range for this position within the United States, including Illinois and Colorado.$130,600-$192,000 USDAbout DoorDash At DoorDash, our mission to empower local economies shapes how our team members move quickly, learn, and reiterate in order to make impactful decisions that display empathy for our range of users-from Dashers to merchant partners to consumers. We are a technology and logistics company that started with door-to-door delivery, and we are looking for team members who can help us go from a company that is known for delivering food to a company that people turn to for any and all goods. DoorDash is growing rapidly and changing constantly, which gives our team members the opportunity to share their unique perspectives, solve new challenges, and own their careers. We're committed to supporting employees' happiness, healthiness, and overall well-being by providing comprehensive benefits and perks including premium healthcare, wellness expense reimbursement, paid parental leave and more. Our Commitment to Diversity and Inclusion We're committed to growing and empowering a more inclusive community within our company, industry, and cities. That's why we hire and cultivate diverse teams of people from all backgrounds, experiences, and perspectives. We believe that true innovation happens when everyone has room at the table and the tools, resources, and opportunity to excel. Statement of Non-Discrimination: In keeping with our beliefs and goals, no employee or applicant will face discrimination or harassment based on: race, color, ancestry, national origin, religion, age, gender, marital/domestic partner status, sexual orientation, gender identity or expression, disability status, or veteran status. Above and beyond discrimination and harassment based on “protected categories,” we also strive to prevent other subtler forms of inappropriate behavior (i.e., stereotyping) from ever gaining a foothold in our office. Whether blatant or hidden, barriers to success have no place at DoorDash. We value a diverse workforce - people who identify as women, non-binary or gender non-conforming, LGBTQIA+, American Indian or Native Alaskan, Black or African American, Hispanic or Latinx, Native Hawaiian or Other Pacific Islander, differently-abled, caretakers and parents, and veterans are strongly encouraged to apply. Thank you to the Level Playing Field Institute for this statement of non-discrimination. Pursuant to the San Francisco Fair Chance Ordinance, Los Angeles Fair Chance Initiative for Hiring Ordinance, and any other state or local hiring regulations, we will consider for employment any qualified applicant, including those with arrest and conviction records, in a manner consistent with the applicable regulation. If you need any accommodations, please inform your recruiting contact upon initial connection.
    $130.6k-192k yearly Auto-Apply 25d ago
  • Embedded Intelligence Analyst

    Sibylline Americas

    Remote job

    About Sibylline Sibylline is a leading intelligence and strategic risk consultancy in the security sector. Since 2010 we have supported businesses, governments, and NGOs through the provision of high-quality risk analysis, due diligence, and consultancy services. The firm provides an innovative, entrepreneurial, and fast-growing working environment, offering employees ever greater exposure to high profile clients and challenges. Sibylline offers fantastic opportunities for career progression within a successful company, and we aim to help our employees build their own personal profiles as well-regarded analysts within the broader industry. Key attributes of Sibylline employees are: Self-motivated, and auto-improving individuals who can couple initiative and boldness with good judgement Excellent written and spoken English Clarity of thought and analytical flair Strong, demonstrable interest in security and intelligence The ability to work under pressure, demonstrate leadership when required but also be able to collaborate effectively in teams Excellent attention to detail Job Description Position Summary We are looking for an experienced Intelligence Analyst to join us in an embedded role for a global social media client. You will be based in the client's Global Physical Security Intelligence Team, and your primary focus will be on Americas, with the ability to support on global cross-regional projects as required. In this role, you will assist the client in making decisions about the safety and security of its people, assets, operations, and reputation in the Americas region. You will be responsible for leveraging advanced analytical and investigative techniques to identify and assess risks to the client's business, provide actionable intelligence and support decision making for key security functions, including protective intelligence, crisis management and travel security. You will monitor intelligence sources, conduct risk assessments and produce strategic and tactical intelligence products. This is an onsite role at the client's San Jose office, working Monday to Friday 9am - 6pm, with the potential to work remotely one day a week. There may be occasional need to work out-of-hours during emergencies and time-sensitive matters. Essential Functions / Responsibilities Monitor open-source and vendor intelligence feeds to identify risks to business operations in the Americas region Conduct comprehensive risk assessments for personnel, assets, operations, travel, and special events Produce strategic and tactical reports to deliver proactive and in-depth analysis and actionable insight to client stakeholders, to enable them to drive mitigation measures Deliver situational awareness reporting to support crisis response and business continuity Investigate threat actors, including those operating in illicit online communities, and assess their tactics, techniques, and procedures (TTPs) Conduct investigations and threat assessments for persons/groups of interest as part of the overall management of threats to the client's employees, assets, and operations Conduct OSINT analysis, including deep and dark web monitoring Support the development and implementation of protective intelligence gathering, assessment, and dissemination protocols Assist in managing intelligence requirements and centralizing relevant sources to ensure comprehensive coverage Establish and maintain relationships with internal stakeholders to align intelligence efforts with business needs Contribute to cross-functional intelligence projects around high-impact events and emerging threats Safeguard sensitive and confidential information Display innovation, implementing the latest techniques, tools and best practices to support a global intelligence function Other duties as assigned Knowledge, Skills, and Abilities Keen interest in developing and learning new skills Strong proficiency in OSINT sources, methods and tools (e.g., Brandwatch, Liferaft, Skopenow, Flashpoint) and investigative resources (e.g., Clear, LexisNexis), including deep and dark web sources Strong commercial awareness, with the ability to interpret and collect intelligence information, track threats and geopolitical developments, and determine their impact to business staff, assets, operations, and reputation Experience investigating threat actors, documenting TTPs, and contributing to tactical, operational, and strategic intelligence High-level experience in geopolitical risk, violent actor behaviours and activities, and other risk areas relevant to a global tech company Experience leveraging data analysis tools and techniques; SQL and/or Python preferred Excellent ability to deliver verbal and written briefings to stakeholders, customise intelligence output to stakeholder needs, and build and maintain strong stakeholder relationships Strong analytical and problem-solving skills, attention to detail, and ability to manage multiple priorities in a fast-paced environment Ability to work cross-functionally across global teams and adapt to evolving intelligence needs Experience in managing complex projects and priorities with a high degree of autonomy Ability to innovate and identify potential opportunities to enhance efficiency and/or effectiveness within own area of work, including developing own knowledge to increase effectiveness Qualifications Qualifications Bachelor's degree in a related field, such as International Relations, Security Studies, Journalism, Business Management; Masters degree or further professional certification preferred Approximately 3-5 years of experience in intelligence collection, analysis, and production, with a focus on business risk and security. Excellent written and verbal communication skills in English, and fluency in at least one regional language. Membership in professional intelligence or security organizations, such as ASIS, ATAP, AIRIP, or Analysts' Roundtable preferred. Additional Information Work Environment/Physical Requirements This position is moderately self-directed and requires understanding and compliance with company policies, procedures, and values. The position works in an on-site office environment utilizing a computer and standard office equipment. While performing the duties of this job, the employee is regularly required to interact collaboratively with the team and stakeholders, and communicate via phone, videophone, or text messaging. The employee may be required to occasionally lift and/or move up to 20 pounds. The position may require travel up to 5%. Benefits Salary Range: $125,000 to $145,000 401(k) up to 5% matching Medical/Dental/Vision Basic Life and AD&D Insurance Long Term/Short Term Disability PTO: 160 hours (20 days) accrued per year Sick: 80 hours sick time front loaded 10 Holidays Employee Assistance Program and Employee Discount Program Interview Process Initial call with our Talent Acquisition team member Timed written assessment (arranged at the time that suits you) to test writing and analytical capability Panel interview with some of the team members and hiring managers at Sibylline Meet and Greet with the client Research indicates that certain groups are less likely to apply for a position unless they meet every single requirement. If you feel you meet some of the requirements and can offer a unique perspective to this role, we strongly encourage you to apply-you might be the perfect fit we're looking for! Sibylline is committed to the recruitment and selection of candidates without regard for sexual orientation, gender, ethnicity, age, political beliefs, culture, and lifestyle. We are committed to fostering a business culture that reflects these values and promotes equal opportunity.
    $125k-145k yearly 18d ago
  • Senior Cyber Threat Intelligence Analyst

    Valiant Solutions 4.2company rating

    Remote job

    Valiant Solutions is seeking a Senior Cyber Threat Intelligence Analyst to join our rapidly growing and innovative cybersecurity team! Named one of the Best Places to Work in the Washington DC area for 11 consecutive years, Valiant is proud of our employee-centric culture and commitment to excellence. If you are interested in learning more about Valiant and this opportunity, we invite you to apply now! This position allows for 100% remote work. Remote work necessitates a high level of trust in our employees, and we strictly adhere to the details found below in our Remote Work Policy. U.S. Citizenship is required due to federal contract obligations, along with the ability to successfully pass a federal background investigation. Required Experience 8 years' experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs). 8 years' experience in collecting and aggregating threat intelligence from various sources, such as open-source intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization. 8 years' experience in producing high-quality written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization. 5 years working in an office environment with technical IT personnel. 5 years of experience with Microsoft Office Tools such as Word, PowerPoint, Excel, and OneNote 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools. Bachelor's degree in Cybersecurity is preferred Security + is required, and Network + or equivalent is preferred Responsibilities Conduct in-depth analysis of cyber threats-including malware, phishing campaigns, and other attack vectors-to identify patterns, indicators of compromise (IOCs), and adversary tactics, techniques, and procedures (TTPs). Aggregate and evaluate threat intelligence from diverse sources such as open-source intelligence (OSINT), dark web forums, and commercial feeds to identify relevant and actionable insights for the organization. Produce high-quality written reports, executive briefings, and presentations to effectively communicate threat intelligence assessments and recommendations to technical teams and leadership stakeholders within 24 hours or sooner of the request. Collaborate closely with IT personnel in a dynamic office environment to support proactive threat identification, risk mitigation, and incident response efforts. Utilize cybersecurity tools and platforms-including Threat Intelligence Platforms (TIPs), Security Information and Event Management (SIEM) systems, and malware analysis tools-to conduct threat research and enrich investigative findings. (e.g. Mandiant Threat Intelligence) Map TTPs to the MITRE ATT&CK framework to aid in correlation to attack vendors with specific threat actors. Maintain proficiency with Microsoft Office tools (Word, PowerPoint, Excel, and OneNote) for drafting reports, visualizing data, and delivering professional-grade documentation. Utilize SharePoint to efficiently manage, organize, and share documents, collaborate on team projects, and track tasks in a user-friendly environment. Support the continuous improvement of threat intelligence processes and capabilities in alignment with cybersecurity best practices and organizational goals. Leverage a strong foundational knowledge in cybersecurity, supported by industry certifications such as Security+ (required) and Network+ (preferred), to inform threat assessments and strategic planning. Must be a team player and have a proven track record of being able to collaborate with other cybersecurity teams. About Valiant Solutions Valiant Solutions is a security-focused IT solutions provider with public clients nationwide. Named one of the fastest growing privately held companies by Inc. 5000, Washington Technology's Fast 50, and Washington Business Journal's Best Places to Work in the D.C. area, Valiant Solutions prides itself on providing its employees with great benefits and career development opportunities. As a company, we are just as committed to growing careers as we are to building world-class IT solutions, all while enjoying an unparalleled work-life balance. We are in a phase of tremendous growth and building the team that will take us to the next level. We seek people whose talents and accomplishments will contribute to a thriving company, who have the character to support their capacity, and can make a positive impact on our culture. Alongside our talented team, you'll learn to think quickly on your feet and expand your own personal and professional skill set. Our management team will inspire you to consider new perspectives and challenge you to become a better practitioner in the fast-paced industry of IT security. We hire people we respect - and we trust them to deliver results leveraging their expertise. If you would enjoy working in a dynamic environment as part of a stellar team of professionals, then we invite you to apply online today. Benefits Snapshot (includes, but not limited to) Valiant pays 99% of the Medical, Dental, and Vision Coverage for Full-time Employees Valiant contributes 25% towards Health Coverage for Family and Dependents 100% Paid Short Term Disability and Life Insurance Policy for Full-time Employees 100% Paid Certifications 401K Matching up to 4% Paid Time Off Paid Federal Holidays Paid Time On - 40 hours to pursue innovation Wellness & Fitness Program Valiant University - Online Education and Training Portal Reimbursement for Public Transit and Parking FSA programs for: Medical Costs, Dependent Care, Transit, and Parking Referral Bonuses The salary range for this position is a general guideline and not a guarantee of compensation or salary. It has been benchmarked in relation to the scope of the role, market rate, and internal equity. The salary for this role is expected to be in the $135,000 - $149,000 range. Where a candidate falls within the band can be determined based on one or more of the following: skillset, experience level, achievements, education, geographic location, security clearance, involvement in corporate tasks, and other non-discriminatory factors. In addition to the base salary, this role will include benefits as described above. Valiant reserves the right to adjust the salary range, experience requirements, and position responsibilities at any time without prior notice. Remote Work Policy Remote work necessitates a high level of trust in our employees. To ensure that employee performance does not suffer in a remote work environment, all employees who telecommute are expected to have a quiet and distraction-free workspace with adequate internet, dedicate their full attention and availability to their job duties during working hours, and maintain a schedule during core business hours that align with those of their coworkers and Valiant's clients. In alignment with Valiant's inclusive and engaging environment, cameras are encouraged and can be required to be on during virtual video conferences. Additionally, in alignment with the Office of the Inspector General's effort to eliminate conflicting employment, all Valiant employees are required to disclose any current or future outside employment engagements. During onboarding and throughout employment, employees must disclose any current activities or intent to engage in outside employment or other professional activities and obtain written approval. Employees may not solicit or conduct any outside business during core business hours for Valiant Solutions and our clients. Equal Employment Opportunity Valiant Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, genetic information, marital status, or veteran status, in accordance with applicable law. Physical Demands Sitting or standing at a desk for prolonged periods of time and consistent operation of a computer. Frequent communication and exchanging of accurate information via electronic communication, phones, and in person. Occasionally lift and/or move moderate amounts of weight, typically less than 20 pounds. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of the job. Authorization to Share Resume and Personal Information By submitting your resume for this position, you authorize Valiant Solutions to share your resume, as well as, personal information included on the resume, with its subsidiaries, affiliates and teaming partners for the purpose of considering you for this position and other available positions requiring comparable skills, education and experience. Should Valiant Solutions or its affiliates and teaming partners wish to initiate pre-employment discussions, you will be asked to complete an employment application and related employment documents. #LI-JM1
    $135k-149k yearly Auto-Apply 2d ago
  • Sr. Cyber Threat Intelligence Analyst

    Cfocus Software Incorporated

    Remote job

    Job DescriptioncFocus Software seeks a Senior Cyber Threat Intelligence Analyst to join our program supporting AOUSC. This position is fully remote. This position requires active Public Trust clearance. Qualifications: 8 years' experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs). 8 years' experience in collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization. 8 years' experience in producing high-quality written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization. 5 years working in an office environment with technical IT personnel. 5 years of experience with Microsoft Office Tools such as Word, PowerPoint, Excel, and OneNote 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools. Bachelor's degree in Cybersecurity preferred Security + is required and Network + or equivalent is preferred Duties: Identify emerging cyber threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds. Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks. This includes analyzing malware samples, phishing emails, and other threat artifacts to understand threat actor TTPs. Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner. Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies. Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies. Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis, helping to prioritize security investments and initiatives to mitigate emerging threats effectively. Provide mentorship, guidance, and training to other contractor's employees, including sharing knowledge and best practices to build a skilled and cohesive cyber threat intelligence team. Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities. Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities based on threat intelligence data, enabling informed decisions on patching and remediation efforts. Provide written recommendations on Government drafts of executive summaries and briefings. Provide recommendations and input on other content and presentations. Incorporate data from Mandiant, federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies. Examine malware samples from diverse sources using reverse engineering techniques to uncover capabilities, origins, and threat actor methodologies. Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms. Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time. Powered by JazzHR 8Z3HT7Xj9P
    $77k-107k yearly est. 21d ago
  • Research Data Intelligence Analyst (Epic Clarity/Caboodle) - Remote

    Cedars-Sinai 4.8company rating

    Remote job

    **Grow your career at Cedars-Sinai!** The Enterprise Information Services (EIS) team at Cedars-Sinai understands that true clinical transformation and the optimization of a clinical information systems implementation is fueled through the alignment of the right people, processes, and technologies. **Why work here?** Cedars-Sinai placed in the top 20 on Newsweek's " World's Best Smart Hospitals 2024 " list, which highlights hospitals that have excelled in the utilization of electronic functionalities, telemedicine, digital imaging, artificial intelligence and robotics. The organization's Healthtech excellence was acknowledged again, this time by the esteemed " CHIME Digital Health Most Wired " recognition program. Cedars-Sinai was assigned a Level 10-the most prestigious level of certification-among more than 300 surveyed healthcare organizations. Cedars-Sinai netted high scores across multiple verticals and particularly excelled in areas of infrastructure, interoperability, and population health innovation. **What will you be doing in this role:** The Research Data Intelligence Analyst role is heavily focused on reporting, with a primary responsibility for delivering accurate, timely, and high-quality reports that support researchers conducting both prospective and retrospective studies. Analysts will work extensively with Epic's Clarity and Caboodle data models, producing multiple large scale reports each week and managing datasets ranging from hundreds of thousands to millions of records. Because this work involves sensitive patient information, the role requires strict adherence to HIPAA and PHI privacy standards as well as a strong attention to detail to ensure data integrity and compliance. The position also involves intermediate level design, build, and implementation of reporting solutions, applying operational knowledge to translate research needs into reliable, functional outputs. In addition to reporting, the analyst provides support for research applications such as REDCap, OnCore, I2B2, OMOP, and DEEP6, and assists end users through training, troubleshooting, and client interactions. + Deliver accurate, timely, and high-quality reports using Epic's Clarity and Caboodle data models, often working with datasets ranging from hundreds of thousands to millions of records. + Ensure all reporting adheres to HIPAA and PHI requirements, maintaining strict data privacy and integrity standards. + Translate research and operational requirements into actionable reporting solutions, working closely with researchers and stakeholders to meet study needs. + Provide support for research applications such as REDCap, OnCore, I2B2, OMOP, and DEEP6, including troubleshooting and user assistance. + Assist researchers and staff through training, hands-on guidance, and client support interactions. + Contribute to the design, build, and implementation of reporting tools and data solutions, applying knowledge of applications and workflows. **Qualifications** **Experience Requirements:** Three (3) plus years of experience in Epic Clarity and Caboodle data models, research data extraction, report delivery, grant support, and application support. Solid grasp of SQL experience. **Educational Requirements:** High School Diploma/GED. Bachelor's degree in Computer Sciences, Mathematics, or related subject area. (preferred) Epic Clarity and/or Caboodle Certifications highly preferred. \#LI-Remote **Req ID** : 11582 **Working Title** : Research Data Intelligence Analyst (Epic Clarity/Caboodle) - Remote **Department** : Research Data Services **Business Entity** : Cedars-Sinai Medical Center **Job Category** : Information Technology **Job Specialty** : Bus Intelligence/Reporting **Overtime Status** : EXEMPT **Primary Shift** : Day **Shift Duration** : 8 hour **Base Pay** : $96,324.80 - $154,128 Cedars-Sinai is an EEO employer. Cedars-Sinai does not unlawfully discriminate on the basis of the race, religion, color, national origin, citizenship, ancestry, physical or mental disability, legally protected medical condition (cancer-related or genetic characteristics or any genetic information), marital status, sex, gender, sexual orientation, gender identity, gender expression, pregnancy, age (40 or older), military and/or veteran status or any other basis protected by federal or state law.
    $96.3k-154.1k yearly 60d+ ago
  • Creative Writing Intelligence Analyst

    Openjobs

    Remote job

    Were recruiting Creative Writers for research projects with leading AI labs. These projects will involve you using your own writing style and taste to complete a variety of writing tasks. Sample tasks include writing novel content such as speeches, dialogues, narratives etc. and critiquing AI-generated literature. Job vacancy link: **************************** You are a good fit if you: Have experience in one of the following domains: Writing fiction, poetry or screenplays Working as a columnist, critic or opinion writer Speechwriting/ghostwriting Marketing with Social Media or Branding experience Details about the role: Pay is $35-50/hr Expect 15-20 hours of work per week The work is fully remote and asynchronous so you can do it around your schedule Job vacancy link: ****************************
    $35-50 hourly 60d+ ago
  • Senior Threat Intelligence Analyst

    Allstate 4.6company rating

    Remote job

    At Allstate, great things happen when our people work together to protect families and their belongings from life's uncertainties. And for more than 90 years our innovative drive has kept us a step ahead of our customers' evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection. Job Description The Senior Threat Intelligence Analyst will be responsible for supporting the monitoring, collection, analysis, reporting, and assessment of impact for threat related data from vendors, internal sources, and open-source intelligence. Leveraging threat severity and risk, this individual will help drive timely reporting and mitigation by partnering with Incident Handling / Incident Response, Threat Hunting, Vulnerability Management, other departments within Allstate Information Security, and system/application owners. The role will be accountable for helping to research and compile reports and data on the state of the threat landscape and presenting that data to multiple levels of leadership.Key Responsibilities Act as a threat intelligence SME in at least one of the following areas: malware analysis, exploit/vulnerability analysis, Advanced Persistent Threats (APTs), digital forensics, incident handling, cybercrime. Support the Threat Management process providing guidance on improvements that can be made to the identification, assessment, and mitigation of threats to the environment. Collect, analyze, and assess technical (IOCs) and non-technical (HUMINT) threat, vulnerability, and security incident-related information made available from platform vendors, 3rd parties, and internal sources to help determine course of action for the Allstate environment. Partner with other security professionals to determine and implement mitigating controls. Generate ad-hoc and scheduled briefs, reports, whitepapers, and presentations on threats and associated activities necessary to protect the environment. Job Qualifications 5+ years' experience in either threat management, security assurance, or related field. Familiar with industry standard security best practices and threat management processes including technical and non-technical reporting. Experience with threat research, threat indicator sharing (such as STIX/TAXII), vulnerability scanning tools (such as Qualys) and other security tools. Good knowledge of operating systems security (Windows, *nix). Understanding of secure network/systems configuration management. Understanding of networking concepts and devices (Firewalls, Routers, Switches, Load Balancers, etc.). Experience programming and scripting. Able to effectively work independently and in a team environment. Able to interact with all levels of management, business, and IT, and is required to act in a professional and confident manner. Self-motivator possessing a high sense of urgency and a high level of integrity. Excellent analytical and problem-solving skills. Excellent communication (oral, written, presentation), interpersonal and consultative skills. Experience with GRC tools such as Archer, and Threat Intel' tools such as ThreatConnect, helpful but not required. Bachelor's degree in Information Systems or related field preferred. Certifications: Obtained certifications in one or more of the following, or relevant experience: GIAC, GCTI, GCIH, CEH, CISSP, CISA. #LI-JJ1 Skills Advanced Persistent Threats (APT), Cybercrime Investigation, Cyber Threat Intelligence, IT Problem Solving, Malware Analysis, Network Security, Scripting, Technical Writing, Threat Management, Vulnerability Scanning Compensation Compensation offered for this role is $70,500.00 - 124,125.00 annually and is based on experience and qualifications. The candidate(s) offered this position will be required to submit to a background investigation. Joining our team isn't just a job - it's an opportunity. One that takes your skills and pushes them to the next level. One that encourages you to challenge the status quo. One where you can shape the future of protection while supporting causes that mean the most to you. Joining our team means being part of something bigger - a winning team making a meaningful impact. Allstate generally does not sponsor individuals for employment-based visas for this position. Effective July 1, 2014, under Indiana House Enrolled Act (HEA) 1242, it is against public policy of the State of Indiana and a discriminatory practice for an employer to discriminate against a prospective employee on the basis of status as a veteran by refusing to employ an applicant on the basis that they are a veteran of the armed forces of the United States, a member of the Indiana National Guard or a member of a reserve component. For jobs in San Francisco, please click “here” for information regarding the San Francisco Fair Chance Ordinance. For jobs in Los Angeles, please click “here” for information regarding the Los Angeles Fair Chance Initiative for Hiring Ordinance. To view the “EEO is the Law” poster click “here”. This poster provides information concerning the laws and procedures for filing complaints of violations of the laws with the Office of Federal Contract Compliance Programs To view the FMLA poster, click “here”. This poster summarizing the major provisions of the Family and Medical Leave Act (FMLA) and telling employees how to file a complaint. It is the Company's policy to employ the best qualified individuals available for all jobs. Therefore, any discriminatory action taken on account of an employee's ancestry, age, color, disability, genetic information, gender, gender identity, gender expression, sexual and reproductive health decision, marital status, medical condition, military or veteran status, national origin, race (include traits historically associated with race, including, but not limited to, hair texture and protective hairstyles), religion (including religious dress), sex, or sexual orientation that adversely affects an employee's terms or conditions of employment is prohibited. This policy applies to all aspects of the employment relationship, including, but not limited to, hiring, training, salary administration, promotion, job assignment, benefits, discipline, and separation of employment.
    $70.5k-124.1k yearly Auto-Apply 60d+ ago
  • Supervisor, Fraud Intelligence

    Velera Solutions

    Remote job

    Join the People Helping People Velera is the nation's premier payments credit union service organization (CUSO) and an integrated fintech solutions provider. The company serves more than 4,000 financial institutions throughout North America, operating with velocity to help our clients keep pace with the rapid momentum of change and fuel growth in the new era of financial services. Our purpose: We accelerate partners' success through innovative financial technology solutions and inspired service. The Opportunity: The Supervisor, Fraud Intelligence leads a team responsible for executing and enhancing fraud strategy programs, including account takeover and fraud intelligence initiatives. This role is responsible for managing risk across multiple payment vectors for all client portfolios and guiding the intelligence & fraud strategy development to mitigate risk to Velera's clients. The supervisor provides strategic direction, oversees anti-fraud activities, and ensures actionable analytics & intelligence is delivered to address critical fraud issues impacting credit unions. Day in the Life: Supervise daily activities of Fraud Intelligence & Account Takeover Analysts. Lead, mentor, and develop a team of fraud analysts and risk specialists, fostering a culture of excellence, innovation, and collaboration. Facilitate team meetings and 1 on 1s with team members to ensure performance and productivity in line with department goals Oversee the execution of fraud detection, intelligence, and account takeover mitigation activities across multiple channels and platforms including digital payments, authorizations, and shared branch. Identify emerging risk across any Velera channel and develop risk strategies and processes to mitigate fraud Works cross-departmentally and internally with Risk Solution teams to ensure proper controls are in place to mitigate risks in an omni channel environment. Guide the team in conducting research and analysis on global fraud threats, trends, and patterns, and in transforming data into actionable insights. Ensure high-quality, actionable intelligence products are developed and delivered to fraud analyst and leaders across the organization Set strategic priorities for fraud analytics, ensuring alignment with organizational goals and regulatory requirements. Review and approve complex fraud strategies, rules, and analytical approaches for identifying and mitigating fraud and account takeover risks. Oversee the development and implementation of fraud analytics data standards and recommend improvements for current and future needs. Ensure effective communication between staff, management, vendors, and technology resources. Monitor team performance, manage multiple projects, and ensure timely completion of deliverables. Maintain confidentiality and ensure compliance with all relevant policies and regulations. Perform other duties as assigned. Qualifications: Five (5) years experience or relevant combination of education and experience in a financial risk management or fraud analytics position required. Minimum 3 years prior lead or supervisory experience required. Experience in Lucene, Python, and Elasticsearch/Kibana knowledge preferred. Experience using and implementing new technical tools for analytical program improvements. Experience designing and implementing complex fraud strategies preferred. Experience in rule writing, strategy creation and trend analysis utilizing cutting edge technology. Education: Bachelor's Degree in Computer Science, Computer Engineering, Cybersecurity, or related discipline or equivalent combination of education and experience required. About Velera At Velera we are committed to fostering a workplace where every employee feels valued, respected, and connected. We understand, attract and engage a diverse workforce where every employee can live up to their full potential; ensuring that our employee base reflects the consumers we serve. The result of this effort is an inclusive environment where diverse talent thrives. We strive to foster a safe and inclusive work environment for people to bring their authentic selves in order to build a better community within our company and with our partners. Learn more about our commitment to Diversity, Equity, and Inclusion HERE! Pay Equity $82,700.00 - $105,400.00 Actual Pay will be adjusted based on experience and other job-related factors permitted by law. Great Work/Life Benefits! Competitive wages Medical with telemedicine Dental and Vision Basic and Optional Life Insurance Paid Time Off (PTO) Maternity, Parental, Family Care Community Volunteer Time Off 12 Paid Holidays Company Paid Disability Insurance 401k (with employer match) Health Savings Accounts (HSA) with company provided contributions Flexible Spending Accounts (FSA) Supplemental Insurance Mental Health and Well-being: Employee Assistance Program (EAP) Tuition Reimbursement Wellness program Benefits are subject to generally applicable eligibility, waiting period, contribution, and other requirements and conditions Velera is an Equal Opportunity Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state or local law. Velera is an Equal Opportunity Employer that complies with the laws and regulations set forth in the following "EEO is the Law" Poster . Velera will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the legal duty to furnish information. Velera is an E-Verify Employer. Review the E-Verify Poster here . For information regarding your Right To Work, please click here . This role is currently not eligible for sponsorship. As an ongoing commitment to reasonably accommodate individuals with disabilities please contact a recruiter at ********************* for assistance.
    $82.7k-105.4k yearly Auto-Apply 7d ago
  • Senior Cyber Threat Intelligence Analyst

    Punch Cyber Analytics Group 3.8company rating

    Remote job

    About PUNCH: We're problem solvers first & foremost . PUNCH's origin story involves frustration with available INFOSEC tools and techniques-we came up thru the industry using these inefficient tools and techniques and decided there had to be a better way. We bring this laser focus on efficiency to every customer engagement. We have trust as a hallmark in everything we do . PUNCH provides its team members with the maximum amount of ownership over their careers, the direction of the company, and the flexibility & freedom to accomplish their job without interference. Trust requires accountability; we live that, company-wide. We back each other up . PUNCH is a supportive place to work. We've worked hard to create an environment that makes people better, encourages team work, and rewards a “pitch in” mentality. We give back. To those in need. To the community. To the industry. Does this sound like you? In this Role You Will: Consult and advise a commercial client with maturing and expanding an established CTI program. Relevant experience includes: Significant experience with analyzing and tracking cyber threats at the strategic, operational and tactical level. Substantial background in developing CTI products and services for Cybersecurity teams, and other portions of an organization, is highly preferred. Experience with evolving CTI out of a traditional security function is a plus. Ability to manage multiple, simultaneous projects while being able to shift priority based on customer need. Comfortability with managing client expectations, and proactively communicating issues to leadership. Proficient at documenting processes and procedures. Capability & willingness to mentor and teach others. Experience with CIRT/SOC security tools and services, as well as Microsoft 365 and Azure ecosystems preferred. Ability to communicate to all Levels of an Organization and Technical Backgrounds. Previous experience within Healthcare industries is a plus. Strong preference for prior all-source analysts with cybersecurity experience Key Requirements: 5+ years of diverse corporate and/or government cybersecurity experience. Familiarity with Microsoft 365, Azure, and services within the Microsoft ecosystem. Proven management/mentoring experience. Must Haves: Significant strategic, operational and tactical intelligence experience within a corporate environment. Experience within the Microsoft Azure ecosystem. Remote work is available with this position.
    $61k-85k yearly est. 60d+ ago
  • Intelligence Analyst - RFI Triage (Remote, East Coast)

    Crowdstrike 3.8company rating

    Remote job

    As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn't changed - we're here to stop breaches, and we've redefined modern security with the world's most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We're also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We're always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you. About the Role: CrowdStrike Counter Adversary Operations, a core component of CrowdStrike, is seeking an Intelligence Analyst for its Analytical Support Team (AST) to support daily intelligence production and the development of customer Requests for Information (RFIs) responses. The Analyst will be required to write custom RFI responses using a variety of sources. This position is instrumental in supporting internal intelligence teams and CrowdStrike's Intelligence customers by producing and developing written RFI responses. Am I an RFI Triage Intelligence Analyst? Do you love working in a fast-paced environment where you handle multiple, competing deadlines? Do you like working with customers and interacting with numerous teams to answer intelligence questions? Do you crave new and challenging work that varies day-to-day? What You'll Do: Triage, scope, and respond to CrowdStrike Intelligence customer RFIs Identify relevant context such as priority intelligence requirements (PIR) or organizational threat profiles to fully interpret customer RFIs. Proactively collect and synthesize large amounts of information to identify relevant and actionable intelligence and statistics summaries to address customers' RFIs on cyber threats, trends, and new developments. Collaborate and coordinate with numerous intelligence teams and Subject Matter Experts (SMEs) using a variety of raw and processed data sources for RFIs responses and reviews Support leadership and content management by compiling statistics on customer composition and readership, as needed Identify areas and gaps for process improvements and trend analysis in AST, as needed. What You'll Need: Candidates must be consistent, highly organized self-starter with 3+ years applied experience with: Intelligence Tradecraft: knowledge of Intelligence tradecraft, analysis, and terminologies. Intelligence Writing: applied knowledge of the Intelligence writing process and structure including scoping, responding to customer RFI responses, and writing supporting evidence to produce quality finished intelligence products with minimal assistance. Collaboration: An enthusiasm for collaboration, including being comfortable working in a team-oriented environment as well as across multiple teams to leverage SMEs. Successful candidates will have experience in Research: Ability to demonstrate comprehensive, practical knowledge of research, collection skills, and analytic intelligence tradecraft methodology. Research management skills to organize numerous research leads and sources is essential. Excellent time management skills, including prioritizing, scheduling, and adapting as necessary to multiple, competing deadlines. OSINT/Data Collection: Experience in assessing, interpreting, and vetting multiple data sources for relevance, reliability, and credibility including open-source regional media sources, network/endpoint telemetry, and other raw data sources. Ability to produce statistics/metrics to identify and demonstrate adversarial and targeting trends. Cyber Threat Intelligence experience: Familiarity and understanding of cyber threat intelligence and technical terminology/tooling explaining tactics used by threat actors including MITRE ATT&CK TTPs, IOCs/IOAs. Applied knowledge of actor kill chains and customer implications. Project Management experience: Strong project management skills with the ability to communicate RFI findings in writing to various customer stakeholders; ability to effectively communicate RFI tasks, guidance, and methodology with internal teams. Bonus Points: Understanding of contemporary scripting languages that can be used for task automation. Experience using Jira, Elasticsearch, Kibana, and Salesforce. #LI-Remote #LI-AO1 Benefits of Working at CrowdStrike: Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified™ across the globe CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program. CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at ************************** for further assistance. Find out more about your rights as an applicant. CrowdStrike participates in the E-Verify program. Notice of E-Verify Participation Right to Work CrowdStrike, Inc. is committed to fair and equitable compensation practices. Placement within the pay range is dependent on a variety of factors including, but not limited to, relevant work experience, skills, certifications, job level, supervisory status, and location. The base salary range for this position for all U.S. candidates is $85,000 - $120,000 per year, with eligibility for bonuses, equity grants and a comprehensive benefits package that includes health insurance, 401k and paid time off. For detailed information about the U.S. benefits package, please click here. Expected Close Date of Job Posting is:01-24-2026
    $85k-120k yearly Auto-Apply 13d ago
  • Senior Intelligence Analyst (Capabilities Developer)

    Zscaler 4.4company rating

    Remote job

    Zscaler accelerates digital transformation so our customers can be more agile, efficient, resilient, and secure. Our cloud native Zero Trust Exchange platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Here, impact in your role matters more than title and trust is built on results. We believe in transparency and value constructive, honest debate-we're focused on getting to the best ideas, faster. We build high-performing teams that can make an impact quickly and with high quality. To do this, we are building a culture of execution centered on customer obsession, collaboration, ownership and accountability. We value high-impact, high-accountability with a sense of urgency where you're enabled to do your best work and embrace your potential. If you're driven by purpose, thrive on solving complex challenges and want to make a positive difference on a global scale, we invite you to bring your talents to Zscaler and help shape the future of cybersecurity. The Red Canary Intelligence Team conducts in-depth analysis to provide context and help prioritize where to focus detection and response efforts. As a key contributor, you will investigate raw telemetry, analyze suspicious and confirmed threats, and conduct open-source research to associate activity with known adversaries. A significant focus is on modeling and analyzing in the Synapse graph database. Curiosity, adaptability, and a passion for addressing evolving threats will be vital for success in this dynamic, mission-driven team. We're looking for an experienced Senior Intelligence Analyst to join our Intelligence team. Reporting to the Senior Manager, Intelligence, you'll be responsible for: Utilizing Synapse and Storm Query Language for data modeling and analytic workflows while identifying opportunities for additional analytic solutions and contributing to automation and tool building in Synapse Investigating telemetry to identify new activity clusters based on analysis of malicious and suspicious behaviors and activity observed across our customer base Conducting open and closed source research to analyze threat patterns and trends and write actionable intelligence products to customers and the community to communicate TTPs, detection coverage, and remediation strategies Actively engaging with internal teams, external partners, customers, and the infosec community to share knowledge and enhance collaboration Validating Red Canary's endpoint, cloud, and identity detection coverage against the continuously evolving threat landscape and identify unique or emerging threats to build detection coverage for. Recommending solutions to visibility gaps in telemetry and data sources. What We're Looking for (Minimum Qualifications) Strong analytical and problem-solving skills, including the ability to synthesize complex and contradictory information, specifically through utilizing graph databases, or with query languages and data platforms such as SQL, Splunk, Elasticsearch, or Synapse Storm Knowledge of cyber threat intelligence concepts including attribution, group naming, making assessments, and pivoting. Familiarity with the mechanics of attack behaviors and MITRE ATT&CK Experience tracking adversaries, including threat groups, activity groups, or malware families, and ability to differentiate unique and shared characteristics of clusters Outstanding communication skills, both written and verbal, including the ability to communicate technical concepts in a clear, succinct fashion to subject matter and non-subject matter experts alike Experience in Intelligence, Security Operations Center (SOC), Digital Forensics and Incident Response (DFIR), or other security-focused roles What Will Make You Stand Out (Preferred Qualifications) Proven leadership mentoring team members and contributing to the development of intelligence analysis expertise. Experience in capabilities development, threat hunting, endpoint telemetry analysis, and/or Detections Development. Experience with software development in C#, Python, Ruby, or similar languages. #Remote #LI-DB1 Zscaler's salary ranges are benchmarked and are determined by role and level. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations and could be higher or lower based on a multitude of factors, including job-related skills, experience, and relevant education or training. The base salary range listed for this full-time position excludes commission/ bonus/ equity (if applicable) + benefits. Base Pay Range$119,000-$170,000 USD At Zscaler, we are committed to building a team that reflects the communities we serve and the customers we work with. We foster an inclusive environment that values all backgrounds and perspectives, emphasizing collaboration and belonging. Join us in our mission to make doing business seamless and secure. Our Benefits program is one of the most important ways we support our employees. Zscaler proudly offers comprehensive and inclusive benefits to meet the diverse needs of our employees and their families throughout their life stages, including: Various health plans Time off plans for vacation and sick time Parental leave options Retirement options Education reimbursement In-office perks, and more! Learn more about Zscaler's Future of Work strategy, hybrid working model, and benefits here. By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines. Zscaler is committed to providing equal employment opportunities to all individuals. We strive to create a workplace where employees are treated with respect and have the chance to succeed. All qualified applicants will be considered for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status, or any other characteristic protected by federal, state, or local laws. See more information by clicking on the Know Your Rights: Workplace Discrimination is Illegal link. Pay Transparency Zscaler complies with all applicable federal, state, and local pay transparency rules. Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support.
    $119k-170k yearly Auto-Apply 2d ago
  • Pharmacy Data Intelligence Analyst

    BHS 4.3company rating

    Remote job

    The Pharmacy Data Intelligence Analyst plays a crucial role in analyzing pharmacy data to improve efficiency, reduce costs, and ensure medication safety. This role gathers and analyzes data to identify areas for improvement in pharmacy-related services and operations. The Pharmacy Data Intelligence Analyst will collaborate with pharmacy team and management across various settings to promote new opportunities for the organization and assist with implementing new solutions based on data findings. This role will monitor federal policy developments related to the Inflation Reduction Act and emerging 340B program reforms, assessing potential impacts on eligibility, reimbursement, contract pharmacy models, and manufacturer restrictions. The Pharmacy Data Intelligence Analyst develops data-driven strategies and mitigation plans to help the organization adapt to future 340B shifts, including forecasting financial exposure, modeling operational adjustments, and informing executive-level decision making. This role supports the growth of the Home Infusion Pharmacy service line by developing analytics that monitor referral trends, onboarding throughput, therapy mix, reimbursement performance, and patient outcomes. The Pharmacy Data Intelligence Analyst partners with nursing, pharmacy, and operational leaders to build scalable reporting and forecasting models that guide home infusion capacity planning, financial sustainability, and market expansion opportunities. Job Description: Baptist Health is looking for a Pharmacy Data Intelligence Analyst. This is a remote opportunity for residents of KY or IN. Gather and integrate data from disparate healthcare data sources (e.g., electronic health records, claims data, financial data). Clean, validate, and prepare data for analysis ensuring data accuracy and consistency by correcting errors, handling missing values, and standardizing formats. Perform statistical analysis and modeling to identify trends, patterns, and correlations within healthcare data. Translating and summarizing complex data into clear, concise, and actionable insights for non-technical audiences. Develop and maintain data visualizations (e.g., dashboards, reports) to effectively communicate findings to stakeholders. Compile analyzed data into a structured report tailored for a specific audience. Present data in a visually appealing and easy-to-understand way using charts, graphs, tables, or dashboards. Generate patient data to provide a deep knowledge of patient dynamics in real-world settings and create personalized solutions to improve care. Collaborate to understand data needs and create comprehensive data maps to integrate data from a variety of sources within the EHR. Analyze patient data from various sources (e.g., electronic health records, patient satisfaction surveys, claims data) to identify trends, patterns, and areas for improvement. Conduct root cause analysis to identify factors contributing to poor patient outcomes. Collaborate with clinical services and patient care services to identify patient population and associated disease states and correlate data points for better patient outcomes. Collaborate with physicians, nurses, and other healthcare professionals to understand patient medication needs and challenges. Participate in improvement initiatives and develop data extracts needed to identify weakness and opportunities that will enhance patient satisfaction and outcomes. Assist Director of Pharmacy Outcomes and Data Management to generate insightful reports and presentations to communicate complex data analysis to both technical and non-technical audiences. Incorporate industry benchmarks to illustrate baseline metrics and current state when publishing charts, graphs, pivot tables and other diagrams. Collaborate with pharmacists and healthcare professionals to identify and address data-driven opportunities. Collaborate with pharmacy compliance specialists and pharmacy leadership to investigate identified compliance issues and safety risks. Provide 340B program compliance reports for qualified patients, drugs, providers, vendors, payers, and locations. Publish quality analytics to include weekly or monthly dashboards, productivity, ad-hoc projects, and/or KPI used by directors and managers to improve processes and maintain a pulse of daily operations. Analyze pharmacy financials and utilization data to identify cost-saving opportunities and optimize medication spending. Assist with contract compliance and identification of revenue and savings opportunities. Support Pharmacy and Therapeutics Committee functions by providing financial data to be used in the drug evaluation process. Provide data for accurate pharmacy budgets, forecasting future expenses based on historical data, medication utilization patterns, and anticipated changes in patient population or treatment protocols. This includes analyzing budget variances and providing regular reports to pharmacy leadership to ensure fiscal responsibility. Minimum Experience Required Bachelor's degree in Information Technology, Business Management, Finance, Accounting, or Hospital Administration preferred. Minimum 4 years of Data science or programming experience in lieu of degree. Advanced certifications or AS plus 1 year experience in lieu of degree. Direct experience in data analysis and/or health care planning background is preferred. Excellent Benefits Package 5 days of Paid Time Off available for use upon hire (full-time) PTO Sell Back Program Compassionate Leave Sharing Program (PTO Donation) Company paid Maternity and Paternity Leave Bereavement Leave (includes pets) Employee Support Fund, for employees in need of emergency financial support Retirement plans with company match Company paid Basic Life Insurance & Long-Term Disability Health Insurance, Pharmacy, Dental, Vision and much more! Work Experience Education If you would like to be part of a growing family focused on supporting clinical excellence, teamwork and innovation, we urge you to apply now! Baptist Health is an Equal Employment Opportunity employer.
    $64k-93k yearly est. Auto-Apply 5d ago
  • Intelligence Analyst

    Contact Government Services, LLC

    Remote job

    Intelligence AnalystEmployment Type: Full-Time, Experienced Contact Government Services is hiring an Intelligence Analyst ready to be a member of a dynamic and fast paced intel analysis program for a federal agency supporting the US Government's threat watchlisting and screening mission. As an Intelligence Analyst, you will provide embedded analysis and reach back support to a federal agency and their partners. You will provide multi-source intelligence analysis and fusion that integrates existing national-level products and databases to define patterns of operations. As required, you will interact directly with government leadership and deployed intelligence consumers during the development of intelligence products and ongoing screening operations to meet intelligence requirements across the watchlist enterprise. Duties may include the processing and verification of national security threat actor nominations, data integrity/quality control, encounter management, information sharing, and/or multiple discipline intelligence analysis. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities. Primary Responsibilities Apply complex direction, including standard operating procedures and operations manuals documentation as well as appropriate oral and written guidance received. Communicates clearly and effectively, both orally and in writing, in order to tactfully and persuasively advise and guide executive management relative to a variety of issues which can be delicate in nature; includes making presentations and preparing complete, clear, and concise formal and informal reports, correspondence, briefings, charts, tables, and graphs that are distributed throughout the government and its partner agencies. Conduct research and analysis of data, information, and intelligence to produce a wide range of finished all-source intelligence products. Finished intelligence products shall include standard and non-standard Agency products as well as briefings for the tactical and strategic customers You should be able to provide daily feedback to the team lead. Basic Qualifications The ability to learn the range of pertinent laws, regulations, policies, and precedents which affect the program Effective problem-solving, analytic, written and oral communication skills Capacity to work as part of a team to provide multi-faceted intelligence products and support to operational units and Intelligence Community components Knowledge with Microsoft Outlook applications Ability to work with and engage the customer daily Active Top Secret clearance and eligible for a CI Polygraph Preferred Qualifications Experience working with IC tools and databases Degree in security or intelligence studies with a recommended focus on terrorism or other transnational security threats is highly desired Two to seven years of Experience Familiarity with programs and software such as Palantir, ESRI, Intel Analyst, ETC. Completion certificate from a commercial, military, or US government all source analysis training course or a specialized intelligence career field. Skills and attributes for success:- Drafting and development of technical documentation related to a variety of projects in the IT space. - Work closely with project stakeholders to establish technical processes and procedures. - Document projects through the SDLC. - Provide status reports for multiple ongoing projects and related documentation efforts. - Assist with both user and admin level documentation. Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems. For the past seven years, we've been growing our government-contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work. Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come. We care about our employees. Therefore, we offer a comprehensive benefits package. - Health, Dental, and Vision- Life Insurance- 401k- Flexible Spending Account (Health, Dependent Care, and Commuter)- Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Join our team and become part of government innovation! Explore additional job opportunities with CGS on our Job Board:******************* com/join-our-team/For more information about CGS please visit: ************ cgsfederal. com or contact:Email: info@cgsfederal. com #CJ
    $66k-91k yearly est. Auto-Apply 60d+ ago
  • Lead Revenue Cycle Intelligence Analyst

    Aa067

    Remote job

    Lead Revenue Cycle Intelligence Analyst - (10032391) Description Join the transformative team at City of Hope, where we're changing lives and making a real difference in the fight against cancer, diabetes, and other life-threatening illnesses. City of Hope's growing national system includes its Los Angeles campus, a network of clinical care locations across Southern California, a new cancer center in Orange County, California, and treatment facilities in Atlanta, Chicago and Phoenix. Our dedicated and compassionate employees are driven by a common mission: To deliver the cures of tomorrow to the people who need them today. Position SummaryThe Lead Revenue Cycle BI Strategist serves as a senior analytics expert and thought partner within the Revenue Cycle Intelligence team. This role is responsible for designing, developing, and delivering advanced business intelligence solutions that drive operational excellence, financial performance, and strategic decision-making. The Strategist translates complex data into actionable insights, collaborates with cross-functional teams, and supports enterprise initiatives through predictive modeling, visualization, and performance analytics. ResponsibilitiesDesign and develop advanced dashboards, reports, and analytic tools to monitor and improve revenue cycle performance and strategy. Partner with operational leaders to define KPIs, identify trends, and deliver actionable insights that enhance financial outcomes. Lead data exploration and predictive modeling initiatives to support forecasting, reimbursement optimization, and payer analysis. Ensure accuracy, governance, and consistency of data across reporting platforms and analytics workflows. Mentor and support junior analysts by sharing expertise, fostering development, and providing technical guidance. Collaborate on system implementations, upgrades, and the integration of new data sources into reporting structures. Qualifications QualificationsEducation (Minimum): Bachelor's degree in Health Administration, Business, Finance, or a related field. Experience (Minimum): 5+ years of progressive leadership experience in healthcare revenue cycle, finance, strategy, or performance improvement. Education (Preferred): Master's degree or equivalent advanced degree. Certifications (Preferred): CRCR, CHFP, CPA, Lean Six Sigma, or equivalent. Additional InformationCOH employees may apply for a transfer or promotion to job openings for which they meet the minimum qualifications if they meet the following criteria:Employed at COH in current role for at least one year, unless otherwise stipulated in an applicable collective bargaining agreement. Are in good standing and have no current performance issues. City of Hope employee pay is based on the following criteria: work experience, qualifications, and work location. To learn more about our Comprehensive Benefits, please CLICK HERE. City of Hope is an equal opportunity employer. Primary Location: US-Nationwide-USA-Remote-US-RemoteJob: Accounting/FinanceWork Force Type: RemoteShift: DaysJob Posting: Sep 30, 2025Minimum Hourly Rate ($): 61. 997400Maximum Hourly Rate ($): 99. 196200
    $66k-91k yearly est. Auto-Apply 12h ago
  • Protective Intelligence Analyst - Executive Protection Support

    IO Global 4.2company rating

    Remote job

    Who are we? IOG, is a technology company focused on Blockchain research and development. We are renowned for our scientific approach to blockchain development, emphasizing peer-reviewed research and formal methods to ensure security, scalability, and sustainability. Our projects include decentralized finance (DeFi), governance, and identity management, aiming to advance the capabilities and adoption of blockchain technology globally. We invest in the unknown, applying our curiosity and desire for positive change to everything we do. By fueling creativity, innovation, and progress within our teams, our products and services are designed for people to be fearless, to be changemakers. What the role involves: The Protective Intelligence team seeks a skilled Open Source Intelligence Analyst to provide support for executive movements, travel, and event security. This analyst will play a critical role in ensuring proactive situational awareness, supporting executive protection operations through open-source intelligence (OSINT) monitoring, travel assessments, and threat investigations. The position requires close coordination with Executive Protection (EP) agents, the Security Operations Center (SOC), and corporate leadership to identify, assess, and mitigate risks to executives, facilities, and company interests. Conduct continuous open-source and social-media monitoring to identify threats, hostile activity, or emerging risks targeting executives, events, or company facilities. Analyze online chatter, protest activity, and criminal or extremist indicators to provide timely alerts to the Executive Protection (EP) team and the Security Operations Center (SOC). Produce pre-travel and event intelligence briefs evaluating destination threat environments, including crime, terrorism, unrest, health, and environmental risks. Support EP advance planning by providing intelligence on neighborhoods, routes, and venues; identify areas of concern and recommend mitigation measures. Monitor global and local developments affecting executives while in transit; issue real-time updates on incidents, unrest, or hazards near executive locations. Conduct Person of Interest (POI) investigations to assess intent, capability, and threat level of individuals or groups exhibiting concerning behavior toward executives. Monitor social-media activity along executive travel routes, hotels, and venues to detect localized security concerns or emerging threats. Utilize analytical tools and recognition technologies to identify or confirm potential threat actors in proximity to executive movements. Prepare concise intelligence summaries or advisories highlighting security developments relevant to executive protection operations. Maintain automated travel monitoring and alert systems for active and planned executive travel. Serve as primary intelligence liaison to the EP Detail, ensuring clear information flow, deconfliction, and operational alignment. Develop and track early warning indicators signaling potential escalation or emerging threat activity to enable proactive risk mitigation. Support after-hours or on-call operations during executive travel. Travel domestically or internationally (up to 50%) in support of special assignments or executive movements. Lead monthly global risk assessments focused on security trends, terrorism, civil unrest, and geopolitical volatility affecting executive safety. Requirements Who you are: Required Qualifications Minimum 4 years of experience in intelligence analysis. Strong analytic writing skills with the ability to produce clear and actionable intelligence products. Understanding of OPSEC principles and ethical intelligence practices. Proficiency with commercial intelligence tools and monitoring platforms (e.g., Seerist, Crisis24, Dataminr, Shadow Dragon, Tangles, Ontic, etc). Ability to work in distributed teams and handle sensitive information under confidentiality. Ability to execute responsibilities discreetly and autonomously across diverse international environments and industry sectors. Valid US Passport. Preferred Qualifications Prior experience supporting executive protection, corporate security, or government protection missions. Experience integrating OSINT into operational risk management and travel security planning. Familiarity with protest dynamics, extremist activity, and executive-specific threat behaviours. Ability to operate independently with minimal supervision. Trainings or certifications in OSINT or intelligence analysis. Benefits The base salary for this position has a range of $90 - $100k per year at the commencement of employment. Any offer is determined by overall experience and performance during the interview process. This is only part of the total compensation package. All Employees Remote Working Laptop reimbursement New starter package to buy hardware essentials (headphones, monitor, etc) Learning & Development opportunities US Employees Medical, Dental, and Vision benefits coverage through Anthem for the employee and dependents 401k Health Savings Account Life Insurance At IOG, we value diversity and always treat all employees and job applicants based on merit, qualifications, competence, and talent. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
    $90k-100k yearly Auto-Apply 23d ago
  • Blockchain Intelligence Analyst

    TRM Labs 4.3company rating

    Remote job

    TRM Labs is a blockchain intelligence company committed to fighting crime and creating a safer world. By leveraging blockchain data, threat intelligence, and advanced analytics, our products empower governments, financial institutions, and crypto businesses to combat illicit activity and global security threats. At TRM, you'll join a mission-driven, fast-paced team made up of experts in law enforcement, data science, engineering, and financial intelligence, tackling complex global challenges daily. Whether analyzing blockchain data, developing cutting-edge tools, or collaborating with global organizations, you'll have the opportunity to make a meaningful and lasting impact. As a Blockchain Intelligence Analyst, you will drive TRM's collection, analysis, and reporting on key areas of the crypto economy (e.g., crypto exchanges, fraud). You will ensure that TRM has best-in-class intelligence through your subject matter expertise, first-principles problem solving, and ability to turn data into insights. You will collaborate with an experienced team of engineers, data scientists, and product managers to build scalable systems to detect, prevent, and mitigate cryptocurrency fraud and financial crime. The impact you'll have here: You'll track, analyze, and report on key areas of the crypto economy to detect suspicious activities. Your OSINT skills will help uncover hidden threats and improve our security posture. You'll provide key insights that contribute to real-world action against threat actors. You'll collaborate with data and engineering teams to enhance the TRM product. Your intelligence reports will help law enforcement, internal teams, and clients stay ahead of cyber risks. What we're looking for: Proven experience working in intelligence-related positions previously, ideally in Blockchain Intelligence (This is not an entry-level position). OSINT Expertise - Proficiency in using open-source tools to gather and analyze intelligence. Analytical Skills - Strong ability to synthesize and report complex information clearly and accurately. Experience in Blockchain Analysis - Knowledge of blockchain technologies, with a focus on tracing transactions and identifying malicious activity. Communication & Collaboration - Excellent communication skills to collaborate with cross-functional teams and produce actionable intelligence reports. Ownership - You demonstrate full ownership of your work, taking an 80/20 approach to accomplish objectives. Certifications & Background - Relevant certifications (e.g., GIAC, CEH) and experience in cybersecurity or intelligence gathering. You have the ability to research in another language (Please specify the language(s) in your application). About the team: Our team values open communication and a collaborative work environment, where feedback and ideas are encouraged from all members. We prioritize flexibility and adaptability, ensuring that everyone stays aligned through regular check-ins and progress updates. Operating with a strong focus on shared goals, we work together to meet deadlines while supporting individual growth and innovation. Team members must be available for weekly meetings at 9AM PST and bi-weekly meetings at 8:30AM PST. We require at least 3-4 overlapping hours daily with the Pacific Timezone. Learn about TRM Speed in this position: Utilizes sound judgment and the 80/20 principle to drive rapid, high-impact outcomes. Demonstrates the ability to iterate quickly in response to evolving threat landscapes. Leverages creative problem-solving to ensure prompt and effective threat actor engagement to acquire attribution within 24 hours. Employs a diverse set of methodologies to scale and optimize threat intelligence production for customer needs within 72 hours. Life at TRM Labs Leadership Principles Our Leadership Principles shape everything we do-how we make decisions, collaborate, and operate day to day. Impact-Oriented Trailblazer - We put customers first, driving for speed, focus, and adaptability. Master Craftsperson - We prioritize speed, high standards, and distributed ownership. Inspiring Colleague - We value humility, candor, and a one-team mindset. Accelerate your Career At TRM, you'll do work that matters-disrupting terrorist networks, recovering stolen funds, and protecting people around the world. You will: Work alongside top experts and learn every day. Embrace a growth mindset with development opportunities tailored to your role. Take on high-impact challenges in a fast-paced, collaborative environment. Thrive in a culture of coaching, where feedback is fast, direct, and built to help you level up. What to Expect at TRM TRM moves fast- really fast . We know a lot of startups say that, but we mean it. We operate with urgency, ownership, and high standards. As a result, you'll be joining a team that's highly engaged, mission-driven, and constantly evolving. To support this intensity, we're also intentional about rest and recharge. We offer generous benefits, including PTO, Holidays, and Parental Leave for full time employees. That said, TRM may not be the right fit for everyone. If you're optimizing for work life balance, we encourage you to: Ask your interviewers how they personally approach balance within their teams, and Reflect on whether this is the right season in your life to join a high-velocity environment. Be honest with yourself about what energizes you-and what drains you We're upfront about this because we want every new team member to thrive-not just survive. The Stakes Are Real Our work has direct, real-world impact: Jumping online after hours to support urgent government requests tracing ransomware payments. Delivering actionable insights during terrorist financing investigations. Collaborating across time zones in real time during a major global hack. Building new processes in days, not weeks, to stop criminals before they cash out. Analyzing blockchain data to recover stolen savings and dismantle trafficking networks. Thrive as a Global Team As a remote-first company, TRM Labs is built for global collaboration. We cultivate a strong remote culture through clear communication, thorough documentation, and meaningful relationships. We invest in offsites, regional meetups, virtual coffee chats, and onboarding buddies to foster collaboration. By prioritizing trust and belonging, we harness the strengths of a global team while staying aligned with our mission and values. Join our mission! We're looking for team members who thrive in fast-paced, high-impact environments and love building from the ground up. TRM is remote-first, with an exceptionally talented global team. If you enjoy solving tough problems and seeing your work make a difference for billions of people, we want you here. Don't worry if your experience doesn't perfectly match a job description- we value passion, problem-solving, and unique career paths. If you're excited about TRM's mission, we want to hear from you. Recruitment agencies TRM Labs does not accept unsolicited agency resumes. Please do not forward resumes to TRM employees. TRM Labs is not responsible for any fees related to unsolicited resumes and will not pay fees to any third-party agency or company without a signed agreement. Privacy Policy By submitting your application, you are agreeing to allow TRM to process your personal information in accordance with the TRM Privacy Policy Learn More: Company Values | Interviewing | FAQs
    $58k-83k yearly est. Auto-Apply 60d+ ago
  • Associate Investigator Grant Analyst

    Invitrogen Holdings

    Remote job

    At Thermo Fisher Scientific, you'll discover meaningful work that makes a positive impact on a global scale. Join our colleagues in bringing our Mission to life - enabling our customers to make the world healthier, cleaner and safer. We provide our teams with the resources needed to achieve individual career goals while taking science a step beyond through research, development and delivery of life-changing therapies. With clinical trials conducted in 100+ countries and ongoing development of novel frameworks for clinical research through our PPD clinical research portfolio, our work spans laboratory, digital and decentralized clinical trial services. Your determination to deliver quality and accuracy will improve health outcomes that people and communities depend on - now and in the future. Our Mission is to enable our customers to make the world healthier, cleaner and safer. As one team of 100,000+ colleagues, we share a common set of values - Integrity, Intensity, Innovation and Involvement - working together to accelerate research, solve complex scientific challenges, drive technological innovation and support patients in need. Summarized Purpose: Prepares, reviews and finalizes global investigator grant budget and payment schedule terms and conditions templates for multiple studies. Develops investigator grant budget negotiation parameters with clients, communicates client processes, procedures and negotiation parameters to local team members. Liaises and establishes effective relationships with clients and internal PPD functional teams and Contract Specialists as directed by Contract Managers. This is a fully remote position for applicants located in the United States of America. Essential Functions: Assists in the development of investigator grant budget grids for applicable countries in assigned studies inclusive of coordination with therapeutic and operational subject matter experts, as appropriate, to ensure proper grant development. Drafts applicable payment terms and condition templates for investigator grant budget grids. Coordinates internal/external approvals and feedback to investigator grant budget grids and payment schedules. Provides support for escalations with external clients for investigator budget development, process and negotiation parameters. Provides approved investigator grant grids and payment schedules, process and negotiation parameters to local teams. Coordinates with internal departments to ensure various site startup activities are aligned with investigator grant activities and mutually agreed upon timelines; ensures alignment of investigator budget negotiation process for sites and study are properly aligned to the critical path for site activation. Adheres to PPD's target cycle times for site activations. Completes tracking and reporting as required. Job Complexity: Works on problems of limited scope. Follows standard practices and procedures in analyzing situations or data from which answers can be readily obtained. Job Knowledge: Learns to use professional concepts. Applies company policies and procedures to resolve routine issues. Supervision Received Normally receives detailed instructions on all work. Business Relationships: Contacts are primarily with immediate supervisor, and other personnel in the department. Builds stable working relationships internally. Qualifications: Education and Experience: Bachelor's degree or equivalent and relevant formal academic / vocational qualification Previous experience that provides the knowledge, skills, and abilities to perform the job (comparable to 0 to 2 years). In some cases an equivalency, consisting of a combination of appropriate education, training and/or directly related experience, will be considered sufficient for an individual to meet the requirements of the role. Knowledge, Skills and Abilities: Basic understanding of the principles of investigator grant template drafting Capable of reviewing and analyzing a protocol schedule of events to draft applicable budget grid and payment schedules therefrom Basic understanding of the pharmaceutical product development process and involvement of CROs Good oral and written communication skills Good attention to detail Good math skills Capable of working independently or in a team environment Good organizational and time management skills Proven flexibility and adaptability Basic proficiency with negotiation and conflict management Possesses cross cultural awareness and is able to adapt appropriately Good customer service skills, demonstrating a customer focused style of communication, problem solving and collaboration Basic experience with automated systems and computerized applications, such as, Microsoft Outlook, Excel, Word, etc Capable of acting independently and leading functional studies with general oversight Management Role: No management responsibility Working Conditions and Environment: Work is performed in an office/ laboratory and/or a clinical environment. Exposure to biological fluids with potential exposure to infectious organisms. Exposure to electrical office equipment. Personal protective equipment required such as protective eyewear, garments and gloves. Physical Requirements: Ability to work in an upright and /or stationary position for 6-8 hours per day. Repetitive hand movement of both hands with the ability to make fast, simple, repeated movements of the fingers, hands, and wrists. Frequent mobility required. Occasional crouching, stooping, with frequent bending and twisting of upper body and neck. Light to moderate lifting and carrying (or otherwise moves) objects including luggage and laptop computer with a maximum lift of 15-20 lbs. Ability to access and use a variety of computer software developed both in-house and off-the-shelf. Ability to communicate information and ideas so others will understand; with the ability to listen to and understand information and ideas presented through spoken words and sentences. Frequently interacts with others to obtain or relate information to diverse groups. Performs a wide range of variable tasks as dictated by variable demands and changing conditions with little predictability as to the occurrence. Ability to perform under stress. Ability to multi-task. Regular and consistent attendance. Salary Transparency: The salary range estimated for this position is $60,000 - $70,000. This position will also be eligible to receive a variable annual bonus based on company, team, and/or individual performance results in accordance with company policy. Actual compensation will be confirmed in writing at the time of offer. We offer a comprehensive Total Rewards package that our US colleagues and their families can count on, which generally include: • A choice of national medical and dental plans, and a national vision plan • A wellness program, and valuable health incentive opportunities for company contributions to a Health Reimbursement Accounts (HSAs) or Health Savings Account (HSA) •Tax-advantaged savings and spending accounts and commuter benefits • Employee assistance programs • At least 120 hours paid time off (PTO). 10 paid holidays annually, paid parental leave (3 weeks for bonding and 8 weeks for caregiver leave), accident and life insurance, short- and long-term disability, and volunteer rime off in accordance with company policy. • Retirement and savings programs, such as our competitive 401(k) U.S. retirement savings plan Accessibility/Disability Access: We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. EEO & Affirmative Action: Thermo Fisher Scientific is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, creed, religion, color, national or ethnic origin, citizenship, sex, sexual orientation, gender identity and expression, genetic information, veteran status, age or disability status.
    $60k-70k yearly Auto-Apply 17d ago

Learn more about intelligence research specialist jobs