Responsibilities We are seeking an experienced Acoustic Analyst to support the US Navy's Office of Naval Intelligence. In this role you will screen and analyze recorded acoustic data for signals of interest. This role is based On-site at the Office of Naval Intelligence in Suitland, MD.
As an Acoustic IntelligenceAnalyst, you will contribute to the operational advantage of the US Navy's Undersea Warfare community.
This work includes, but is not limited to:
* Analyze acoustic data sets to derive qualitative and quantitative technical measurements from recorded acoustic data
* Perform Acoustic Intelligence screening of acoustic data collections to develop acoustic tracks and signatures. Candidate will apply environmental data to the analyses to conduct technical measurements
* Manipulate hardware/software configurations to permit reading of data from multiple sources
* Attend and participate in ONI data reviews and analyst exchanges as required. Document analyses in presentations, briefings, or technical papers
Qualifications
Required Experience / Education:
* HS diploma and 12 years of experience or AA/AS and 10 years of experience or BS and 8 years of experience or MS/MA and 6 years of experience or PhD and 3 years of experience
* Experience in acoustic data screening of threat targets, development of target tracks using acoustic data, acoustic detection, and acoustic classification
* Requires an understanding of platform signature analysis and the methods of conducting technical measurements
* Background as submarine sonar technician, IUSS analyst, or air ASW analyst required
* Requires a TS/SCI clearance
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range
$112,000 - $179,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
$112k-179k yearly Auto-Apply 8d ago
Looking for a job?
Let Zippia find it for you.
SIGINT/Cyber Intelligence Analyst
Peraton 3.2
Intelligence analyst job at Peraton
Responsibilities Peraton is hiring an on-site Cyber IntelligenceAnalyst located at Wahiawa, Hawaii. Responsible for analyzing complex cyber threat data, producing actionable intelligence, and supporting cyber operations. This role requires a strong understanding of both intelligence analysis methodologies and network defense principles. The ideal candidate will possess experience in SIGINT analysis, a solid foundation in computer science or a related field, and a passion for staying ahead of the evolving cyber threat landscape.
Duties and Responsibilities:
* Evaluate target opportunities using all-source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans
* Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and demonstrate a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
* Develop new tradecraft needed to perform this analysis as technologies evolve
* Work collaboratively with government, military, and other contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
* Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques: query, merge, enrich, evaluate, and pivot within data to attain and share insights
* Distill, document, contextualize and share findings--including any new tradecraft that is developed--with teammates, stakeholders, and intelligence consumers
* Conduct in-depth analysis of cyber threat intelligence, including emerging malware, vulnerabilities, and attack vectors.Collect, evaluate, and fuse intelligence from diverse sources, including open-source intelligence (OSINT), signals intelligence (SIGINT), and Human intelligence (HUMINT). Identify correlations and patterns to enhance situational awareness and predictive analysis
* Assess the potential impact of cyber threats on network infrastructure and operations. Collaborate with cyber defense teams to develop and implement mitigation strategies and countermeasures
* Provide intelligence support during cyber incident response activities, including analysis of indicators of compromise (IOCs), attribution of cyber-attacks, and identification of adversary tactics, techniques, and procedures (TTPs)
* Prepare and deliver clear and concise intelligence products, including reports, briefings, and presentations, for a diverse audience, including senior leadership, operational stakeholders, and technical teams.
Qualifications
Qualifications:
* Minimum of 8 years with BS/BA; Minimum of 6 years with MS/MA; Minimum of 3 years with PhD
* Clearance: active TS/SCI with CI Poly
* Demonstrative experience with SIGINT and Analytics and Modernization (AMOD)
* Deep understanding of processing PCAP/packets efficiently and experience with cyber discovery and identification of indicators of compromise (IOCs)
* Demonstrative experience with network protocol analyzer such as Wireshark, TCP Dump, etc.
* Experience with sustained Intrusion Set - ability to link indicator and target-related information
* Familiarization with scripting such as python or object-oriented
* Experience with correlating Network Traffic collection from SIGINT resources
* Experience with tradecraft associated with Persona/Capability/Infrastructure development
* Excellent written and verbal communication skills to business, management, and technical teams
* Understanding of the Intelligence Cycle
* Knowledge of and connections with the Industry Base supporting diverse technical efforts within the IC
* Ability to apply advanced cybersecurity and communication technology principles, theories, and concepts contributing to the development of innovative Cyber Discovery principles and ideas
* Experience working on unusually complicated problems and providing solutions that are highly creative and resourceful.
* Apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed.
Preferred Qualifications:
* Master's degree in computer science, Information Security, Cybersecurity, Intelligence Studies, Security Studies, or related field.
* Experience in either DoW or IC organizations conducting cyber operations.
* Additional industry technical certifications: NET+, SEC+, CEH, CISSP, OSCP, OSCE, CCSP; GCFA (or other GIAC certification)
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range
$112,000 - $179,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
$56k-71k yearly est. Auto-Apply 35d ago
Staff Security Investigation Analyst
Alphasense 4.0
New York, NY jobs
Location: Remote within the U.S., with some requirements to travel domestically and internationally.
About the Role
The Staff Security Investigation Analyst will lead internal investigations related to insider threats, data loss, policy violations, and security incidents. Beyond reactive casework, this role will proactively identify behavioral indicators and anomalies that may signal insider risk, partnering with detection teams to continuously improve our investigative and monitoring capabilities. You'll work cross-functionally with Legal, HR, Security Operations, IT, and Engineering to ensure investigations are conducted ethically, thoroughly, and with appropriate discretion.
About the Team
The Insider Protection Team is responsible for identifying, investigating, and mitigating risks posed by trusted insiders - whether through malicious intent, negligence, or compromise. The team is a core part of AlphaSense's security organization, and partners closely with HR, Legal, IT, Security Engineering, and AlphaSense's business leadership. This is a small but growing team, with the expectation to make a direct impact on AlphaSense's security posture. The role will come with the opportunity to shape how the Insider Protection team scales their capabilities globally.
What You'll Do
Conduct investigations into insider threats, data exfiltration, IP theft, compliance violations, and policy breaches.
Investigate incidents involving sensitive assets specific to our environment: source code, AI/ML models, training data, client intelligence, and research IP.
Gather and analyze digital and physical evidence using established forensic methodologies (cloud audit logs, SaaS telemetry, endpoint data, and identity/access records).
Conduct investigative interviews with subjects, witnesses, and stakeholders, applying appropriate techniques for sensitive employment matters.
Prepare detailed reports and documentation of investigative findings suitable for executive leadership, legal proceedings, and regulatory inquiries.
Collaborate with HR, Legal, and Compliance teams to manage sensitive matters appropriately.
Maintain case management systems and ensure confidentiality and chain of custody integrity of investigation data.
Develop and enhance investigation protocols, evidence handling standards, and response workflows.
Identify patterns, trends, or emerging risks from investigation data and recommend preventive controls, detection improvements, and policy changes.
Provide executive-level reporting on investigation trends, program metrics, and risk posture; contribute to tabletop exercises and cross-functional training.
What We Are Looking For:
5+ years of experience in corporate investigations, forensics, or incident response.
Hands-on experience with insider threat and DLP tooling (e.g., UEBA, E-discovery, SIEM, EDR, Code42, Dtex, Microsoft Purview, or similar)
Proficiency investigating in cloud-native environments (AWS, GCP, Azure) and SaaS platforms; comfortable with audit logs, IAM, and identity-based investigations.
Knowledge of employment law, privacy regulations (GDPR, CCPA), and compliance standards.
Experience conducting investigative interviews in sensitive employment contexts.
Strong communication skills and ability to handle sensitive cases with discretion across all levels of the organization, including executives.
Proficiency in case management and e-discovery tools.
Nice to Have:
Certifications such as CFE, CFCE, or GIAC-related credentials.
Experience in AI, technology, financial services, or market intelligence industries.
Background in intelligence analysis, law enforcement, or government insider threat programs.
Familiarity with threat intelligence and OSINT methodologies.
Why Join Us?
Protect cutting-edge AI and market intelligence IP at a company where insider risk isn't hypothetical-it's a strategic priority.
Shape and scale an insider threat program with direct visibility to executive leadership.
Work on complex, technically interesting investigations in a cloud-native, data-rich environment.
Collaborate with sharp, mission-driven colleagues across Security, Legal, Engineering, and the business.
$90k-112k yearly est. 1d ago
Blockchain Intelligence Analyst
TRM Labs 4.3
Remote
Build to Protect Civilization
TRM is a blockchain intelligence company that's on a mission to build a safer world for billions of people. We're a lean, high-impact team tackling some of the world's most critical challenges, ranging from human trafficking and financial fraud to terrorist financing. We are builders who power governments, financial institutions, and crypto companies when the clock is running and the consequences are real. This is why every TRMer is a bet on our future and has the power to change our trajectory.
As a Blockchain IntelligenceAnalyst, you will drive TRM's collection, analysis, and reporting on key areas of the crypto economy (e.g., crypto exchanges, fraud). You will ensure that TRM has best-in-class intelligence through your subject matter expertise, first-principles problem solving, and ability to turn data into insights. You will collaborate with an experienced team of engineers, data scientists, and product managers to build scalable systems to detect, prevent, and mitigate cryptocurrency fraud and financial crime.
The impact you'll have here:
You'll track, analyze, and report on key areas of the crypto economy to detect suspicious activities.
Your OSINT skills will help uncover hidden threats and improve our security posture.
You'll provide key insights that contribute to real-world action against threat actors.
You'll collaborate with data and engineering teams to enhance the TRM product.
Your intelligence reports will help law enforcement, internal teams, and clients stay ahead of cyber risks.
What we're looking for:
Proven experience working in intelligence-related positions previously, ideally in Blockchain Intelligence (This is not an entry-level position).
OSINT Expertise
- Proficiency in using open-source tools to gather and analyze intelligence.
Analytical Skills
- Strong ability to synthesize and report complex information clearly and accurately.
Experience in Blockchain Analysis
- Knowledge of blockchain technologies, with a focus on tracing transactions and identifying malicious activity.
Communication & Collaboration
- Excellent communication skills to collaborate with cross-functional teams and produce actionable intelligence reports.
Ownership
- You demonstrate full ownership of your work, taking an 80/20 approach to accomplish objectives.
Certifications & Background
- Relevant certifications (e.g., GIAC, CEH) and experience in cybersecurity or intelligence gathering.
You have the ability to research in another language (Please specify the language(s) in your application).
About the team:
Our team values open communication and a collaborative work environment, where feedback and ideas are encouraged from all members.
We prioritize flexibility and adaptability, ensuring that everyone stays aligned through regular check-ins and progress updates. Operating with a strong focus on shared goals, we work together to meet deadlines while supporting individual growth and innovation.
Team members must be available for weekly meetings at 9AM PST and bi-weekly meetings at 8:30AM PST. We require at least 3-4 overlapping hours daily with the Pacific Timezone.
Learn about TRM Speed in this position:
Utilizes sound judgment and the 80/20 principle to drive rapid, high-impact outcomes.
Demonstrates the ability to iterate quickly in response to evolving threat landscapes.
Leverages creative problem-solving to ensure prompt and effective threat actor engagement to acquire attribution within 24 hours.
Employs a diverse set of methodologies to scale and optimize threat intelligence production for customer needs within 72 hours.
Life at TRM
We build to protect civilization. That promise shows up in how we work every day.
TRM runs fast. Really fast. We're a high-velocity team that expects ownership, clarity, and follow-through. People who thrive here are inspired by hard problems, experimentation, direct feedback. If it takes months elsewhere, it often ships here in days. If you are optimizing primarily for consistent work-life balance, use the interview process to pressure-test fit. We want teammates who thrive here, not just survive here.
We coach directly, assume positive intent, and play for the front of the jersey.
Leadership Principles
Impact-Oriented Trailblazer: We put customers first, driving for speed, focus, and adaptability.
Master Craftsperson: We prioritize speed, high standards, and distributed ownership.
Inspiring Colleague: We value humility, candor, and a one-team mindset.
Want to learn more about how we interview at TRM Labs? Check out more about our leadership principles and hiring process here.
What You'll Do Here
This work has teeth. At TRM, your week might include:
Driving critical investigations that can't wait for typical business hours.
Shipping products in days when others would schedule quarters.
Partnering with teams across time zones to deliver insights while the story is still unfolding.
Building new solutions from first principles when the playbook doesn't yet exist.
Protecting victims and customers by tracing illicit activity and disrupting criminal networks.
Join our Mission
We look for people who want their work to matter, who build with speed and rigor, and who take pride in protecting others through their craft. If you're excited by TRM's mission but don't check every box, apply anyway. We hire for slope, judgment, and the will to learn fast.
Build to protect civilization. Let's do it together.
Recruitment agencies
TRM Labs does not accept unsolicited agency resumes. Please do not forward resumes to TRM employees. TRM Labs is not responsible for any fees related to unsolicited resumes and will not pay fees to any third-party agency or company without a signed agreement.
Privacy Policy
By submitting your application, you are agreeing to allow TRM to process your personal information in accordance with the TRM Privacy Policy
Learn More: Company Values | Interviewing | FAQs
$58k-83k yearly est. Auto-Apply 16h ago
Analyst, Consumer Intelligence
Upside 4.6
New York, NY jobs
Meet Upside: We created Upside to transform brick-and-mortar commerce. Our technology uses the sophistication of online retail-profit measurement, attribution, and incrementality-to provide users with more value on their everyday purchases and brick-and-mortar businesses with new, profitable customers. We've helped millions of users earn 2 to 3 times more cashback than any other product, and hundreds of thousands of brick-and-mortar businesses earn measurable profit. Billions of dollars in commerce run through the Upside platform every year, and that value goes directly back to our retailer partners, the consumers they serve, and important sustainability initiatives.
The Impact You'll Make
We're hiring an Analyst, Consumer Intelligence to empower business intelligence for the Consumer organization-owning reporting, dashboards, and the insights that help leadership understand and improve the health of our consumer business. You'll quarterback reporting and insights for Upside's consumer business, and work cross-functionally with Finance, Marketing, RGTM, and Product to standardize KPIs, operationalize a single source of truth, and turn data into clear, actionable narratives that drive decisions and outcomes. You'll bring strong SQL and dashboarding skills and be an exceptional data storyteller, with a focus on driving scaled and profitable growth of Upside's consumer business.
What You'll Do
* Own end-to-end Consumer reporting, delivering reliable weekly/monthly/quarterly business reviews and "mission control" dashboards that provide a fast, cohesive read on performance.
* Build, maintain, and evolve dashboards in our BI stack; write scalable SQL and apply data modeling best practices to ensure performant, trustworthy self-service.
* Develop automated reporting and alerting to improve clarity and speed of decision-making; contribute to data quality checks and documentation for metric definitions.
* Lead ad hoc deep-dives on business questions; transform analysis into crisp, executive-ready storytelling with a point of view and next steps.
* Collaborate with Analytics Engineering and Data partners to improve upstream data assets; advocate for reliable pipelines and well-documented semantic layers.
* Partner with Finance to drive profitable, scalable growth-align on national and DMA level pacing, forecasting, ROI/IRR read; translating insights into clear recommendations that influence prioritization and tradeoffs.
* Partner with RGTM and Consumer teams to track funnel and lifecycle outcomes and quantify consumer impact on merchant performance.
* Define and standardize Consumer KPIs and metric definitions; align with Finance and Product on a single source of truth for core metrics and drivers.
Competencies You'll Need
* 2+ years of experience in business intelligence, analytics, or a similar role supporting consumer or growth-oriented teams.
* Strong SQL proficiency and dashboarding skills; proven experience building executive-ready dashboards and reports that drive action.
* Excellent data storytelling and communication-able to simplify complex analyses, tailor for different audiences, and influence decisions.
* Experience partnering cross-functionally with Marketing, Finance, and Product to define requirements and deliver scalable BI.
* Experience developing data models and partnering with analytics engineers to publish those data models into production.
* Pragmatic, quality-focused approach to metric definitions, data validation, and governance in a fast-paced, high-ambiguity environment.
Tools We Use
* SQL (Snowflake)
* Visualization and Notebooking (Hex and Looker)
* Data building and orchestration (DBT and Dagster)
* MarTech tools (AppsFlyer, Iterable, Segment)
Location
This hybrid role is based in our NYC office. In-office attendance is required on Monday, Tuesday, and Thursday, and may increase based on project needs and changes to Upside's in-office policy over time.
Compensation
The U.S. base salary range for this full-time position is $120,000 - $140,000 + equity + benefits. The final starting pay will be determined based on job-related skills, experience, qualifications, work location, and market conditions.
#LI-Hybrid
#LI-CO1
Benefits:
* Medical, dental, and vision coverage starting on Day 1
* Equity (ISOs)
* 401(k) program
* Family planning programs + paid parental leave
* Physical fitness and wellness memberships
* Emotional and mental health support programs
* Unlimited PTO + 10 paid federal holidays + our annual, week-long Winter Break
* Flexible work environment
* Lunch reimbursement for in-office employees
* Employee Resource Groups
* Learning and Development stipend
* Transparent culture
* Amazing mission!
Diversity and Inclusion:
Diversity drives innovation, and our differences make us stronger. We're passionate about building a workplace that represents a variety of backgrounds, skills, and perspectives, and we do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. Everyone is welcome here!
If there's anything we can do to support a disability or special need during your application or interview process, please email accommodations@upside.com.
This email is for accessibility accommodations only, it should not be used to submit job applications.
Notice To Recruiters And Placement Agencies:
This is an in-house search with a dedicated recruiter. Please do not submit resumes to any person or email address at Upside. Upside is not liable for, and will not pay, placement fees for candidates submitted by any party or agency other than its approved recruitment partners.
$120k-140k yearly Auto-Apply 46d ago
Analyst, Consumer Intelligence
Upside 4.6
New York, NY jobs
Meet Upside:
We created Upside to transform brick-and-mortar commerce. Our technology uses the sophistication of online retail-profit measurement, attribution, and incrementality-to provide users with more value on their everyday purchases and brick-and-mortar businesses with new, profitable customers. We've helped millions of users earn 2 to 3 times more cashback than any other product, and hundreds of thousands of brick-and-mortar businesses earn measurable profit. Billions of dollars in commerce run through the Upside platform every year, and that value goes directly back to our retailer partners, the consumers they serve, and important sustainability initiatives.
The Impact You'll Make
We're hiring an Analyst, Consumer Intelligence to empower business intelligence for the Consumer organization-owning reporting, dashboards, and the insights that help leadership understand and improve the health of our consumer business. You'll quarterback reporting and insights for Upside's consumer business, and work cross-functionally with Finance, Marketing, RGTM, and Product to standardize KPIs, operationalize a single source of truth, and turn data into clear, actionable narratives that drive decisions and outcomes. You'll bring strong SQL and dashboarding skills and be an exceptional data storyteller, with a focus on driving scaled and profitable growth of Upside's consumer business.
What You'll Do
Own end-to-end Consumer reporting, delivering reliable weekly/monthly/quarterly business reviews and “mission control” dashboards that provide a fast, cohesive read on performance.
Build, maintain, and evolve dashboards in our BI stack; write scalable SQL and apply data modeling best practices to ensure performant, trustworthy self-service.
Develop automated reporting and alerting to improve clarity and speed of decision-making; contribute to data quality checks and documentation for metric definitions.
Lead ad hoc deep-dives on business questions; transform analysis into crisp, executive-ready storytelling with a point of view and next steps.
Collaborate with Analytics Engineering and Data partners to improve upstream data assets; advocate for reliable pipelines and well-documented semantic layers.
Partner with Finance to drive profitable, scalable growth-align on national and DMA level pacing, forecasting, ROI/IRR read; translating insights into clear recommendations that influence prioritization and tradeoffs.
Partner with RGTM and Consumer teams to track funnel and lifecycle outcomes and quantify consumer impact on merchant performance.
Define and standardize Consumer KPIs and metric definitions; align with Finance and Product on a single source of truth for core metrics and drivers.
Competencies You'll Need
2+ years of experience in business intelligence, analytics, or a similar role supporting consumer or growth-oriented teams.
Strong SQL proficiency and dashboarding skills; proven experience building executive-ready dashboards and reports that drive action.
Excellent data storytelling and communication-able to simplify complex analyses, tailor for different audiences, and influence decisions.
Experience partnering cross-functionally with Marketing, Finance, and Product to define requirements and deliver scalable BI.
Experience developing data models and partnering with analytics engineers to publish those data models into production.
Pragmatic, quality-focused approach to metric definitions, data validation, and governance in a fast-paced, high-ambiguity environment.
Tools We Use
SQL (Snowflake)
Visualization and Notebooking (Hex and Looker)
Data building and orchestration (DBT and Dagster)
MarTech tools (AppsFlyer, Iterable, Segment)
Location
This hybrid role is based in our NYC office. In-office attendance is required on Monday, Tuesday, and Thursday, and may increase based on project needs and changes to Upside's in-office policy over time.
Compensation
The U.S. base salary range for this full-time position is $120,000 - $140,000 + equity + benefits. The final starting pay will be determined based on job-related skills, experience, qualifications, work location, and market conditions.
#LI-Hybrid
#LI-CO1
Benefits:
Medical, dental, and vision coverage starting on Day 1
Equity (ISOs)
401(k) program
Family planning programs + paid parental leave
Physical fitness and wellness memberships
Emotional and mental health support programs
Unlimited PTO + 10 paid federal holidays + our annual, week-long Winter Break
Flexible work environment
Lunch reimbursement for in-office employees
Employee Resource Groups
Learning and Development stipend
Transparent culture
Amazing mission!
Diversity and Inclusion:
Diversity drives innovation, and our differences make us stronger. We‘re passionate about building a workplace that represents a variety of backgrounds, skills, and perspectives, and we do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. Everyone is welcome here!
If there's anything we can do to support a disability or special need during your application or interview process, please email accommodations@upside.com.
This email is for accessibility accommodations only, it should not be used to submit job applications.
Notice To Recruiters And Placement Agencies:
This is an in-house search with a dedicated recruiter. Please do not submit resumes to any person or email address at Upside. Upside is not liable for, and will not pay, placement fees for candidates submitted by any party or agency other than its approved recruitment partners.
$120k-140k yearly Auto-Apply 46d ago
ISSJ III Intelligence Targeting Analyst (ITA) Expert
BTS Software Solutions 3.4
Columbia, MD jobs
AVAILABLE UPON CONTRACT AWARD Clearance Requirement: Active Top-Secret Clearance with SCI Eligibility BTS Software Solutions is seeking Intelligence Targeting Analysts to provide support and engage in the target development process in both CONUS and deployed environments in support of intelligence collection, CT and or counter proliferation. Intelligence Targeting Analysts shall have in-depth analytic skills to identify, assess, and report on enemy capabilities and tactics in support of target development and the production of all-source strategic, operational, and tactical intelligence analysis. Intelligence Targeting Analysts enable the F3EAD targeting cycle driving Intelligence collection support to target development and production.
Required Qualifications:
* A minimum of six (6) years of experience as an all-source intelligenceanalyst within the DoD or equivalent Government agencies is required with four (4) years at the operational level.
* Proficiency, knowledge, understanding, and experience with current all-source analytical techniques, theory, methodologies, processes, and trends.
* Demonstrate expert proficiency and knowledge of the current suite of all-source intelligence tools.
* Demonstrate experience preparing and delivering intelligence briefings at the Lieutenant Colonel (O-5) / GS-14 level or higher.
* Minimum of two (2) years targeting experience within previous three (3) years.
* Advanced HVI/Network targeting methodology knowledge / understanding, nodal analysis, and ability to fully utilize the F3EAD targeting process.
* Highly proficient in utilizing current applications and intelligence related automation to support target development, analytical efforts, and product development.
* Excellent briefing skills and experience in directing subordinate analysts in the accomplishment of intelligence products and assessments.
* Experience in the following analytical areas: CT, Regional Analysis, Geo-Political Analysis.
Company Overview:
BTS Software Solutions is a Service-Disabled Veteran Owned Small Business who are community-focused innovators who transform ideas into technology to serve people. We recognize that innovation is only valuable when applied towards a needed solution. Technology has no value without the hard work to turn ideas into reality. Our roots are in helping save Soldiers lives through technology. We bring that ethos to serving our community. We create solutions that touch people's lives - products to communicate, to connect companies with customers, to stay informed, to save lives, and to enhance lives.
We have a small company persona with a large company ethos and capabilities; we create elegant solutions for complex problems that will enrich peoples lives. We offer one of the best benefits packages in the industry: Competitive health benefits package, PTO, 401K matching and vested from day one to name just a few of our benefits and perks.
BTS Software Solutions is an Equal Opportunity Employer (EOE). All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law.
$71k-95k yearly est. 60d+ ago
Intelligence Analyst II (Anticipated)
Navanti Group 3.9
Arlington, VA jobs
Project/Team: IntelligenceAnalyst II (Anticipated) Employment Type: Full-Time Number of Vacancies: 1 Clearance Required: Active Top Secret with Counterintelligence (CI) Polygraph
*Note:
This position has not yet been funded. We are currently soliciting resumes from interested candidates in anticipation of contract award.
Background:
Navanti is seeking a mission-driven IntelligenceAnalyst II to support the FBI Laboratory at Redstone Arsenal in Huntsville, AL. This position contributes directly to national security and federal law enforcement investigations through the analysis and dissemination of high-value intelligence.
The selected candidate will operate as part of an embedded team at the FBI Laboratory, delivering timely intelligence products and responding to interagency requests for information (RFIs). The role requires full-time onsite support and an active Top Secret/Sensitive Compartmented Information (TS/SCI) clearance with Counterintelligence (CI) Polygraph.
Core Responsibilities:
Analyze complex intelligence data in support of FBI investigations and national security missions.
Develop and disseminate intelligence reports, briefings, and products to U.S. Intelligence Community (USIC) partners.
Fulfill RFIs from law enforcement and government agencies with accuracy and urgency.
Collaborate with federal stakeholders to prioritize information needs and reporting.
Maintain operational readiness and support ongoing FBI Laboratory missions onsite.
Technical Requirements:
U.S. Citizenship is required.
Active TS/SCI clearance with CI Polygraph (mandatory at time of hire).
Education and experience combination:
Bachelor s degree + 3 years of USIC experience, OR
Associate degree + 7 years of USIC experience, OR
High school diploma + 9 years of USIC experience.
Preferred Qualifications:
Familiarity with FBI intelligence workflows and interagency coordination processes.
Strong communication skills and the ability to produce clear, actionable intelligence products.
Experience working in secure federal environments or national laboratories.
Understanding of intelligence lifecycle and best practices in classified analysis.
#CJ
$62k-84k yearly est. 60d+ ago
Intelligence Analyst III / Program Manager (Anticipated)
Navanti Group 3.9
Arlington, VA jobs
Project/Team: IntelligenceAnalyst III / Program Manager (Anticipated) Employment Type: Full-Time Number of Vacancies: 1 Clearance Required: Top Secret with Counterintelligence (CI) Polygraph
Note: This position has not yet been funded. We are currently soliciting resumes from interested candidates in anticipation of contract award.
Background:
Navanti is seeking an experienced and mission-driven IntelligenceAnalyst III / Program Manager to lead a team of analysts supporting the FBI Laboratory at Redstone Arsenal in Huntsville, AL. This position plays a critical role in advancing federal law enforcement and national security missions by overseeing intelligence operations and ensuring contract compliance and performance.
The selected candidate will serve as the primary government interface, managing deliverables, timelines, and communication across stakeholders.
This full-time onsite position requires an active TS/SCI clearance with a Counterintelligence (CI) Polygraph.
Core Responsibilities:
Lead a team of intelligenceanalysts supporting the FBI Laboratory Intelligence Unit.
Manage project performance, deliverables, and stakeholder communications.
Ensure compliance with contract requirements, schedules, and quality standards.
Serve as the primary point of contact for government personnel.
Technical Requirements:
U.S. Citizenship is required.
Bachelor s degree + 5 years of experience in the U.S. Intelligence Community (USIC).
Minimum of 3 years experience in leadership or management roles within intelligence operations.
Active TS/SCI clearance with CI Polygraph (mandatory at time of hire).
Preferred Qualifications:
Experience managing teams in secure federal or national laboratory environments.
Familiarity with FBI intelligence processes, interagency collaboration, and classified reporting.
Strong interpersonal and organizational skills, with a proven ability to deliver results under tight deadlines.
Demonstrated success in stakeholder engagement and operational coordination.
#CJ
$62k-84k yearly est. 60d+ ago
Acquisition Intelligence Analyst AFSAC/FMS
Credence 3.7
Fairborn, OH jobs
Job Description
At Credence, we support our clients' mission-critical needs, powered by technology. We provide cutting-edge solutions, including AI/ML, enterprise modernization, and advanced intelligence capabilities, to the largest defense and health federal organizations. Through partnership and trust, we increase mission success for war-fighters and secure our nation for a better future.
We are privately held, are repeatedly recognized as a top place to work, and have been on the Inc. 5000 Fastest Growing Private Companies list for the last 12 years. We practice servant leadership and believe that by focusing on the success of our clients, team members, and partners, we all achieve greater success.
Credence has an upcoming need for an Acquisition IntelligenceAnalyst who will be primarily responsible for supporting Air Force Security Assistance and Cooperation Directorate Force Military Sales (AFSAC - FMS) at Wright Patterson Air Force Base, OH.
AFSAC (Air Force Foreign Military Sales) is a team that develops Air Force FMS cases to enable global coalitions and support priorities of the six geographic U.S. combatant commands. Their mission is to deliver airpower capabilities to strengthen international partnerships and advance national security
Responsibilities include, but are not limited to the duties listed below
Provide intelligence analytic/technical support to FMS acquisition programs, to include travel CONUS and OCONUS.
Partner with acquisition, intelligence, counterintelligence, and requirements communities to identify and resolve intelligence issues related to new and existing FMS cases.
Guide and provide Air Force FMS cases and programs/initiatives with high quality intelligence subject-matter expertise, detailed analysis, and technical intelligence support in multiple disciplines.
Managing the design, collection, collation, and reporting of the team's measures of effectiveness against the annual action plan/goals/objectives.
Accurately sourcing, reviewing, synthesizing, and aggregating classified information by searching known databases, existing intelligence reporting, and other organizational information to present timely and accurate classified data in a format consumable via a standardized product.
Reviewing and analyzing technical intelligence reporting and threat assessments.
Ensuring the team provides technical intelligence analysis feedback to information security cooperation stakeholders.
Providing support for secure video teleconferences and other methods of communication for security cooperation stakeholders, to include partner nations in other time zones.
Requirements
Clearance: TS
Master's degree and ten (10) years of experience, five (5) of which must be in DoD or,
Bachelor's degree and twelve (12) years of experience, five (5) of which must be in DoD or,
Fifteen years (15) of relevant work experience, eight (8) of which must be in DoD
Benefits
Please join us, as together we build a better world one mission at a time powered by Technology and its People!
#LI-Onsite
#Credence #veteranemployment #militaryspouse #milspouse #hireavet #militaryveteran #militaryfriendly #transitioningmilitary #veterans #militarytransition #militaryfamilies #msep #militarytocivilian #military #federalcontractingjobs #defensecontracting #defenseindustryjobs
$65k-87k yearly est. 1d ago
Quantitative Intelligence Analyst
Openai 4.2
San Francisco, CA jobs
About the Team The Intelligence and Investigations team seeks to rapidly identify and mitigate abuse and strategic risks to ensure a safe online ecosystem. We are dedicated to identifying emerging abuse trends, analyzing risks, and working with our internal and external partners to implement effective mitigation strategies to protect against misuse. Our efforts contribute to OpenAI's overarching goal of developing AI that benefits humanity.
The Strategic Intelligence & Analysis (SIA) team provides safety intelligence for OpenAI's products by monitoring, analyzing, and forecasting real-world abuse, geopolitical risks, and strategic threats. Our work informs safety mitigations, product decisions, and partnerships, ensuring OpenAI's tools are deployed securely and responsibly across critical sectors.
About the Role
As a Quantitative IntelligenceAnalyst, you will focus on discovering novel and emerging risks in complex human-AI systems before they are well-defined, measurable, or widely understood.
You will use deep subject matter expertise and quantitative tooling to surface weak, early, and unconventional risk signals. You will build analytic models that explain how harms could emerge and translate ambiguous patterns into structured, data-driven insight. Your work will help identify potential gaps in policy or coverage and operationalize previously unmeasured problems into signals that can support detection, mitigation, and planning downstream. You will develop analytical frameworks that map how new risks form, evolve, and propagate as products change, policies shift, and external events unfold. Your analyses will directly inform strategic risk prioritization and planning across the company, with regular visibility through strategic risk products.
This role is based in San Francisco, CA (hybrid, 3 days/week). Relocation support is available
In this role, you will:
* Discover and define new quantitative risk signals where no established metrics exist, using subject matter expertise to surface early, weak, or unconventional indicators
* Translate complex trust and safety challenges into measurable signals that can be tracked and stress-tested over time
* Develop upstream early-warning and signal frameworks that inform downstream detection and mitigation efforts
* Analyze risk trends to assess the underlying drivers and causal factors behind those changes
* Conduct data mining and statistical modeling to understand how risks originate, evolve, and propagate across systems
* Design adversarial scenarios, and quantitative stress tests to assess exposure, coverage gaps, and vulnerabilities
* Produce clear data-driven briefs to support risk prioritization, contingency planning, and strategic risk products across teams
You might thrive in this role if you:
* Have 3-6+ years of experience in quantitative intelligence analysis, trust & safety, security analysis, or risk-focused research
* Are comfortable working on complex trust and safety domains such as child safety, violent activities, self-harm, or similar high-stakes risk areas
* Familiarity with data mining, statistical modeling, and supervised learning methods
* Understand how to monitor signals or models for data drift, behavioral adaptation, or performance degradation over time, and can diagnose likely causes
* Experience in operationalizing adversarial or strategic risk behaviors, including through red-team exercises, agent-based modeling, or structured scenario analyses
* Comfortable working with Python and SQL
* Nice to have: Experience with quantitative stress testing or Monte Carlo simulations to assess uncertainty and tail risk
About OpenAI
OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.
We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic.
For additional information, please see OpenAI's Affirmative Action and Equal Employment Opportunity Policy Statement.
Background checks for applicants will be administered in accordance with applicable law, and qualified applicants with arrest or conviction records will be considered for employment consistent with those laws, including the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act, for US-based candidates. For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non-public information. In addition, job duties require access to secure and protected information technology systems and related data security obligations.
To notify OpenAI that you believe this job posting is non-compliant, please submit a report through this form. No response will be provided to inquiries unrelated to job posting compliance.
We are committed to providing reasonable accommodations to applicants with disabilities, and requests can be made via this link.
OpenAI Global Applicant Privacy Policy
At OpenAI, we believe artificial intelligence has the potential to help people solve immense global challenges, and we want the upside of AI to be widely shared. Join us in shaping the future of technology.
$83k-114k yearly est. 30d ago
Intelligence Analyst (Anticipated)
Navanti Group 3.9
Virginia jobs
Anticipated Period of Performance: September 01, 2024 - August 31, 2025 + 4 option years
Number of Vacancies: 2
POSITION NOT YET FUNDED. SOLICITING RESUMES FROM INTERESTED CANDIDATES FOR ANTICIPATED CONTRACT AWARD.
Background:
Navanti is seeking an IntelligenceAnalyst to support an anticipated program that will provide a wide range of Subject Matter Expertise (SME) support services in the field of HUMINT (Human Intelligence) collection and analysis. This role will be instrumental in advancing the mission of the U.S. Intelligence Community, with responsibilities including HUMINT collection management, operational tradecraft, and intelligence reporting in support of national security objectives.
Required Knowledge, Skills & Abilities:
Knowledge developing and applying analytic methodologies and principles.
Comprehensive knowledge of Standard HUMINT Intelligence Report (SHIR) and the
Intelligence Information Report (IIR) tradecraft.
Advanced level of knowledge of HUMINT collection management and documentation,
to include HUMINT operational tradecraft, operational cycle and collection methods.
A working knowledge with HUMINT collection management tools, to include HOT-R
CRATE, CHROME and other Collection Management applications.
Ability to build relationships and acts as the primary coordinator between the platform and the customer to obtain collection priorities, feedback and evaluations.
Ability to publish Notices of Intelligence Potential (NIPs) and/or Requests for
Requirements (RFR) in support of upcoming collection operations.
Ability to consolidate, document, track, and prioritize collection requirements and SDRs to develop collection planning in support of deployed teams.
Ability to provide collection guidance direction with collectors to focus their efforts on priority intelligence gaps.
Ability to ensure IIRs clearly address the collections requirements and assists with administrative quality control of IIRs (i.e. format reviews, collection management codes, and requirements).
Ability to transmit requests for IIR evaluations to analysts and other consumers of HUMINT reporting.
Ability to prepare/maintain collection management metrics for the platform, to include Reporting Evaluations, SDRs, and IIRs.
Ability to leverage USIC contacts.
Extensive knowledge with collection management to include production management of intelligence reporting.
Knowledge and understanding of the Office of Director of National Intelligence s HUMINT policies.
Excellent written and oral communication skills.
Proficiency in SharePoint, HOT-R, CRATE and CHROME.
Ability to self-start and take initiative with minimal support or guidance.
High proficiency using Palantir, Excel, PowerPoint, and/or related programs.
Minimum Education & Required Experience:
Bachelor s degree in any fields and 8+ years direct experience with HUMINT collection or analysis work experience within intelligence, counterterrorism and/or defense community.
Preferred Experience:
Extensive experience with collection management, including production management of intelligence reporting and program management of a robust collection management program.
Experience developing and applying analytic methodologies and principles.
Proficient in drafting Intelligence Information Reports (IIRs).
Strong experience in research, data search, and retrieval across multiple databases with multimedia formats, generating complex analytical reports for senior management.
Proficiency in SharePoint, HOT-R, CRATE, CHROME, and Palantir, with experience using FAMS, Excel, PowerPoint, and related programs.
Verifiable training or certification in intelligenceanalyst practices, research approaches, and analysis concepts.
Collection management certification desired, but not required.
Clearance Requirement:
Active TS/SCI
#CJ
$61k-82k yearly est. 60d+ ago
Executive Protection Intelligence Analyst, AMS
Bytedance 4.6
Los Angeles, CA jobs
The Global Physical Security Intelligence team empowers risk-informed decisions that protect company's people, assets, operations, and reputation. We deliver actionable intelligence products and services to help prevent, detect, and respond to physical security threats worldwide. We are looking for an IntelligenceAnalyst to join our Global Executive Protection IntelligenceAnalyst team. This is a position focusing on global risk assessment, OSINT intelligence identification & analysis, and intelligence integration, supporting core tasks such as Key Person travel, residence safety, and event security. This is an excellent opportunity for a candidate to work in a dynamic and intellectually outstanding security team to further develop our intelligence capabilities across the globe. Responsibilities: - Development of risk assessment report for certain cities/events, and conduct live security status monitoring for the focus operations as needed, preparation for protection operations. - Monitor global intelligence sources to identify emerging threats and hazards with Key Person/Event potential impact, such as information leakage, physical security threat and brand risk, with a particular focus on AMS. - Integrate the relevant internal and external resources of the company, conduct background analysis and stability analysis of important safety positions or other designated personnel, and deliver written reports. - Deliver clear and timely tactical and operational reporting to support decision-making during crises or major events. - Continuously assess stakeholder intelligence needs and refine collection and analysis accordingly. - Develop and maintain a diverse range of intelligence sources, including OSINT(open-source intelligence) and deep/dark web monitoring. - Assist in implementing and improving departmental information management processes and related administrative assignments.
Minimum Qualifications: - 3+ years of Protective Intelligence experience. - Demonstrable experience in conducting OSINT(open-source intelligence) research and investigations, and the production of written intelligence products (reports, assessments, etc.). - Professional background in a security or intelligence role within a global enterprise. - Strong ability to triage and prioritize multiple threats in real time. - Expertise in OSINT, including social media monitoring, illicit communities, and deep/dark web research. - Experience investigating threat actors, mapping TTPs, and supporting attribution and behavioral analysis. - Familiarity with cyber, geopolitical, or violent actor-related intelligence products. Preferred Qualifications: - Ability to identify and adapt to new or emerging intelligence challenges and sources. - Skilled in editing and reviewing intelligent products for analytic rigor and clarity. - Strong presentation skills, with a demonstrated ability to brief senior stakeholders with poise and clarity. - Demonstrated ability to monitor, analyze, and report on complex and fast-moving global developments. - Take responsibility for emergency reaction during weekend and nights due to time zone differences.
$74k-111k yearly est. 12d ago
1110- Artificial Intelligence Researcher
Innovaccer 4.4
San Francisco, CA jobs
About the Role We are looking for an innovative Artificial Intelligence Researcher to join our growing AI/ML team. In this role, you will design, experiment, and implement advanced AI models that solve complex business and technical challenges. You will work closely with engineering, product, and data science teams to bring cutting-edge research into real-world applications.
This position is ideal for someone passionate about pushing the boundaries of machine intelligence and contributing to impactful research.
A Day in the Life
* Conduct research in advanced AI/ML areas such as NLP, computer vision, deep learning, reinforcement learning, and generative AI.
* Develop new algorithms and improve existing model architectures to enhance performance and accuracy.
* Build prototypes and POCs (proof-of-concept) to demonstrate the feasibility of innovative AI solutions.
* Analyze large datasets to train, fine-tune, and evaluate models using state-of-the-art frameworks.
* Work with cross-functional teams to transition research outputs into production systems.
* Stay updated on emerging AI trends, technologies, and research publications.
* Document findings and contribute to whitepapers, patents, or conference publications.
* Participate in model validation and evaluations, responsible AI practices, and performance optimization.
What You Need
* Bachelor's, Master's, or Ph.D. in Computer Science, Artificial Intelligence, Machine Learning, Mathematics, or a related field.
* 2-5 years of experience in AI/ML research or applied machine learning roles.
* Strong knowledge of deep learning architectures (Transformers, CNNs, RNNs, etc.).
* Hands-on experience with Python and ML frameworks such as PyTorch, TensorFlow, or JAX.
* Solid understanding of statistics, probability, algorithms, and optimization techniques.
* Experience working with large datasets and training models on cloud environments (AWS, GCP, Azure).
* Strong problem-solving skills and the ability to work independently on research tasks.
Preferred Qualifications
* Experience with large language models, generative AI, or foundation model fine-tuning.
* Publication record in AI/ML conferences (ICML, NeurIPS, ICLR, CVPR, ACL, etc.).
* Familiarity with MLOps tools and scalable model deployment workflows.
* Contributions to open-source machine learning libraries.
* Experience collaborating in multi-disciplinary teams.
We offer competitive benefits to set you up for success in and outside of work.
Here's What We Offer
* Generous PTO Benefits: Enjoy PTO benefit accrual of 22 days per year.
* Parental Leave: Experience one of the industry's best parental leave policies to spend time with your new addition.
* Rewards & Recognition: Unlock your potential and be rewarded generously with both monetary incentives and widespread recognition for your dedication and outstanding performance. Unlock your potential and be rewarded generously with both monetary incentives and widespread recognition for your dedication and outstanding performance.
* Insurance Benefits: We offer medical, dental, and vision benefits along with 100% company-sponsored short and long-term disability and basic life insurance. Legal aid and pet insurance options are available at a discounted rate.
Innovaccer is an equal opportunity employer. We celebrate diversity, and we are committed to fostering an inclusive and diverse workplace where all employees, regardless of race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, marital status, or veteran status, feel valued and empowered.
Disclaimer: Innovaccer does not charge fees or require payment from individuals or agencies for securing employment with us. We do not guarantee job spots or engage in any financial transactions related to employment. If you encounter any posts or requests asking for payment or personal information, we strongly advise you to report them immediately to our HR department at *****************. Additionally, please exercise caution and verify the authenticity of any requests before disclosing personal and confidential information, including bank account details.
About Innovaccer
Innovaccer activates the flow of healthcare data, empowering providers, payers, and government organizations to deliver intelligent and connected experiences that advance health outcomes. The Healthcare Intelligence Cloud equips every stakeholder in the patient journey to turn fragmented data into proactive, coordinated actions that elevate the quality of care and drive operational performance. Leading healthcare organizations like CommonSpirit Health, Atlantic Health, and Banner Health trust Innovaccer to integrate a system of intelligence into their existing infrastructure- extending the human touch in healthcare. For more information, visit *******************
Check us out on YouTube, Glassdoor, LinkedIn, Instagram, and the Web.
$113k-165k yearly est. Easy Apply 41d ago
Executive Protection Intelligence Analyst, AMS
Bytedance 4.6
New York, NY jobs
The Global Physical Security Intelligence team empowers risk-informed decisions that protect company's people, assets, operations, and reputation. We deliver actionable intelligence products and services to help prevent, detect, and respond to physical security threats worldwide. We are looking for an IntelligenceAnalyst to join our Global Executive Protection IntelligenceAnalyst team. This is a position focusing on global risk assessment, OSINT intelligence identification & analysis, and intelligence integration, supporting core tasks such as Key Person travel, residence safety, and event security. This is an excellent opportunity for a candidate to work in a dynamic and intellectually outstanding security team to further develop our intelligence capabilities across the globe. Responsibilities: - Development of risk assessment report for certain cities/events, and conduct live security status monitoring for the focus operations as needed, preparation for protection operations. - Monitor global intelligence sources to identify emerging threats and hazards with Key Person/Event potential impact, such as information leakage, physical security threat and brand risk, with a particular focus on AMS. - Integrate the relevant internal and external resources of the company, conduct background analysis and stability analysis of important safety positions or other designated personnel, and deliver written reports. - Deliver clear and timely tactical and operational reporting to support decision-making during crises or major events. - Continuously assess stakeholder intelligence needs and refine collection and analysis accordingly. - Develop and maintain a diverse range of intelligence sources, including OSINT(open-source intelligence) and deep/dark web monitoring. - Assist in implementing and improving departmental information management processes and related administrative assignments.
Minimum Qualifications: - 3+ years of Protective Intelligence experience. - Demonstrable experience in conducting OSINT(open-source intelligence) research and investigations, and the production of written intelligence products (reports, assessments, etc.). - Professional background in a security or intelligence role within a global enterprise. - Strong ability to triage and prioritize multiple threats in real time. - Expertise in OSINT, including social media monitoring, illicit communities, and deep/dark web research. - Experience investigating threat actors, mapping TTPs, and supporting attribution and behavioral analysis. - Familiarity with cyber, geopolitical, or violent actor-related intelligence products. Preferred Qualifications: - Ability to identify and adapt to new or emerging intelligence challenges and sources. - Skilled in editing and reviewing intelligent products for analytic rigor and clarity. - Strong presentation skills, with a demonstrated ability to brief senior stakeholders with poise and clarity. - Demonstrated ability to monitor, analyze, and report on complex and fast-moving global developments. - Take responsibility for emergency reaction during weekend and nights due to time zone differences.
$58k-85k yearly est. 12d ago
Lead Threat Intelligence Analyst
Deepwatch 4.1
Tampa, FL jobs
Come join Deepwatch's team of world-class cybersecurity professionals and the brightest minds in the industry. If you're ready to challenge yourself with work that matters, then this is the place for you. We're redefining cybersecurity as one of the fastest growing companies in the U.S. - and we have a blast doing it!
Who We Are
Our core values drive everything we do at Deepwatch, including our approach to tackling tough cyber challenges. We seek out tenacious individuals who are passionate about solving complex problems and protecting our customers. At Deepwatch, every decision, process, and hire is made with a focus on improving our cybersecurity solutions and delivering an exceptional experience for our customers. By embracing our values, we create a culture of excellence that is dedicated to empowering our team members to explore their potential, expand their skill sets, and achieve their career aspirations, which is supported by our unique annual professional development benefit.
Deepwatch recognition includes:
2025, 2024, 2023, 2022 and 2021 Great Place to Work Certified
2024 Military Times Best for Vets Employers
2024 US Department of Labor Hire Vets Gold Award
2024 Forbes' America's Best Startup Employers
2024 Cyber Defense Magazine, Global Infosec Awards
2023 and 2022 Fortress Cybersecurity Award
2023 $180M Series C investment from Springcoast Capital Partners, Splunk Ventures, and Vista Credit Partners of Vista Equity Partners
2022 Cybersecurity Excellence Award for MDR
Lead Threat IntelligenceAnalyst
Reports to: EVP Global Cyber Operations
As a Lead Threat IntelligenceAnalyst, you will be instrumental in collecting, analyzing, and disseminating cyber threat intelligence that directly informs and enhances our security awareness, detection, response, and defensive capabilities. You'll leverage your expertise to process large volumes of cyber threat data, conduct deep-dive analysis, and produce high-quality reports for internal and external stakeholders.This role requires a keen eye for detail, strong analytic tradecraft, and excellent communication skills. You'll play a key role in shaping intelligence-driven security operations while supporting the broader threat intelligence needs of our clients and internal teams.
In this role, you'll get to:
Monitor and evaluate publicly available and closed sources, selecting and reviewing cyber threat reporting for relevance and actionability.
Analyze processed threat intelligence, correlating and synthesizing findings with other internal and external sources to create a comprehensive threat picture.
Produce brief, high-impact customer-facing summaries highlighting essential facts for internal sharing, as well as more detailed formal reports that include key facts, technical details, threat actor profiling, victimology, attack chains, and TTPs.
Recommend mitigation measures based on technical analysis and threat assessments to reduce client risk exposure.
Identify and map key elements from intelligence reports to STIX threat objects for easy consumption by stakeholders and ingestion into the Threat Intelligence Platform.
Ingest finalized intelligence reports and supporting data into the Threat Intelligence Platform for knowledge management, correlation, hunting, and alerting, ensuring accessibility for internal teams and clients.
Collect, process, and analyze dark web activity and data leak site listings, maintaining a comprehensive leak site database to track trends, generate reports, and inform clients.
Create charts, graphs, and tables to visualize threat actor activity and trends
Monitor and respond to threat intelligence requests for information (RFIs) for both internal and customer facing teams.
Participate in incident event escalations by identifying and actioning leads for intelligence reporting.
Review and approve email notifications, blog posts, and other customer communications based on finalized threat intelligence reports.
Provide intelligence-driven support to Security Operations Center, Threat Hunting, Incident Response, and Vulnerability Management teams.
Brief internal teams, clients, and executive stakeholders on emerging threats, relevant threat actors, and mitigation strategies.
Mentor junior analysts and contribute to the development of Cyber Threat Intelligence team tradecraft and processes.
To be successful in this role, you'll need to:
Be proficient in using Threat Intelligence Platforms (TIPs), such as OpenCTI, and mapping intelligence data to STIX/TAXII frameworks.
Demonstrate strong analytic skills in processing, correlating, and synthesizing multiple sources of intelligence to produce actionable reports.
Possess SIEM experience or related/equal experience
Position and discuss security issues with customer technical and leadership audiences to reach positive outcomes
Demonstrate technical writing skills for customer or executive audiences
Demonstrate proficiency in English; additional languages are a plus.
Possess a deep understanding of threat actors, their motivations, TTPs (aligned to MITRE ATT&CK), and how they target industries and organizations.
Leverage Scripting experience
Preferred Industry-Recognized Certifications:
GIAC Cyber Threat Intelligence (GCTI), GIAC Reverse Engineering Malware, (SOC)
EC-Council's Certified Cyber IntelligenceAnalyst (CTIA), CREST's Certified Threat Intelligence Manager and CREST Registered Threat IntelligenceAnalyst, MITRE ATT&CK Cyber Threat Intelligence Certification.
Not required, but prefer some experience with Malware Analysis, Digital Forensics or Incident Response (full packet capture, host/network, email)
ITAR Compliance
This position will have access to customer data and as such is subject to International Traffic in Arms Regulations (ITAR). Upon application, candidates will be asked to confirm that they are a U.S. Person as defined by the following:
A citizen of the U.S.;
A lawful permanent resident of the United States;
A person admitted to the United States as a refugee; or
A person that has been granted asylum by the United States government.
The intent of this requirement is not to verify employment eligibility overall, but to ensure compliance with import/export regulations. If you do not meet these requirements, we encourage you to apply for other open roles at Deepwatch. This information will be verified upon offer of employment.
Statutory Pay Disclosure
The anticipated salary range for this role is $175,00 - $190,000 + bonus + stock options + benefits. Actual compensation may vary from posted hiring range based upon geographic location, work experience, education, and/or skill level.
What We Offer:
Deepwatch is excited to provide benefits designed to support team members and their families. Including:
Medical, dental, vision, and disability insurance
Flexible Time Off (FTO), 11 company holidays, sick leave and 8-Weeks Paid Parental Leave
Unique professional development benefits, starting at $3,000 annually
Wellness contests and monthly educational programs
401(K) retirement program
Learn more here: Deepwatch Benefits
We know the confidence gap and imposter syndrome can get in the way of meeting spectacular candidates, so please don't hesitate to apply - we'd love to hear from you. Please review our DEI Statement here.
Deepwatch welcomes and encourages applications from people with disabilities and accommodations are available on request for candidates taking part in all aspects of the selection process. Please inform your recruiter or contact ************************ for further information. All Deepwatch employees are expected to:
Be interested in and able to work remotely from a home office when not at a corporate office
Pass a pre-employment background check in accordance with applicable laws
Deepwatch is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability status, marital status, sexual orientation, gender identity, genetic information, protected veteran status, or any other characteristic protected by law. In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.
By submitting your application, you agree that Deepwatch may collect your personal data for recruiting, global organization planning, and related purposes. The Deepwatch Privacy Policy explains what personal information we may process, where we may process your personal information, our purposes for processing your personal information, and the rights you can exercise over Deepwatch's use of your personal information.
$42k-56k yearly est. Auto-Apply 12d ago
Market Intelligence Analyst
Vaxcare 4.1
Orlando, FL jobs
The healthcare system is complex, presenting challenges for everyone-patients, doctors, nurses, office managers, and billers alike. At VaxCare, we aim to streamline this complexity, eliminating unnecessary costs and confusion so that practices can focus on their important work: caring for patients. Our innovative solutions include a vaccine management and LARC access platform trusted by over 20,000 active providers nationwide. This service is powered by a multidisciplinary team of dedicated professionals who lead with integrity and a relentless drive to exceed expectations, bringing clarity and efficiency to the often-overwhelming world of healthcare.
THE POSITION
The Market IntelligenceAnalyst is responsible for building and maintaining a living market dataset that provides clarity on our TAM, SAM, and contact-level data. This role ensures data completeness, accuracy, and confidence scoring, enabling precise targeting for ABM and marketing campaigns. They will establish governance, refresh cadence, and reporting frameworks that make market data a trusted resource for all stakeholders.
ESSENTIAL RESPONSIBILITIES
Maintain and update TAM/SAM datasets and governed account/contact lists.
Implement data confidence scoring and refresh cadence for accuracy.
Source, validate, and enrich contact data from multiple sources.
Produce monthly Market Intelligence reports for executive visibility.
Collaborate with ABM and Campaign teams to ensure targeting precision.
COMPETENCIES:
Core to all positions at VaxCare
We Live (and Work) by Our Values:
“VaxCare-ness” (Art of Care) - Nurturing and providing for each team member
Belief in Something Bigger than Ourselves - Capacity to derive meaning from a larger purpose
Humility as a Posture of Learning - Burning curiosity to learn without ego
Adaptability & Embracing Change - Nimbleness & ready to seize new opportunities
Additional “Must Haves”:
Dependability - Must be able to meet deadlines, work independently, maintain focus, be punctual and good attendance record.
Interpersonal Skills - Builds strong relationships & contributes to a positive work environment.
Computer Skills - Skilled with computers, learns new tools quickly.
Ethics - Honest, accountable, maintains confidentiality.
REQUIRED EXPERIENCE & QUALIFICATIONS
Highly detail-oriented and data-driven.
Strong analytical and problem-solving skills.
Comfortable with data tools and governance frameworks.
Effective communicator who can translate data insights into action.
Proactive in identifying gaps and improving data quality.
Highly detail-oriented and data-driven.
Strong analytical and problem-solving skills.
Comfortable with data tools and governance frameworks.
Effective communicator who can translate data insights into action.
OTHER ESSENTIAL REQUIREMENTS
Remote/Hybrid Work Requirements:
Must be able to perform job duties independently with minimal supervision.
Must have private, distraction -free workspace suitable for confidential and focused work.
Must have reliable high-speed internet to support video conferencing an regular computer use.
Prolonged sitting or standing: Employees must be able to remain in a stationary position for extended periods, as much of the work involves sitting at a computer or workstation. Some hybrid or office-based roles may also require the ability to stand for portions of a shift.
Repetitive motions: Significant use of the hands, wrists, and fingers is required for tasks like typing, using a computer mouse, and handling paperwork.
Visual acuity: The job requires the ability to view a computer screen and read documents for extended periods.
Communication: Employees must be able to clearly express and exchange ideas in English to effectively communicate with customers and co-workers.
$42k-56k yearly est. 47d ago
Cyber Intelligence Researcher
Stripe, Inc. 4.5
Seattle, WA jobs
Who we are About Stripe Stripe is a financial infrastructure platform for businesses. Millions of companies-from the world's largest enterprises to the most ambitious startups-use Stripe to accept payments, grow their revenue, and accelerate new business opportunities. Our mission is to increase the GDP of the internet, and we have a staggering amount of work ahead. That means you have an unprecedented opportunity to put the global economy within everyone's reach while doing the most important work of your career.
About the team
The Attacker Engineering team validates Stripe's defenses and measures security controls by providing actionable attacker-derived products, datasets, and insights into real attacks. The team is distributed, working primarily across US time zones but will regularly coordinate with stakeholders in Europe and Asia.
What you'll do
We are seeking a skilled and motivated cyber intelligence professional who will conduct comprehensive research and analysis of cyber threat intelligence data from diverse sources. As part of our team, you will provide valuable insights and recommendations to support informed decision-making and effective risk mitigation strategies. Your ability to communicate complex cyber threat intelligence findings to non-technical stakeholders is crucial in ensuring its understanding and application. Collaborating with internal teams and external partners, you will play a vital role in enhancing security and staying ahead of emerging cyber threats. Your dedication to continuous improvement and alignment with organizational goals will contribute to the overall effectiveness of our intelligence operations. Join us in our mission to safeguard our organization and stakeholders from evolving cyber risks.
Responsibilities
* Collaborate closely with relevant stakeholders, such as product teams, engineering teams, and business units, to understand their intelligence needs and requirements.
* Proactively identify and analyze potential cyber-related threats and risks to the organization by conducting comprehensive research and analysis using various intelligence sources and methodologies.
* Provide timely and actionable intelligence reports and briefings to key stakeholders, including executives, business leaders, and operational teams, supporting informed decision-making and risk mitigation strategies.
* Monitor and analyze threat intelligence feeds, open-source intelligence, social media platforms, trust groups, and other relevant sources to identify emerging cyber threats, attack trends, and potential threat actors.
* Conduct in-depth investigations and analyses of security incidents, data breaches, and cyber attacks to determine the nature, scope, and impact of the incidents and provide recommendations for response and remediation.
* Develop and maintain threat profiles and actor attribution information to enhance the organization's understanding of threat landscapes and potential adversaries.
* Collaborate with internal teams and external partners to share and exchange threat intelligence, improving collective defenses and response capabilities.
* Stay current with the latest trends, techniques, and tools in cyber threat intelligence and contribute to continuously improving intelligence practices and methodologies within the organization.
* Develop relationships with external intelligence providers, industry peers, and trusted communities to stay informed about emerging threats and share relevant intelligence.
* Participate in incident response activities, providing intelligence support to effectively detect, investigate, and respond to cyber incidents and contribute to post-incident analysis and lessons learned exercises.
Who you are
We're looking for someone who meets the minimum requirements to be considered for the role. If you meet these requirements, you are encouraged to apply. The preferred qualifications are a bonus, not a requirement.
Minimum requirements
* 5+ years of experience in cyber threat intelligence or a related area
* Bachelor's degree in a relevant field, such as Cybersecurity, Computer Science, or a related discipline
* In-depth knowledge and understanding of the cyber threat landscape, attack vectors, and emerging trends in the field of cybersecurity
* Demonstrated experience collecting, analyzing, and interpreting intelligence from various sources, including open-source intelligence, threat feeds, social media, and underground forums
* Proficiency in utilizing intelligence analysis tools and technologies to process, visualize, and present data in a meaningful and actionable manner
* Strong understanding of intelligence methodologies, frameworks, and best practices, with the ability to apply them effectively in a practical setting
Preferred qualifications
* Excellent written and verbal communication skills, with the ability to convey complex technical concepts to technical and non-technical stakeholders
* Proven ability to work collaboratively with cross-functional teams and stakeholders to identify intelligence requirements and provide timely and relevant intelligence support
* Familiarity with relevant industry standards and regulations about cyber threat intelligence and data privacy
* Continuous learning mindset with a desire to stay up-to-date with the latest threats, intelligence techniques, and tools in the cybersecurity field
Hybrid work at Stripe
This role is available either in an office or a remote location (35+ miles or 56+ km from a Stripe office).
In-office expectations
Office-assigned Stripes spend at least 50% of the time in a given month in their local office or with users. This hits a balance between bringing people together for in-person collaboration and learning from each other, while supporting flexibility about how to do this in a way that makes sense for individuals and their teams.
$111k-172k yearly est. Auto-Apply 60d+ ago
SME Space/Counterspace Analyst - Operational Intelligence
Prescient Edge 3.8
Huntsville, AL jobs
Prescient Edge is seeking a SME- Space Counterspace Analyst - Operational Intelligence to support a federal government client.
is contingent upon contract award.
Benefits:
At Prescient Edge, we believe that acting with integrity and serving our employees is the key to everyone's success. To that end, we provide employees with a best-in-class benefits package that includes:
A competitive salary with performance bonus opportunities.
Comprehensive healthcare benefits, including medical, vision, dental, and orthodontia coverage.
A substantial retirement plan with no vesting schedule. Career development opportunities, including on-the-job training, tuition reimbursement, and networking.
A positive work environment where employees are respected, supported, and engaged.
Security Clearance:
Security clearance required TS/SCI with a CI POLY or the ability to obtain one.
Requirements
Description:
Conducts all-source analytic production of foreign space and counter-space forces, activities, and capabilities, including, but not limited to, civilian and military organizations, command structure, leadership, and communications.
Develops, coordinates, executes, and refines USSPACECOM counter-space warning problems and associated indicators daily. Monitors and reports on adversary space and counter-space assets OR&D.
Develops pattern-of-life analysis on adversary space and counter-space forces and systems.
Desired Experience:
Minimum 20 years of experience conducting analysis relevant to the specific labor category with at least a portion of the experience within the last 2 years.
Desired Education:
Master's degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education.
Location:
Huntsville, AL.
$44k-62k yearly est. 60d+ ago
Mid Space Counterspace Analyst - Operational Intelligence
Prescient Edge 3.8
Huntsville, AL jobs
Prescient Edge is seeking Mid Space/Counterspace Analyst - Operational Intelligence to support a federal government client.
is contingent upon contract award.
Benefits:
At Prescient Edge, we believe that acting with integrity and serving our employees is the key to everyone's success. To that end, we provide employees with a best-in-class benefits package that includes:
A competitive salary with performance bonus opportunities.
Comprehensive healthcare benefits, including medical, vision, dental, and orthodontia coverage.
A substantial retirement plan with no vesting schedule. Career development opportunities, including on-the-job training, tuition reimbursement, and networking.
Security Clearance:
Security clearance required TS/SCI with a CI POLY or the ability to obtain one.
Requirements
Description:
Conducts all-source analytic production of foreign space and counter-space forces, activities, and capabilities, including, but not limited to, civilian and military organizations, command structure, leadership, and communications.
Develops, coordinates, executes, and refines USSPACECOM counter-space warning problems and associated indicators daily. Monitors and reports on adversary space and counter-space assets OR&D.
Develops pattern-of-life analysis on adversary space and counter-space forces and systems.
Desired Experience:
8 years of experience relevant to the specific labor category with at least four years of the experience within the last 2 years.
Desired Education:
Bachelor's degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education.
An additional 4 years of experience in the specific labor category, for a total of 12 years of experience in the specific labor category, may be substituted for a bachelor's degree.
Location:
Huntsville, AL.