Threat Intelligence Analyst (OSINT / Strategic Intelligence)

Remote • Posted 23 hours ago • Updated 23 hours ago
Full Time
No Travel Required
Remote
$55 - $60/hr
Fitment

Dice Job Match Score™

⭐ Evaluating experience...

Job Details

Skills

  • Incident Management
  • Intelligence Analysis
  • Mapping
  • OSINT
  • Open Source
  • Social Media
  • Risk Analysis
  • Supply Chain Management
  • IBM QRadar
  • Threat Analysis
  • Vulnerability Management
  • eXist
  • Writing
  • Articulate
  • Leadership
  • Presentations
  • SIEM
  • Splunk
  • System On A Chip

Summary

Title: Threat Intelligence Analyst (OSINT / Strategic Intelligence)
Location: Open to remote candidates aligned to MST/PST time zones Denver, CO preferred
Duration: 6 Month C2c with potential for extension

Overview
We are seeking a highly capable Threat Intelligence Analyst with strong OSINT and investigative tradecraft to support a global security and risk function.
This role is focused on execution and analysis, not strategy-setting. You will work closely with senior leadership to investigate emerging threats, assess risk, and produce actionable intelligence across cyber, physical, reputational, and geopolitical domains.
This is not a SOC or monitoring role. Success in this position requires the ability to independently investigate ambiguous situations, identify meaningful signals in noisy environments, and translate findings into clear, defensible intelligence.

What You’ll Do
● Conduct deep OSINT investigations across social media, forums, niche communities, and open web sources
● Rapidly turn vague or evolving inputs into structured, high-confidence intelligence assessments
● Identify and analyze cyber, physical, reputational, and geopolitical threats
● Perform threat actor analysis, including attribution, narrative tracking, and cross-platform correlation
● Assess threat landscapes and how actors operate, evolve, and communicate
● Monitor global developments and determine how events may materialize into real-world risk
● Translate external signals into clear business and operational impact
● Leverage tools such as Recorded Future, Liferaft Navigator, and other intelligence platforms
● Collaborate closely with analysts and stakeholders to advance investigations and outcomes
● Produce executive-ready reports, briefings, and presentations

Example Problems You’ll Work On
● Investigating potential threats targeting a specific location, asset, or operation using open-source intelligence
● Identifying online chatter or sentiment that may indicate reputational or physical risk
● Assessing how geopolitical developments (e.g., conflict, supply chain disruption) may impact operations or industry
● Analyzing emerging threat actors and determining potential intent, capability, and impact

What We’re Looking For
● Elite OSINT capability — strong intuition for where to look, how to pivot sources, and how to extract signal from noise
● Proven ability to handle ad-hoc, ambiguous investigations and deliver clear outcomes
● Strong investigative tradecraft, including:
 ○ actor mapping
 ○ narrative tracking
 ○ cross-platform correlation
 ○ attribution analysis
● Deep understanding of threat landscapes and threat actor behavior
● Ability to analyze who threats come from, why they exist, and how they may materialize
● Strong capability in geopolitical analysis and connecting global events to business risk
● Ability to clearly articulate how external developments cascade into operational impact
● Exceptional written communication — able to produce structured, defensible, executive-ready intelligence
● Strong presentation and briefing skills
● Comfortable operating in fast-moving, high-ambiguity environments
● Collaborative mindset with the ability to work effectively across teams

Basic Qualifications
● 6+ years of experience in Threat Intelligence, OSINT, or investigative analysis
● Demonstrated experience conducting independent, end-to-end investigations
● Experience producing written intelligence reports and/or briefings for stakeholders

Strong Signals (Highly Preferred)
● Experience with Recorded Future, Liferaft, or similar threat intelligence platforms
● Background in Threat Intelligence teams, intelligence analysis, or investigative roles
● Exposure to cyber, geopolitical, physical, and/or reputational risk analysis
● Experience supporting business, operational, or security decision-making

What This Role Is NOT
To avoid misalignment, this role is not focused on:
● SIEM monitoring (Splunk, QRadar, etc.)
● Incident response or alert triage
● Vulnerability management or patching

Application Requirements (Required)
To be considered, candidates must be able to provide:
● 1–2 examples of investigative or intelligence work (sanitized if necessary)
● A writing sample demonstrating structured analysis and clear communication

Screening Exercise (Required)
Shortlisted candidates will complete a practical exercise such as:
● Investigating a potential threat scenario using open-source intelligence
● Identifying relevant actors, signals, and narratives
● Delivering a concise written assessment of risk and potential impact
We are evaluating analytical thinking, investigative approach, and communication — not just tools used.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 10240767
  • Position Id: 8950815
  • Posted 23 hours ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Remote or Buffalo, New York

Today

Full-time

USD 97,100.00 - 161,800.00 per year

Remote or Wilmington, Delaware

Today

Full-time

USD 106,700.00 - 177,900.00 per year

Remote or Chicago, Illinois

Today

Full-time

Remote or Honolulu, Hawaii

12d ago

Full-time

USD 106,124.00 - 150,000.00 per year

Search all similar jobs