Threat Intelligence Analyst (OSINT / Strategic Intelligence)

Remote β€’ Posted 18 hours ago β€’ Updated 18 hours ago
Contract Independent
Contract W2
Occasional Travel Required
Remote
65+
Fitment

Dice Job Match Scoreβ„’

🀯 Applying directly to the forehead...

Job Details

Skills

  • OSINT
  • Threat
  • intelligence
  • Splunk
  • SIEM

Summary

Threat Intelligence Analyst (OSINT / Strategic Intelligence)
Location: Open to remote candidates aligned to MST/PST time zones Denver, CO preferred
Client: VDC

Note from client
"Strategic Threat Intelligence Analyst

We need to recalibrate on this role immediately.

The profiles coming through are too cyber engineering / SOC-heavy (SIEM, Splunk, IR, vulnerability management). That is NOT what the client is looking for.

We are NOT looking for:
SOC AnalystsCyber Security EngineersIncident Response / Threat Hunting profilesSIEM-heavy candidates (Splunk, QRadar, etc.)
We ARE looking for a true Threat Intelligence / OSINT-focused analyst.

Target profile:
Strong OSINT experience (open web, social media, forums, dark web, niche communities)Experience tracking cyber threat actors (behavior, narratives, infrastructure, attribution)Ability to take ambiguous inputs → structured intelligenceExperience producing intelligence reports / briefings (not just alerts or tickets)Exposure to geopolitical risk and/or supply chain intelligenceBackground in Threat Intelligence teams, NOT pure engineering or SOC
Keywords to prioritize:
Threat Intelligence AnalystOSINT AnalystIntelligence AnalystStrategic IntelligenceCyber Threat Intelligence (CTI)
Strong signals:
Recorded Future, Flashpoint, Intel471, Mandiant, etc.Mentions of actor tracking, investigations, analysis, reportingWork that connects external threats → business impact
Hard filter:

If the resume is more than 50% tools (Splunk, SIEM, EDR, vulnerability scanning), reject.

We need investigators, not operators.
"

look for analysts who have good knowledge of the APAC region for intel gathering, geopolitics, and analysis

● Fast-moving environment with high visibility and impact

Overview
We are seeking a highly capable Threat Intelligence Analyst with strong OSINT and
investigative tradecraft to support a global security and risk function.
This role is focused on execution and analysis, not strategy-setting. You will work closely with
senior leadership to investigate emerging threats, assess risk, and produce actionable
intelligence across cyber, physical, reputational, and geopolitical domains.
This is not a SOC or monitoring role. Success in this position requires the ability to
independently investigate ambiguous situations, identify meaningful signals in noisy
environments, and translate findings into clear, defensible intelligence.
What You’ll Do
● Conduct deep OSINT investigations across social media, forums, niche communities,
and open web sources
● Rapidly turn vague or evolving inputs into structured, high-confidence intelligence
assessments
● Identify and analyze cyber, physical, reputational, and geopolitical threats
● Perform threat actor analysis, including attribution, narrative tracking, and cross-
platform correlation
● Assess threat landscapes and how actors operate, evolve, and communicate
● Monitor global developments and determine how events may materialize into real-
world risk
● Translate external signals into clear business and operational impact
● Leverage tools such as Recorded Future, Liferaft Navigator, and other intelligence
platforms
● Collaborate closely with analysts and stakeholders to advance investigations and
outcomes
● Produce executive-ready reports, briefings, and presentations
Example Problems You’ll Work On

● Investigating potential threats targeting a specific location, asset, or operation using
open-source intelligence
● Identifying online chatter or sentiment that may indicate reputational or physical risk
● Assessing how geopolitical developments (e.g., conflict, supply chain disruption) may
impact operations or industry
● Analyzing emerging threat actors and determining potential intent, capability, and impact
What We’re Looking For
● Elite OSINT capability — strong intuition for where to look, how to pivot sources, and
how to extract signal from noise
● Proven ability to handle ad-hoc, ambiguous investigations and deliver clear outcomes
● Strong investigative tradecraft, including:
β—‹ actor mapping
β—‹ narrative tracking
β—‹ cross-platform correlation
β—‹ attribution analysis
● Deep understanding of threat landscapes and threat actor behavior
● Ability to analyze who threats come from, why they exist, and how they may
materialize
● Strong capability in geopolitical analysis and connecting global events to business risk
● Ability to clearly articulate how external developments cascade into operational impact
● Exceptional written communication — able to produce structured, defensible,
executive-ready intelligence
● Strong presentation and briefing skills
● Comfortable operating in fast-moving, high-ambiguity environments
● Collaborative mindset with the ability to work effectively across teams
Basic Qualifications
● 6+ years of experience in Threat Intelligence, OSINT, or investigative analysis
● Demonstrated experience conducting independent, end-to-end investigations
● Experience producing written intelligence reports and/or briefings for stakeholders
Strong Signals (Highly Preferred)
● Experience with Recorded Future, Liferaft, or similar threat intelligence platforms
● Background in Threat Intelligence teams, intelligence analysis, or investigative
roles
● Exposure to cyber, geopolitical, physical, and/or reputational risk analysis
● Experience supporting business, operational, or security decision-making
What This Role Is NOT

To avoid misalignment, this role is not focused on:
● SIEM monitoring (Splunk, QRadar, etc.)
● Incident response or alert triage
● Vulnerability management or patching
Application Requirements (Required)
To be considered, candidates must be able to provide:
● 1–2 examples of investigative or intelligence work (sanitized if necessary)
● A writing sample demonstrating structured analysis and clear communication
Screening Exercise (Required)
Shortlisted candidates will complete a practical exercise such as:
● Investigating a potential threat scenario using open-source intelligence
● Identifying relevant actors, signals, and narratives
● Delivering a concise written assessment of risk and potential impact
We are evaluating analytical thinking, investigative approach, and communication — not
just tools used.

Employers have access to artificial intelligence language tools (β€œAI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 10240767
  • Position Id: 8924833
  • Posted 18 hours ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Remote or New York

β€’

Today

Full-time

USD 130,295.00 - 260,590.00 per year

Remote or Florida

β€’

Today

Full-time

USD 90,000.00 - 140,000.00 per year

Remote or Waltham, Massachusetts

β€’

Today

Full-time

USD 117,700.00 - 196,200.00 per year

Remote or Orlando, Florida

β€’

Today

Full-time

USD 62,700.00 - 110,630.00 per year

Search all similar jobs