About The Position

As the Open Source Intelligence (OSINT) Analyst in the Protective Intelligence team, you are responsible for collecting, evaluating, and interpreting complex open-source data to support proactive threat identification and trend analysis. The role identifies analytical pivot points, connects disparate data sets, and carries intelligence investigations from initial collection through to final assessment. It includes scraping and analysing information from niche and hard-to-access online environments to identify, assess, and contextualise security-relevant threats to executives, personnel, facilities, and events, using both advanced analytical methods and Python-based tooling.

Requirements

  • Minimum 5 years of professional experience in Intelligence/OSINT/Protective Intelligence.
  • Strong analytic writing skills with the ability to produce concise and operationally relevant intelligence products.
  • Familiarity with threat actor behaviors, protest dynamics, doxxing tactics, and other security-relevant online activity.
  • Working knowledge of OPSEC best practices in intelligence collection.
  • Experience working in a distributed or remote environment, including collaboration across time zones and secure data-sharing practices.
  • Willingness and ability to travel domestically or internationally in support of special assignments or executive movements (valid passport preferred).
  • Proficiency in Python with demonstrated experience in building and maintaining scraping frameworks (e.g., BeautifulSoup, Scrapy, Selenium, Playwright, or equivalent).
  • Proven ability to identify and monitor niche or hard-to-reach online ecosystems.
  • Experience with data processing, enrichment, and storage (e.g., regex, JSON manipulation, APIs, database handling, PostgreSQL).

Nice To Haves

  • Certifications or formal training in the Intelligence Cycle, OSINT tradecraft, Python programming, or related disciplines are preferred. Relevant professional experience may be accepted in lieu of formal credentials. A Python proficiency assessment will be included as part of the selection process.
  • Prior experience in a corporate protective intelligence, executive security, or government security environment.
  • Experience integrating Python-based collection pipelines into intelligence platforms.
  • Familiarity with foreign language sources and/or language models for multilingual data exploitation.

Responsibilities

  • Develop and maintain Python-based scraping tools and automation scripts targeting a wide range of open-source platforms, including fringe forums, encrypted channels (where legally accessible), niche social media platforms, paste sites, and dark web markets.
  • Collect, clean, and structure large datasets from diverse online sources for analysis and long-term monitoring.
  • Design and implement ETL workflows, including metadata tagging, and automated data validation to ensure repeatable, scalable collection and analysis.
  • Normalize and harmonize collected data to enable seamless integration across analytic tools, dashboards, and internal intelligence systems.
  • Identify emerging threat actors, narratives, and patterns relevant to executive security and corporate protective intelligence missions.
  • Conduct continuous monitoring of online spaces for indicators of physical threats, coordinated campaigns, targeted harassment, or emerging security trends.
  • Produce clear, actionable intelligence deliverables for protective operations, including alerts, short assessments, and integration with broader intelligence products.
  • Collaborate closely with protective operations, cyber security, and executive protection teams to align collection priorities with operational requirements.
  • Maintain rigorous compliance with legal, ethical, and organizational guidelines for open-source collection.
  • Develop and maintain analytic tools, dashboards, and interfaces that enhance data visualization, querying, and integration with internal systems.
  • Contribute to user interface and user experience (UI/UX) design for internally developed tools to improve accessibility and analyst efficiency.
  • Evaluate emerging technologies, datasets, and platforms/vendors for relevance, applicability, and integration into existing protective intelligence workflows.
  • Assess data sources for continued value and reliability, ensuring resources are appropriately allocated and deprecating obsolete items.
  • Provide cross-functional support to team members as needed to ensure continuity of protective intelligence operations.

Benefits

  • Remote Working
  • Laptop reimbursement
  • New starter package to buy hardware essentials (headphones, monitor, etc)
  • Learning & Development opportunities
  • Medical, Dental, and Vision benefits coverage through Anthem for the employee and dependents
  • 401k
  • Health Savings Account
  • Life Insurance

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

251-500 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service