2 open positions available
The Protective Intelligence Analyst will conduct open-source intelligence monitoring to identify threats and provide support for executive protection operations. This includes producing intelligence briefs, monitoring social media, and coordinating with various teams to mitigate risks. | Candidates must have a minimum of 4 years of experience in intelligence analysis and strong analytic writing skills. Proficiency with commercial intelligence tools and an understanding of operational security principles are also required. | Who are we? IOG, is a technology company focused on Blockchain research and development. We are renowned for our scientific approach to blockchain development, emphasizing peer-reviewed research and formal methods to ensure security, scalability, and sustainability. Our projects include decentralized finance (DeFi), governance, and identity management, aiming to advance the capabilities and adoption of blockchain technology globally. We invest in the unknown, applying our curiosity and desire for positive change to everything we do. By fueling creativity, innovation, and progress within our teams, our products and services are designed for people to be fearless, to be changemakers. What the role involves: The Protective Intelligence team seeks a skilled Open Source Intelligence Analyst to provide support for executive movements, travel, and event security. This analyst will play a critical role in ensuring proactive situational awareness, supporting executive protection operations through open-source intelligence (OSINT) monitoring, travel assessments, and threat investigations. The position requires close coordination with Executive Protection (EP) agents, the Security Operations Center (SOC), and corporate leadership to identify, assess, and mitigate risks to executives, facilities, and company interests. Conduct continuous open-source and social-media monitoring to identify threats, hostile activity, or emerging risks targeting executives, events, or company facilities. Analyze online chatter, protest activity, and criminal or extremist indicators to provide timely alerts to the Executive Protection (EP) team and the Security Operations Center (SOC). Produce pre-travel and event intelligence briefs evaluating destination threat environments, including crime, terrorism, unrest, health, and environmental risks. Support EP advance planning by providing intelligence on neighborhoods, routes, and venues; identify areas of concern and recommend mitigation measures. Monitor global and local developments affecting executives while in transit; issue real-time updates on incidents, unrest, or hazards near executive locations. Conduct Person of Interest (POI) investigations to assess intent, capability, and threat level of individuals or groups exhibiting concerning behavior toward executives. Monitor social-media activity along executive travel routes, hotels, and venues to detect localized security concerns or emerging threats. Utilize analytical tools and recognition technologies to identify or confirm potential threat actors in proximity to executive movements. Prepare concise intelligence summaries or advisories highlighting security developments relevant to executive protection operations. Maintain automated travel monitoring and alert systems for active and planned executive travel. Serve as primary intelligence liaison to the EP Detail, ensuring clear information flow, deconfliction, and operational alignment. Develop and track early warning indicators signaling potential escalation or emerging threat activity to enable proactive risk mitigation. Support after-hours or on-call operations during executive travel. Travel domestically or internationally (up to 50%) in support of special assignments or executive movements. Lead monthly global risk assessments focused on security trends, terrorism, civil unrest, and geopolitical volatility affecting executive safety. Who you are: Required Qualifications Minimum 4 years of experience in intelligence analysis. Strong analytic writing skills with the ability to produce clear and actionable intelligence products. Understanding of OPSEC principles and ethical intelligence practices. Proficiency with commercial intelligence tools and monitoring platforms (e.g., Seerist, Crisis24, Dataminr, Shadow Dragon, Tangles, Ontic, etc). Ability to work in distributed teams and handle sensitive information under confidentiality. Ability to execute responsibilities discreetly and autonomously across diverse international environments and industry sectors. Valid US Passport. Preferred Qualifications Prior experience supporting executive protection, corporate security, or government protection missions. Experience integrating OSINT into operational risk management and travel security planning. Familiarity with protest dynamics, extremist activity, and executive-specific threat behaviours. Ability to operate independently with minimal supervision. Trainings or certifications in OSINT or intelligence analysis. The base salary for this position has a range of $90 - $100k per year at the commencement of employment. Any offer is determined by overall experience and performance during the interview process. This is only part of the total compensation package. All Employees Remote Working Laptop reimbursement New starter package to buy hardware essentials (headphones, monitor, etc) Learning & Development opportunities US Employees Medical, Dental, and Vision benefits coverage through Anthem for the employee and dependents 401k Health Savings Account Life Insurance At IOG, we value diversity and always treat all employees and job applicants based on merit, qualifications, competence, and talent. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Collect, analyze, and interpret complex open-source data to support proactive threat identification and trend analysis, developing tools and workflows for secure data collection and analysis. | Minimum 5 years of experience in Intelligence/OSINT/Protective Intelligence, proficiency in Python, experience with online ecosystems, and ability to produce concise intelligence products. | Who are we? IOG, is a technology company focused on Blockchain research and development. We are renowned for our scientific approach to blockchain development, emphasizing peer-reviewed research and formal methods to ensure security, scalability, and sustainability. Our projects include decentralized finance (DeFi), governance, and identity management, aiming to advance the capabilities and adoption of blockchain technology globally. We invest in the unknown, applying our curiosity and desire for positive change to everything we do. By fueling creativity, innovation, and progress within our teams, our products and services are designed for people to be fearless, to be changemakers. What the role involves: As the Open Source Intelligence (OSINT) Analyst in the Protective Intelligence team, you are responsible for collecting, evaluating, and interpreting complex open-source data to support proactive threat identification and trend analysis. The role identifies analytical pivot points, connects disparate data sets, and carries intelligence investigations from initial collection through to final assessment. It includes scraping and analysing information from niche and hard-to-access online environments to identify, assess, and contextualise security-relevant threats to executives, personnel, facilities, and events, using both advanced analytical methods and Python-based tooling. Develop and maintain Python-based scraping tools and automation scripts targeting a wide range of open-source platforms, including fringe forums, encrypted channels (where legally accessible), niche social media platforms, paste sites, and dark web markets. Collect, clean, and structure large datasets from diverse online sources for analysis and long-term monitoring. Design and implement ETL workflows, including metadata tagging, and automated data validation to ensure repeatable, scalable collection and analysis. Normalize and harmonize collected data to enable seamless integration across analytic tools, dashboards, and internal intelligence systems. Identify emerging threat actors, narratives, and patterns relevant to executive security and corporate protective intelligence missions. Conduct continuous monitoring of online spaces for indicators of physical threats, coordinated campaigns, targeted harassment, or emerging security trends. Produce clear, actionable intelligence deliverables for protective operations, including alerts, short assessments, and integration with broader intelligence products. Collaborate closely with protective operations, cyber security, and executive protection teams to align collection priorities with operational requirements. Maintain rigorous compliance with legal, ethical, and organizational guidelines for open-source collection. Who you are: Certifications or formal training in the Intelligence Cycle, OSINT tradecraft, Python programming, or related disciplines are preferred. Relevant professional experience may be accepted in lieu of formal credentials. A Python proficiency assessment will be included as part of the selection process. Minimum 5 years of professional experience in Intelligence/OSINT/Protective Intelligence. Strong analytic writing skills with the ability to produce concise and operationally relevant intelligence products. Familiarity with threat actor behaviors, protest dynamics, doxxing tactics, and other security-relevant online activity. Working knowledge of OPSEC best practices in intelligence collection. Experience working in a distributed or remote environment, including collaboration across time zones and secure data-sharing practices. Willingness and ability to travel domestically or internationally in support of special assignments or executive movements (valid passport preferred). Proficiency in Python with demonstrated experience in building and maintaining scraping frameworks (e.g., BeautifulSoup, Scrapy, Selenium, Playwright, or equivalent). Proven ability to identify and monitor niche or hard-to-reach online ecosystems. Experience with data processing, enrichment, and storage (e.g., regex, JSON manipulation, APIs, database handling, PostgreSQL). Prior experience in a corporate protective intelligence, executive security, or government security environment. Experience integrating Python-based collection pipelines into intelligence platforms. Familiarity with foreign language sources and/or language models for multilingual data exploitation. Develop and maintain analytic tools, dashboards, and interfaces that enhance data visualization, querying, and integration with internal systems. Contribute to user interface and user experience (UI/UX) design for internally developed tools to improve accessibility and analyst efficiency. Evaluate emerging technologies, datasets, and platforms/vendors for relevance, applicability, and integration into existing protective intelligence workflows. Assess data sources for continued value and reliability, ensuring resources are appropriately allocated and deprecating obsolete items. Provide cross-functional support to team members as needed to ensure continuity of protective intelligence operations. The base salary for this position has a range of $120 - $135k per year at the commencement of employment. Any offer is determined by overall experience and performance during the interview process. This is only part of the total compensation package. All Employees Remote Working Laptop reimbursement New starter package to buy hardware essentials (headphones, monitor, etc) Learning & Development opportunities US Employees Medical, Dental, and Vision benefits coverage through Anthem for the employee and dependents 401k Health Savings Account Life Insurance At IOG, we value diversity and always treat all employees and job applicants based on merit, qualifications, competence, and talent. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Create tailored applications specifically for IO Global with our AI-powered resume builder
Get Started for Free