Next Orbits INC

Senior OSINT Intelligence Analyst

⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Senior OSINT Intelligence Analyst on a 6-month contract in Denver, CO (remote acceptable). Pay rate is competitive. Requires 6+ years in Threat Intelligence, strong OSINT skills, and experience with intelligence platforms like Recorded Future.
🌎 - Country
United States
💱 - Currency
$ USD
-
💰 - Day rate
Unknown
-
🗓️ - Date
April 1, 2026
🕒 - Duration
More than 6 months
-
🏝️ - Location
Remote
-
📄 - Contract
Unknown
-
🔒 - Security
Unknown
-
📍 - Location detailed
United States
-
🧠 - Skills detailed
#Risk Analysis #Leadership #"ETL (Extract #Transform #Load)" #Vulnerability Management #Monitoring #Splunk #Security #Strategy
Role description
Title: Senior OSINT intelligence Analyst Duration: 6 Months Contract Location: Denver, CO (Preferred) | Remote (MST/PST) Client: Global Data Center Company Visa: USC & GC MOI: Skype Overview We are seeking a highly capable Senior OSINT intelligence Analyst with strong OSINT and investigative tradecraft to support a global security and risk function. This role is focused on execution and analysis, not strategy-setting. You will work closely with senior leadership to investigate emerging threats, assess risk, and produce actionable intelligence across cyber, physical, reputational, and geopolitical domains. This is not a SOC or monitoring role. Success in this position requires the ability to independently investigate ambiguous situations, identify meaningful signals in noisy environments, and translate findings into clear, defensible intelligence. What You’ll Do ●      Conduct deep OSINT investigations across social media, forums, niche communities, and open web sources ●      Rapidly turn vague or evolving inputs into structured, high-confidence intelligence assessments ●      Identify and analyze cyber, physical, reputational, and geopolitical threats ●      Perform threat actor analysis, including attribution, narrative tracking, and cross-platform correlation ●      Assess threat landscapes and how actors operate, evolve, and communicate ●      Monitor global developments and determine how events may materialize into real-world risk ●      Translate external signals into clear business and operational impact ●      Leverage tools such as Recorded Future, Liferaft Navigator, and other intelligence platforms ●      Collaborate closely with analysts and stakeholders to advance investigations and outcomes ●      Produce executive-ready reports, briefings, and presentations Example Problems You’ll Work On ●      Investigating potential threats targeting a specific location, asset, or operation using open-source intelligence ●      Identifying online chatter or sentiment that may indicate reputational or physical risk ●      Assessing how geopolitical developments (e.g., conflict, supply chain disruption) may impact operations or industry ●      Analyzing emerging threat actors and determining potential intent, capability, and impact What We’re Looking For ●      Elite OSINT capability — strong intuition for where to look, how to pivot sources, and how to extract signal from noise ●      Proven ability to handle ad-hoc, ambiguous investigations and deliver clear outcomes ●      Strong investigative tradecraft, including: ○      actor mapping ○      narrative tracking ○      cross-platform correlation ○      attribution analysis ●      Deep understanding of threat landscapes and threat actor behavior ●      Ability to analyze who threats come from, why they exist, and how they may materialize ●      Strong capability in geopolitical analysis and connecting global events to business risk ●      Ability to clearly articulate how external developments cascade into operational impact ●      Exceptional written communication — able to produce structured, defensible, executive-ready intelligence ●      Strong presentation and briefing skills ●      Comfortable operating in fast-moving, high-ambiguity environments ●      Collaborative mindset with the ability to work effectively across teams Basic Qualifications ●      6+ years of experience in Threat Intelligence, OSINT, or investigative analysis ●      Demonstrated experience conducting independent, end-to-end investigations ●      Experience producing written intelligence reports and/or briefings for stakeholders Strong Signals (Highly Preferred) ●      Experience with Recorded Future, Liferaft, or similar threat intelligence platforms ●      Background in Threat Intelligence teams, intelligence analysis, or investigative roles ●      Exposure to cyber, geopolitical, physical, and/or reputational risk analysis ●      Experience supporting business, operational, or security decision-making What This Role Is NOT To avoid misalignment, this role is not focused on: ●      SIEM monitoring (Splunk, QRadar, etc.) ●      Incident response or alert triage ●      Vulnerability management or patching Application Requirements (Required) To be considered, candidates must be able to provide: ●      1–2 examples of investigative or intelligence work (sanitized if necessary) ●      A writing sample demonstrating structured analysis and clear communication Screening Exercise (Required) Shortlisted candidates will complete a practical exercise such as: ●      Investigating a potential threat scenario using open-source intelligence ●      Identifying relevant actors, signals, and narratives ●      Delivering a concise written assessment of risk and potential impact • We are evaluating analytical thinking, investigative approach, and communication — not just tools used.