CrawlJobs Logo

Analyst - Rapid Intelligence

brandwatch.com Logo

Brandwatch

Location Icon

Location:
Bulgaria

Category Icon
Category:

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

As an Analyst in our Rapid Intelligence team, you’ll use our in-house software to monitor a wide range of international sources and identify key developments for our clients. The role involves preparing daily and weekly news reports, writing and editing clear, concise summaries and selecting the most relevant content from global print and online media. You’ll play an important part in delivering real-time alerts and insights to major international clients, ensuring they stay informed about what matters most. To succeed in this role, you’ll need a sharp eye for detail and the ability to distinguish between what’s critical, important and non-essential. You’ll be joining a collaborative, fast-paced team that uses cutting-edge tools to track and analyse global news and emerging trends as they unfold.

Job Responsibility:

  • Use in-house software to monitor a wide range of international sources and identify key developments for clients
  • Prepare daily and weekly news reports
  • Write and edit clear, concise summaries
  • Select the most relevant content from global print and online media
  • Deliver real-time alerts and insights to major international clients
  • Collaborate with the team to deliver accurate, timely information to clients worldwide
  • Research across traditional media (print, online, radio, and TV) and digital platforms (including social media)
  • Prepare, edit, and send media content to major clients, working closely with partners in communications departments

Requirements:

  • Degree in Marketing, Communications, Media, Journalism, English, Business Administration, Social Sciences, or a related field
  • or equivalent industry experience (2+ years)
  • Proven editorial and research skills, demonstrated through academic or professional experience
  • Excellent written English with strong command of grammar and style
  • Analytical mindset with an interest in competitive intelligence and media analysis
  • Understanding of the information needs of executives and senior leadership teams
  • Proficient in MS Office and comfortable using digital tools
  • Able to work under time pressure and adapt to changing priorities
  • Strong ability to meet tight and variable deadlines
  • Reliable, organised, and detail-oriented approach to work
What we offer:
  • Health Insurance
  • Food Vouchers
  • Flexible benefits allowance
  • Employee Assistance Programme (EAP)
  • Cision Global Charitable Giving Program
  • Headspace

Additional Information:

Job Posted:
December 06, 2025

Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Analyst - Rapid Intelligence

Protective Intelligence Analyst

The Protective Intelligence Analyst is responsible for monitoring global events,...
Location
Location
United States , Santa Clara
Salary
Salary:
100000.00 USD / Year
aus.com Logo
Allied Universal®
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must possess one of the following: Bachelor’s degree in Security Intelligence, Threat Analysis or related field of study
  • Minimum of seven (7) years of formal civilian or military intelligence analysis experience in which your primary role was as an Intelligence Analyst, supporting the full intelligence cycle.
  • Minimum of five (5) years of civilian or military intelligence analysis experience
  • Fusion Centre/law enforcement/customs/security intelligence/military/commercial intelligence background
  • International experience, cultural awareness and sensitivity
  • Strong research, analysis, and critical thinking skills with expertise in open-source intelligence, social media tools, and assessment techniques to identify and evaluate complex threats
  • Excellent written, oral, and presentation communication abilities, including report writing and briefing senior stakeholders
  • Proficient in Microsoft Office Suite, SharePoint, and other relevant tools for data management and reporting
  • Highly organized, detail-oriented, and capable of managing multiple priorities independently or collaboratively across time zones and compressed timelines
  • Initiative and business acumen with minimal supervision
Job Responsibility
Job Responsibility
  • Manage the “intelligence cycle” through the systematic collection, collation, evaluation, interpretation and analysis of information and process this into timely, accurate, and relevant intelligence
  • Assure quality of intelligence products
  • edit and validate reports prior to dissemination. Evaluate Global Security Operations Center (GSOC) staff basic intelligence work product
  • Assess intel procedures specific to the GSOC
  • develop/update guidance documents and processes to eliminate gaps in intelligence gathering and reporting
  • Responsible for producing intelligence products that will aid in mitigating risk, exposure, and impacts to the client’s corporate critical infrastructure (personnel, facilities and assets, business operations, and reputation), globally.
  • Prepare analyses, assessments, verbal briefs or other products by applying expert judgment and specialized experience in interpreting information and making decisions
  • Produce high-quality threat assessments, security alerts, country risk assessments, multi-media presentations and other relevant security and awareness products for dissemination to relevant audiences across the organization as determined by the Intelligence Analyst under the guidelines provided by Senior Management
  • Take initiative to develop new intelligence products and reporting methods to address emerging vulnerabilities
  • formalize and streamline internal processes
What we offer
What we offer
  • Employee Assistance Program
  • Employee Discount Program
  • Tuition Discount Program
  • Training & Career Development Programs
  • Fulltime
Read More
Arrow Right

Forward Deployed AI Engineer

In this role, you'll be the hands-on AI builder defense and intelligence custome...
Location
Location
Finland; Sweden; Netherlands; Poland; United Arab Emirates; Germany , Espoo; Stockholm; Breda; Warsaw; Abu Dhabi; Berlin
Salary
Salary:
Not provided
iceye.com Logo
ICEYE
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years hands-on software engineering building and deploying production systems
  • Strong Python programming skills (required) plus one of: Go, TypeScript, or Rust
  • Hands-on experience with LLMs, prompt engineering, and RAG systems
  • Working knowledge of agent frameworks (LangChain, LangGraph, pydantic-ai) and vector databases
  • Experience with Docker and deploying in secure / isolated / air-gapped environments
  • Practical experience with APIs, data pipelines, and integrating systems in production
  • Familiarity with Linux and basic Kubernetes operations
  • Builder mindset: ship fast, iterate with feedback, and prioritize working solutions over perfect architecture
  • Strong communication + customer engagement, able to work embedded with intelligence analysts / military operators
  • Strong spoken and written English, able to explain technical concepts to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Platform Deployment & Integration: Deploy ICEYE's intelligence platform into customer secure environments (on-premise, air-gapped networks, classified data centers)
  • Build and maintain containerized applications (Docker) and manage deployments in customer Kubernetes clusters
  • Develop APIs and data pipelines connecting ICEYE systems to customer C4ISR infrastructure and intelligence tools
  • Troubleshoot deployment issues in disconnected environments without external internet access
  • AI Solution Development & Customization: Build Retrieval-Augmented Generation (RAG) systems that combine ICEYE SAR data with customer intelligence documents for context-aware analysis
  • Develop AI agents and workflows using frameworks like LangChain, LangGraph, or similar tools to automate analytical tasks
  • Implement prompt engineering strategies and conversational AI interfaces that enable analysts to query satellite data using natural language
  • Create Model Context Protocol (MCP) integrations connecting AI systems with customer data sources
  • Data Fusion & Intelligence Workflows: Build data fusion pipelines combining SAR imagery with additional intelligence sources (AIS, RF signals, optical imagery, SIGINT)
  • Develop automated workflows that correlate and cross-reference information across different data modalities
What we offer
What we offer
  • Our benefits are designed to support your health and wellbeing—at work and beyond. We keep improving them based on employee feedback, and offerings vary by location
  • Fulltime
Read More
Arrow Right

Data Analyst II

A leading organization in the e-commerce and technology industry is seeking a Da...
Location
Location
United States , Nashville
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Business, Finance, Engineering, Economics, or a related discipline
  • 3-6 years of experience in financial modeling, forecasting, capacity planning, or operational analysis
  • Strong analytical capabilities with hands-on experience building models and analyzing large datasets
  • Advanced proficiency with MS Excel (pivot tables, lookups, modeling functions)
  • SQL knowledge strongly preferred
  • Exceptional written and verbal communication skills
  • Proven ability to work independently, pivot quickly, and manage competing priorities
  • High attention to detail and accuracy in fast-paced, continuously changing environments
Job Responsibility
Job Responsibility
  • Conduct economic, financial, and market analysis across capacity planning, pricing, cost modeling, and return-on-investment scenarios
  • Build, maintain, and refine financial and operational models to support forecasting, variance analysis, and strategic decision-making
  • Support capacity forecasting, budgeting, and reporting across OpEx, CapEx, and resource allocation initiatives
  • Track, interpret, and analyze large and complex data sets tied to fleet repair, utilization, and operations
  • Design, enhance, and coordinate the development of analytical systems, dashboards, and reporting tools to support a rapidly evolving business environment
  • Ensure analytical tools scale with business growth and remain aligned with operational needs
  • Partner with program managers and other stakeholders to validate assumptions, identify trends, and deliver insights
  • Convert data findings into actionable recommendations for leadership and operational teams
  • Participate in daily collaboration with team members
  • limited interaction with developers or technical engineering teams
What we offer
What we offer
  • medical
  • vision
  • dental
  • life and disability insurance
  • 401(k) plan
  • free online training
  • Fulltime
Read More
Arrow Right

Director, Rapid Response

We are seeking a Director of Rapid Response for our Unit 42 Threat Intelligence ...
Location
Location
United States , Santa Clara
Salary
Salary:
243800.00 - 334575.00 USD / Year
paloaltonetworks.com Logo
Palo Alto Networks
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Highly organized with the ability to manage complex multi-tasking, prioritize effectively, and triage competing demands in a fast-paced environment
  • Ability to advance objectives across matrixed teams and influence without direct reporting authority
  • Strong public speaking and presentation skills, with the ability to effectively communicate complex threat intelligence information to diverse audiences, including executives, conferences, and internal stakeholders
  • Demonstrated ability to coordinate with cross-organizational threat analysts, facilitating collaboration, and aligning efforts to achieve common goals
  • Proven experience leading threat intelligence projects, integrating intelligence systems, and implementing new processes for multiple stakeholders
  • Demonstrated experience speaking at conferences and with customers on research performed
  • Proven experience throughout the cyber threat intelligence lifecycle, from data collection to production of intelligence outputs, such as blogs and whitepapers
  • Experience writing and editing threat intelligence reporting.
Job Responsibility
Job Responsibility
  • Collaborate with threat analysts, detection engineers, and security consultants from various teams and departments within the organization
  • Coordinate and balance priorities across diverse teams, including Communications, Legal, Policy, Marketing, to align external and internal messaging around global cyber events
  • Triage and prioritize threat intelligence research requests during Rapid Response engagements
  • Work closely with the external engagement team to manage the flow of Rapid Response content, including blogs, social media content, and updates on major cyber events
  • Contribute to thought leadership initiatives by sharing insights and expertise on Unit 42 Threat Vector podcasts, at security conferences, and through internal and external executive briefings
  • Establish and execute internal projects to mature and scale our Rapid Response capabilities
  • Harness the full weight of the company's unique data holdings, including security product telemetry, front line Incident Response (IR) and Managed Detection and Response (MDR) data, and Intel Holdings.
  • Fulltime
Read More
Arrow Right

Security Operations Analyst

Location
Location
Spain , Valencia
Salary
Salary:
Not provided
united-its.com Logo
United ITs
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A minimum of five (5) years of relevant experience in information technology field, including triage of alerts and supporting security incidents
  • Proven experience on administering a SIEM platform, preferably either Splunk or Microsoft Sentinel SIEM
  • Proven experience with the usual toolbox available in a SOC (e.g., SIEMs, EDRs) and being able to autonomously perform technical analysis of security threats and collaborate with Incident Response team
  • Deep knowledge of Microsoft Security Tools (e.g. M365, Cloud App Security, Azure, Defender for Endpoints, Azure Security, Azure Sentinel and XDR
  • Deep Knowledge of Cloud technologies (e.g. Azure, AWS and GCP)
  • Deep knowledge of SIEM tools like Splunk, QRadar, ArcSight, MS Sentinel, ELK Stack
  • Knowledge of at least one EDR solution (MS Defender for Endpoint, CrowdStrike)
  • Knowledge of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols
  • Knowledge of email security, network monitoring, and incident response
  • Knowledge of Linux/Mac/Windows
Job Responsibility
Job Responsibility
  • In close collaboration, build, adjust and implement analytics and detection rules for SIEM, EDR and AV
  • Under guidance, participate in cybersecurity architecture review of new or existing technical solutions and provide recommendations for improvement
  • Work directly with cyber threat intelligence analysts to convert intelligence into useful detection rules
  • Collaborate with incident response team to rapidly build detection rules and signatures as needed, as well as maintaining and improving existing detection rules
  • Contribute to the preparation of KPIs for cybersecurity operations capabilities
  • Monitor, triage, and investigate security alerts across Microsoft security tools, AWS, SIEM platforms, and EDR solutions
  • Identify root causes, direct remediation and recovery actions, and support incident response efforts
  • Follow structured analytical processes and collaborate with other analysts and teams to ensure effective threat management
  • Prepare and present security reports, summaries, and findings to clients
  • Contribute to the improvement of CSOC processes and procedures, including quality control procedures, documentation and knowledge base updates
  • Fulltime
Read More
Arrow Right

Senior Business Intelligence Analyst

As a Senior Business Intelligence Analyst at Eucalyptus, you will play a crucial...
Location
Location
Philippines , Manila
Salary
Salary:
Not provided
eucalyptus.health Logo
Eucalyptus
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8–15 years of experience in an expanded capacity from Business Intelligence analyst with excellent capability on building & maintaining dashboards, preferably in a fast-paced or startup environment
  • Experience translating data into insights that drive business decisions
  • Bachelor’s degree in Business, Statistics, Mathematics, Computer Science, or a related field – or equivalent practical experience in data analytics
  • Hands-on experience with modern BI/reporting tools is a must – especially Tableau and Metabase
  • Proficiency in SQL for data querying
  • Strong analytical and problem-solving skills with the ability to interpret complex datasets and draw meaningful insights
  • Excellent communication skills – you can explain data insights and technical concepts in simple terms to business stakeholders
  • Based in the Philippines
  • Willing to work hours that align closely primarily with Australian business hours for smooth remote collaboration
Job Responsibility
Job Responsibility
  • Overhaul and manage our BI dashboards: Own the migration and reorganization of Tableau dashboards and Metabase charts, including cleaning up existing content and implementing consistent folder structures and templates for scalability
  • Mentor and support junior analysts: Provide guidance on analytics best practices, tools, and frameworks, contributing to overall upskilling and capability building
  • Drive data initiatives for new international markets: Our Expansion Team (e.g. Canada, Japan and future offices) are focused on rapid growth and impact. You’ll work across the full conversion funnel — from acquisition to retention — to identify opportunities, suggest improvements, and guide data-informed decision-making
  • Contribute to market launches and operational setup: By building dashboards, defining success metrics, and embedding data into operational workflows to ensure scalable, insight-led growth in new regions
  • Build source-of-truth reports: Create and maintain core metric reference dashboards that serve as the single source of truth for key company health metrics and KPIs
  • Establish data governance: Implement naming conventions, tagging, and metadata documentation within our BI tools to improve discoverability and trust in data assets
  • Enable self-serve analytics: Act as a support partner for business teams as they adopt the new self-service analytics structure – providing training, onboarding materials, and hands-on help so teams can answer their own questions with data
  • Develop decision-grade insights: Partner with product, growth, and operations teams to design and build insightful dashboards that inform strategic decisions (e.g. experiment results, funnel cohort analyses, operational performance)
  • Monitor usage and optimize: Own analytics on analytics – track who is using which reports in Tableau/Metabase, analyze usage patterns, and identify opportunities to improve or deprecate dashboards for efficiency
  • Drive innovation: Once foundational work is stable, contribute to advanced data projects – potentially including AI-driven analytics products and other data experiments to keep Euc at the cutting edge
What we offer
What we offer
  • Learning budgets, conferences, certifications, peer shadowing, and a global knowledge-sharing culture
  • Wellness budgets, social clubs, hybrid work arrangement, and initiatives that help you stay balanced and connected
  • Comprehensive health coverage (including up to 2 dependents), vacation, sick, and parental leaves, 13th-month pay, statutory benefits, and transport allowance
  • Fulltime
Read More
Arrow Right
New

Intel Analyst

Allied Universal® is hiring a Global Security (GS) Intel Analyst. The Global Sec...
Location
Location
United States , Chicago
Salary
Salary:
75000.00 USD / Year
aus.com Logo
Allied Universal®
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • High school diploma or equivalent
  • Minimum of five (5) years of civilian or military intelligence analysis experience
  • Minimum of one (1) year of experience in OSINT research, intelligence analysis, investigations, brand protection, or related security/analytic functions
  • Fusion Centre/law enforcement/customs/security intelligence/military/commercial intelligence background
  • International experience, cultural awareness, and sensitivity
  • Experience working in a regulated industry (healthcare, pharmaceuticals, medical devices, etc.)
  • Strong research, analysis, and critical thinking skills with expertise in open-source intelligence, social media tools, and assessment techniques to identify and evaluate complex threats
  • Knowledge of online marketplaces, social media platforms, and digital ecosystems
  • Demonstrated knowledge and application of OSINT tools and techniques
  • Ability to analyze large amounts of data and synthesize findings into actionable intelligence
Job Responsibility
Job Responsibility
  • Manage the 'intelligence cycle' through the systematic collection, collation, evaluation, interpretation and analysis of information and process this into timely, accurate, and relevant intelligence
  • Assess intel procedures
  • develop/update guidance documents and processes to eliminate gaps in intelligence gathering and reporting
  • Responsible for deciphering, evaluating, and prioritizing information, intelligence, and events in a meaningful way that will aid the business in mitigating risk, exposure, and impacts globally to its people, assets, and brand
  • Prepare analyses, assessments, verbal briefs or other products by applying expert judgment and specialized experience in interpreting information and making decisions
  • Monitor global events-including civil unrest, natural hazards, geopolitics, and crime-using open-source intelligence platforms to identify risks to customer assets
  • Maintain awareness of the international climate and assess its potential impact on operations
  • Conduct in-depth research and analysis to support global customer operations and threat mitigation efforts
  • Identify and report on emerging threats in operational regions, serving as the analytical focal point for intelligence efforts
  • Utilize crisis communication processes to rapidly inform leadership of emerging risks and provide ongoing situational updates
What we offer
What we offer
  • Medical, dental, vision, basic life, AD&D, and disability insurance
  • Eligibility for our retirement plans
  • Eight paid holidays annually, five sick days, and four personal days
  • Vacation time offered at an accrual rate of 3.08 hours biweekly
  • Fulltime
Read More
Arrow Right

Threat Analyst

As a Threat Analyst at NTT DATA, you will be responsible for researching and ana...
Location
Location
Romania , Sibiu
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Computer Science, International Relations, or Intelligence Studies strongly preferred
  • Minimum 1–3 years of experience in cybersecurity or IT security roles
  • Advanced scripting capabilities (Python, PowerShell preferred)
  • Strong proficiency with threat intelligence platforms like MISP, ThreatConnect, or Anomali, Security Alliance
  • Deep familiarity with MITRE ATT&CK framework, dark web monitoring techniques, and attack simulation techniques
  • Demonstrated skills in cyber threat modeling, malware reverse engineering, and API-triggered automation
  • Strong analytical and problem-solving abilities
  • Excellent written and verbal communication skills
  • Attention to detail and accuracy in technical analysis
  • Direct experience working in government, military, or intelligence organizations advantageous
Job Responsibility
Job Responsibility
  • Research, track, and analyze Indicators of Compromise (IOCs) and threat actor profiles using sources that include open-source (OSINT), dark web forums, government feeds, and commercial intelligence platforms
  • Conduct detailed analysis of Threat Actor Tactics, Techniques, and Procedures (TTPs) and malware
  • Deliver actionable intelligence insights to enhance detection, prevention, and response embedded within the threat lifecycle
  • Develop and deliver weekly threat briefs, annual landscape overviews, and ad-hoc risk signals for both technical and non-technical audiences
  • Produce detailed reports based on industry-specific campaigns or identified vulnerability patterns
  • Communicate emerging threats to relevant technical stakeholders, influencing rapid mitigation strategy formulation
  • Integrate threat intelligence feeds (TIPs) into platforms like SIEM or SOAR, prioritizing automation workflows where required
  • Track and assess malware campaigns, underground forums, and marketplaces to identify emerging attack vectors
  • Analyze threat data to produce predictive insights about probable trends and future adversarial strategies
  • Represent NTT DATA at external security forums and intelligence-sharing communities
What we offer
What we offer
  • Smooth integration and a supportive mentor
  • Choose from Remote, Hybrid or Office work opportunities
  • Projects have different working hours to suit your needs
  • Sponsored certifications, trainings and top e-learning platforms
  • Private Health Insurance
  • Individual coaching sessions or joining our accredited Coaching School
  • Epic parties or themed events
  • Fulltime
Read More
Arrow Right