CrawlJobs Logo

Identity Intelligence Analyst

amentum.com Logo

Amentum

Location Icon

Location:
United States , Charlottesville

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

60000.00 - 65000.00 USD / Year

Job Description:

Our industry-leading program advances the use of tactical and strategic Identity Intelligence tradecraft to inform decision-makers, from ground force commanders to international partners and national security policymakers. Our employees lead the Intelligence community in providing superior Identity Intelligence analysis and developing innovative data-driven solutions, supporting the customer through intelligence analysis and tradecraft proliferation.

Job Responsibility:

  • Producing all-source Identity Intelligence (I2) analysis and intelligence products in support of global missions and customers
  • Apply an understanding of I2 tradecraft to produce analysis focused on the full range of unique identifying human characteristics and modalities to include, but not limited to, fingerprints, deoxyribonucleic acid (DNA), iris scans, voiceprints, facial recognition features, and behavior for the purposes of identifying and tracking persons and networks
  • Fusing identity attributes, such as biographical, biological, behavioral, contextual, and reputational information related to individuals and intelligence associated with those attributes, to identify and assess threats of individuals and networks, their capabilities and capacity, centers of gravity, objectives, intent, and potential courses of action

Requirements:

  • Possesses a working knowledge of applicable databases
  • ability to compile, analyze and synthesize necessary data to provide an assessment within the scope of the assigned mission and government approved format
  • Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures
  • Experience with research and intelligence analytic techniques, strong research and writing skills, and experience with basic computer applications, search engines, and data processing systems
  • Possesses a basic understanding of Identity Intelligence and targeting tradecraft
  • Capable of producing intelligence analysis with oversight and direction
  • Familiarity with I2 analytical tools and databases, including BI2R/I2AR, SOFEX, Palantir, AIDP/Maven, Query Tree, Chrome, Analyst Notebook, Open-Source research, Biometric Automated Toolset (BAT), TIDE, Pulse, QLIX
  • Demonstrates the ability to participate in analytical debate and be receptive to constructive criticism
  • Demonstrates the ability to brief mission and production related topics to internal and external government clients, military personnel, and contract audiences
  • Ability to operate as a member of a team
  • Ability to meet appropriate COCOM pre-deployment requirements and deploy to OCONUS locations for a minimum of 6 months
  • Clearance Required: TS/SCI
  • Minimum Education: High School Education
  • Minimum Years of Experience: 6 yrs relevant experience, 2 yrs w/ Associate’s Degree
What we offer:
  • Health, dental, and vision insurance
  • Paid time off and holidays
  • Retirement benefits (including 401(k) matching)
  • Educational reimbursement
  • Parental leave
  • Employee stock purchase plan
  • Tax-saving options
  • Disability and life insurance
  • Pet insurance

Additional Information:

Job Posted:
February 16, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Identity Intelligence Analyst

New

Junior Identity Intelligence Analyst

Are you ready to kick-start your career in intelligence analysis and contribute ...
Location
Location
United States , Quantico
Salary
Salary:
27.00 - 27.41 USD / Hour
aevex.com Logo
AEVEX Aerospace
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 0-3 years of experience in the US Military, Law Enforcement, or Intelligence Community, with a focus on identity intelligence, SIGINT, or similar fields
  • U.S. citizenship with a current Single Scope Background Investigation (SSBI) / T5 investigation and eligibility for Sensitive Compartmented Information (SCI)
  • Experience using DONISIS, BI2R, and similar systems for research and exploitation
  • Proficient in standard office software, including MS Office, data entry, and collaboration tools
  • Ability to synthesize information from multiple sources and produce coherent, actionable intelligence products
  • Strong teamwork and communication skills
  • Ability to type accurately and efficiently
  • Meet minimum physical requirements to perform all duties and responsibilities as defined by management
  • Be prepared to sit, talk, listen, and frequently walk, use hands, and reach with arms
  • Occasionally required to stand and lift/move up to 30 pounds
Job Responsibility
Job Responsibility
  • Conduct multi-source intelligence analysis, including triage, research, exploitation, and dissemination of identity-related information
  • Provide expertise across all facets of identity intelligence analysis, including biometrics, forensics, facial recognition, and cellular exploitation
  • Develop a range of analytical outputs, from biometric analysis reports to SIGINT and CELLEX-derived intelligence products
  • Utilize DONISIS, BI2R, and other intelligence systems to research, exploit, and manage identity-related information
  • Work in a shift environment to provide continuous support for identity intelligence operations
  • Coordinate with multiple organizations, including the Naval Criminal Investigative Service (NCIS) and FBI, to share intelligence
  • Use forensic methodologies to identify and exploit intelligence from seized documents and media
  • Extract and analyze facial images from various media sources, using facial recognition software to produce Facial Comparison Analysis Reports (FCAR)
What we offer
What we offer
  • 401(k)-retirement plan
  • comprehensive Medical, Dental, Vision, Disability and Life insurance group coverage with a portion of the premiums paid by the company
  • professional development funds
  • Employee Assistance Plan (EAP) with counseling, legal help, child and elder care support
  • Fulltime
Read More
Arrow Right

Business Analyst - Global Data Intelligence

This is your opportunity to join Demant’s Hearing Care (Retail) IT organization ...
Location
Location
Malaysia , Kuala Lumpur
Salary
Salary:
Not provided
demant.com Logo
Demant
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Hands-on experience managing requests and coordinating workflows, preferably using ServiceNow
  • Proficient in access management through Azure Active Directory / Entra ID or similar identity platforms
  • Skilled in root cause analysis and resolution within large-scale Data Cloud Platform environments
  • Strong analytical mindset with the ability to distinguish business needs from incidents, assess impact, and translate requirements into actionable user stories
  • Clear and effective communicator, capable of delivering timely updates to stakeholders and simplifying complex technical concepts
  • Collaborative team player, actively contributing during development, reviews, and incident resolution
  • Demonstrated adaptability and success in dynamic environments with frequent changes and new business applications
  • Proficiency in English, which is our corporate language, is essential
Job Responsibility
Job Responsibility
  • Drive operational excellence of request management and workflow coordination, ensuring smooth handling from request to resolution
  • Collaborate with stakeholders and Product Owners to understand business requirements and incidents, enabling effective prioritisation and solution design
  • Manage user access with precision, ensuring alignment with governance policies and maintaining secure, compliant environments
  • Keep stakeholders informed with timely updates on incidents and progress, building trust through transparency and responsiveness
  • Analyse platform alerts to identify root causes and validate issues. Communicate findings and potential impacts effectively to relevant stakeholders and agile teams
  • Develop and maintain impactful data models and conduct peer review to uphold quality and consistency across the codebase
What we offer
What we offer
  • A job in a growing, international company with good career opportunities
  • State of the art technology and work in an exciting industry
  • Good work life balance with flexible working conditions
  • A culture of teamwork, based on knowledge sharing, professional respect, kindness
  • We believe in, and encourage, open and honest communication, and we hope to put a smile on your face every workday
  • A full-time independent and responsible position
  • Training, conferences, and the opportunity for self-development
  • We offer the opportunity to travel for work global
  • Fulltime
Read More
Arrow Right
New

Counterterrorism Biometrics Intelligence Analyst

BAE Systems is seeking to hire multiple Mid-Level Counterterrorism Biometrics In...
Location
Location
United States , McLean
Salary
Salary:
97008.00 - 164914.00 USD / Year
baesystems.com Logo
Baesystems
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • BA/BS (6 years of work experience may be substituted for a Bachelor’s degree)
  • minimum of 3 years of direct experience
  • Facial Recognition experience
  • Experience working with biometric systems
  • Experience performing biometric analysis
  • Experience analyzing IC data
  • Organization skills with strong attention to detail and excellent oral and written communication skills
  • Demonstrated ability to participate in cross-functional planning, coordination, and task execution situations
  • Experience with biometric and analytical tools and databases
  • Strong problem-solving, analytic, and written and oral communication skills
Job Responsibility
Job Responsibility
  • Provide biometrics-enabled identity analysis
  • Perform extensive searches in variety of biometric systems or repositories (internal or external systems) to formulate an identity resolution/adjudication analysis
  • Analyze and interpret biometric reports and communicate findings to appointed stakeholders
  • Maintain continuous knowledge of biometric technologies, capabilities, and databases
  • Support counterterrorism intelligence integration
  • Leverage analytic tools and databases to evaluate information that bolsters the U.S. Government’s response to and prevention of potential threats
What we offer
What we offer
  • Health, dental, and vision insurance
  • Health savings accounts
  • 401(k) savings plan
  • Disability coverage
  • Life and accident insurance
  • Employee assistance program
  • Legal plan
  • Discounts on home, auto, and pet insurance
  • Paid time off
  • Paid holidays
  • Fulltime
Read More
Arrow Right
New

Senior Applied AI Scientist

Microsoft Sentinel Platform NEXT R&D labs is the strategic incubation engine beh...
Location
Location
United States , Multiple Locations
Salary
Salary:
119800.00 - 234700.00 USD / Year
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's Degree in Statistics, Econometrics, Computer Science, Electrical or Computer Engineering, or related field AND 4+ years related experience (e.g., statistics predictive analytics, research) OR Master's Degree in Statistics, Econometrics, Computer Science, Electrical or Computer Engineering, or related field AND 3+ years related experience (e.g., statistics, predictive analytics, research) OR Doctorate in Statistics, Econometrics, Computer Science, Electrical or Computer Engineering, or related field AND 1+ year(s) related experience (e.g., statistics, predictive analytics, research) OR equivalent experience
  • Candidates must be able to meet Microsoft, customer and/or government security screening requirements are required for this role
  • This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter
  • Master's Degree in Statistics, Econometrics, Computer Science, Electrical or Computer Engineering, or related field AND 6+ years related experience (e.g., statistics, predictive analytics, research) OR Doctorate in Statistics, Econometrics, Computer Science, Electrical or Computer Engineering, or related field AND 3+ years related experience (e.g., statistics, predictive analytics, research) OR equivalent experience
  • 3+ years working with Machine Learning (ML)/Artificial Intelligence (AI) systems (e.g., Large Language Models (LLM/LRM)/Generative AI (GenAI), retrieval/Retrieval-Augmented Generation (RAG), model serving, experimentation platforms, data pipelines) including establishing evaluation metrics and improving model quality
  • Demonstrated success driving zero-to-one (0→1) initiatives
  • ML background and hands-on experience
  • Experience with ML lifecycle: model training, fine-tuning, evaluation, continuous monitoring, and more
  • Coding ability in one or more languages (e.g., Python, C#, C++, Rust, JavaScript/TypeScript)
  • Familiarity and previous work in the field of cybersecurity (e.g., threat detection/response, SIEM/SOAR, identity, endpoint, cloud security) and familiarity with analyst workflows
Job Responsibility
Job Responsibility
  • AI/ML Research: design, development, and analysis of novel AI and machine learning models and algorithms for security and enterprise-scale applications
  • Innovate Across Domains: Explore and apply a broad spectrum of AI/ML techniques, including deep learning, Bayesian probabilistic modeling, classical ML, generative models, and hybrid approaches
  • Experimentation & Evaluation: Design and execute experiments, simulations, and evaluations to validate models and system performance, ensuring measurable improvements
  • Collaboration: Partner with engineering, product, and research teams to translate scientific advances into robust, scalable, and production-ready solutions
  • Customer Impact: Engage with enterprise customers and field teams to co-design solutions, gather feedback, and iterate quickly based on real-world telemetry and outcomes
  • Fulltime
Read More
Arrow Right

Principal AI Engineer

NEXT is the incubation and research arm of Microsoft Security AI (MSECAI), build...
Location
Location
United States , Redmond
Salary
Salary:
139900.00 - 274800.00 USD / Year
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's Degree in Computer Science or related technical field AND 6+ years technical engineering experience with coding in languages including, but not limited to, C, C++, C#, Java, JavaScript, or Python OR equivalent experience
  • Ability to meet Microsoft, customer and/or government security screening requirements
  • This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter
  • Master's Degree in Computer Science or related technical field AND 8+ years technical engineering experience with coding in languages including, but not limited to, C, C++, C#, Java, JavaScript, or Python OR Bachelor's Degree in Computer Science or related technical field AND 12+ years technical engineering experience with coding in languages including, but not limited to, C, C++, C#, Java, JavaScript, or Python OR equivalent experience
  • 6+ years of experience driving complex, cross-functional initiatives
  • experience leading without authority across multiple teams
  • 3+ years working with Machine Learning (ML)/Artificial Intelligence (AI) systems (e.g., Large Language Models (LLMs)/Generative AI (GenAI), retrieval/Retrieval-Augmented Generation (RAG), model serving, experimentation platforms, data pipelines) including establishing evaluation metrics and improving model quality
  • Experienced in program leadership, communication, and stakeholder management skills with the ability to influence leaders and make data-informed decisions
  • Proven track record shipping cloud services or platforms at scale (multi-tenant, high-throughput) with measurable customer and business impact
  • Security domain expertise (e.g., threat detection/response, SIEM/SOAR, identity, endpoint, cloud security) and familiarity with analyst workflows
Job Responsibility
Job Responsibility
  • Define the technical vision, strategy, and roadmap for AI-native incubation initiatives
  • align stakeholders across Security Copilot, Defender, Sentinel, Entra, Purview, Azure AI Foundry and Microsoft AI to deliver cohesive customer value
  • Lead zero-to-one (0→1) incubation R&D through MVP and private preview, then drive one-to-many (1→N) platformization and scale to GA
  • make principled tradeoffs across quality, latency, reliability, cost, and safety
  • Provide hands-on technical leadership: prototype in code, review designs and Pull Requests (PRs), define Application Programming Interfaces (APIs)/data contracts, build comprehensive well-architected systems, and establish evaluation frameworks to de-risk complex systems
  • Set strategy for AI-native security experiences and platform components: where to use Large Language Models (LLMs) versus classical Machine Learning (ML), retrieval/Retrieval-Augmented Generation (RAG) design, grounding, model routing/fallbacks, and safety guardrails to meet customer outcomes and Service Level Objectives (SLOs)
  • Ensure Responsible AI, privacy, and security guardrails are designed in from day one, coordinate safety reviews, abuse prevention, compliance, and incident readiness
  • Lead v-teams and mentor others
  • cultivate a builder culture of velocity and quality as a force multiplier
  • Engage directly with enterprise customers and field to co-design solutions and land adoption
  • Fulltime
Read More
Arrow Right

Counterterrorism Analyst MID

Are you interested in using your skills to help shape the Cyber, Security, & Int...
Location
Location
United States , Reston
Salary
Salary:
105000.00 USD / Year
amentum.com Logo
Amentum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • TS/SCI with Poly clearance
  • High School/GED
  • 5 years of experience
  • 8 years of experience related to the specific labor category with at least a portion of the experience within the last 2 years (preferred)
  • Bachelor’s degree in an area related to the labor category from an accredited college or university (preferred)
  • Previous CT experience in a national level intelligence agency is highly desired
  • Desired degree in security or intelligence studies with a recommended focus on terrorism or other transnational security threats
  • Demonstrates understanding of the 200 Series of ODNI’s ICDs: 203 - Analytic Standards, 206 – Sourcing Requirements for Disseminated Products, and 208 - Write for Maximum Utility
  • Produce formal written strategic counterterrorism and or all source intelligence assessments, products, graphics and briefings in accordance with ICD 203, DIA and ODNI standards as appropriate
  • Demonstrates ability to use research databases (e.g., Global Terrorism Database) and use quantifiable matrices in a professional setting to prepare written and oral products on complex topics
Job Responsibility
Job Responsibility
  • Counterterrorism / Insurgency Analyst – Produces IC-coordinated all-source intelligence analytic products on non-state actors such as terrorist and insurgency groups and their activities worldwide
  • Analysis includes, but is not limited to, identifying, exposing, and exploiting terrorist / insurgent planning, operations, vulnerabilities
  • chemical, biological, radiological, nuclear and explosives (CBRNE) terrorist tactics, techniques and procedures (TTPs)
  • providing warning
  • and pattern of life and network development analysis
  • Provides analytic support to counterterrorism and counter insurgency operations
  • Supports the tracking, identifying, entering, and management of identity information on known or suspected terrorists as well as nominating identities as terrorist threats
  • Provide strategic expertise on terrorist personalities, networks, facilities, intentions, capabilities, tactics, training, weapons, to include use of chemical, biological, radiological, nuclear (CBRN), etc. to warn of attacks, disrupt networks, and defeat transnational terrorism
  • Conduct research and analysis of data, information, and intelligence to produce a wide range of finished all-source intelligence products for senior U.S. defense department and government officials, U.S. Combatant Commands (CCMDs)
  • Produce in-depth strategic and operational analysis of transnational terrorist networks and activities
What we offer
What we offer
  • Health, dental, and vision insurance
  • Paid time off and holidays
  • Retirement benefits (including 401(k) matching)
  • Educational reimbursement
  • Parental leave
  • Employee stock purchase plan
  • Tax-saving options
  • Disability and life insurance
  • Pet insurance
  • Fulltime
Read More
Arrow Right

Information Security Specialist/Analyst III

The Information Security Specialist/Analyst III reports to the Manager, Security...
Location
Location
United States
Salary
Salary:
Not provided
muschealth.org Logo
MUSC Health
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience
  • or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience
  • or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required
  • Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.)
  • Strong analytical and problem-solving skills with the ability to make decisions under pressure
  • Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools
  • Familiarity with cloud security (Azure, AWS) and identity management solutions
  • Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices
  • Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language
  • Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks
Job Responsibility
Job Responsibility
  • Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure
  • Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches
  • Perform cyber security incident handling, tracking and reporting
  • Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts
  • Respond to relevant service requests received from end users (e.g. for investigation of security events)
  • Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents
  • Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities
  • Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements
  • Conduct vulnerability assessments to identify security risks and report findings to system owners
  • Manage workflows to ensure that protected assets are properly assessed in a timely manner
  • Fulltime
Read More
Arrow Right
New

Senior Security Engineer

Truveta is the world’s first health provider led data platform with a vision of ...
Location
Location
United States , Seattle
Salary
Salary:
135000.00 - 180000.00 USD / Year
truveta.com Logo
Truveta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cyber Security, Computer Science, Information Security, Information Systems, or a related field, or equivalent practical experience
  • 5+ years of experience in Security Operations (SOC), Incident Response, or Detection & Response role, with demonstrated ownership of complex security incidents
  • Hands-on experience with Microsoft Sentinel (SIEM) and Microsoft Defender XDR (Defender for Endpoint, Identity, Office 365, Cloud Apps)
  • Proficiency in KQL (Kusto Query Language) for investigations, threat hunting, and detection engineering
  • Experience designing, tuning, and maintaining SIEM detections and SOAR automation, including alert triage and response workflows
  • Solid understanding of Azure cloud architecture, core services, and native security controls
  • Familiarity with Azure Entra ID, identity security concepts, RBAC, and IAM-related threats
  • Experience with handing high-severity security incidents, including cross-team coordination and stakeholder communication
  • Familiarity with MITRE ATT&CK, threat actor techniques, and modern attack methodologies across cloud, identity, and endpoint environments
  • Experience supporting on-call rotations and working in a 24/7 or follow-the-sun SOC environment
Job Responsibility
Job Responsibility
  • Incident Response: Handle investigation and response to security incidents across endpoints, identities, email, cloud workloads, and SaaS applications
  • Act as a senior escalation point for SOC analysts during complex or ambiguous security events
  • Participate in on-call rotations and provide senior-level escalation support when needed
  • Lead or contribute to post-incident reviews (RCA, postmortems) and track remediation actions to completion
  • Ensure incidents are accurately documented for audit, compliance, and operational learning
  • Maintain and improve incident response runbooks, playbooks, and escalation procedures
  • Support incident readiness activities, including tabletop exercises and response drills
  • Detection Engineering & Automation: Develop, tune, and maintain Microsoft Sentinel analytics rules to improve detection quality and reduce false positives
  • Design and optimize KQL queries for investigations, threat hunting, and detection engineering
  • Integrate and maintain log sources and data connectors in Microsoft Sentinel, ensuring data quality and proper normalization
What we offer
What we offer
  • Interesting and meaningful work for every career stage
  • Great benefits package
  • Comprehensive benefits with strong medical, dental and vision insurance plans
  • 401K plan
  • Professional development & training opportunities for continuous learning
  • Work/life autonomy via flexible work hours and flexible paid time off
  • Generous parental leave
  • Regular team activities (virtual and in-person)
  • Fulltime
Read More
Arrow Right