Key Responsibilities and Required Skills for Intelligence Researcher
💰 $80,000 - $160,000
🎯 Role Definition
The Intelligence Researcher is a multidisciplinary analyst responsible for collecting, validating, analyzing, and synthesizing intelligence from open-source, proprietary, human, and technical sources to produce actionable strategic, operational, and tactical insights. This role blends investigative research, data science techniques (NLP, link analysis, geospatial analysis), domain expertise (geopolitics, cyber threat intelligence), and clear written/verbal communication to support decision-makers, incident responders, and strategy teams.
Primary outcomes include: high‑quality intelligence products (reports, briefings, alerts), evidence-based assessments, threat actor profiling, and the development of scalable OSINT and analytic workflows that improve organizational situational awareness and risk mitigation.
📈 Career Progression
Typical Career Path
Entry Point From:
- Junior Intelligence Analyst / OSINT Analyst
- Data Analyst with experience in NLP or geospatial analytics
- Researcher in political science, international relations, cybersecurity, or security studies
Advancement To:
- Senior Intelligence Researcher / Lead Analyst
- Threat Intelligence Team Lead or Manager
- Strategic Intelligence Advisor / Intelligence Program Manager
Lateral Moves:
- Cyber Threat Intelligence Analyst
- Investigations Specialist (fraud, insider threat, brand protection)
- Data Science / Machine Learning Engineer focused on intelligence pipelines
Core Responsibilities
Primary Functions
- Conduct comprehensive open-source intelligence (OSINT) investigations, harvesting, validating, and synthesizing digital artifacts from social media, forums, news, public records, and dark web sources to support incident response and ongoing threat monitoring.
- Develop and maintain detailed threat actor profiles, including TTPs (tactics, techniques, and procedures), infrastructure, sponsorship, historical activity, motivations, and likely future behaviors to inform mitigation and prioritization.
- Produce clear, actionable intelligence products—daily briefings, tactical alerts, in-depth reports, and executive summaries—that translate complex technical and geopolitical findings into decision-ready recommendations for cross-functional stakeholders.
- Design, implement, and iterate reproducible analytic workflows using Python, SQL, APIs, and automation tools to scale collection, enrichment, deconfliction, and correlation of multi-source intelligence data.
- Perform link analysis and entity resolution across large datasets to map networks, relationships, supply chains, and logistics pathways for adversaries, criminal networks, and emerging threats.
- Apply natural language processing (NLP) and text analytics (topic modeling, named entity recognition, sentiment analysis) to extract signals from multilingual text sources and surface emerging trends and anomalies.
- Conduct geospatial analysis and image exploitation (satellite imagery, geotag verification, collection of geolocation metadata) to corroborate events, track movements, and assess physical impacts.
- Monitor and assess cyber threat intelligence (CTI) feeds, malware indicators, intrusion patterns, and attacker infrastructure to support defensive operations, vulnerability prioritization, and threat hunting activities.
- Integrate HUMINT, SIGINT, and available classified inputs (where applicable) with OSINT and technical telemetry to create fused assessments that improve situational awareness and operational planning.
- Lead hypothesis-driven research projects, design analytic questions, test multiple hypotheses, and document confidence levels and key assumptions to maintain analytic rigor and transparency.
- Build and maintain dashboards and visualizations (Grafana, Tableau, Kibana) that summarize trends, KPIs, and intelligence metrics for leadership and operational teams.
- Conduct adversary intent and capability forecasting using historical data, political-economic indicators, and technical signals to model probable threat scenarios and advise strategic planning.
- Support law enforcement, legal, and compliance teams by collecting admissible evidence, documenting chain of custody for OSINT artifacts, and preparing technical exhibits for investigations or legal processes.
- Collaborate with software engineers and data engineers to define requirements for intelligence platforms, data ingestion pipelines, enrichment services, and scalable storage for high-volume collection and analytics.
- Evaluate and integrate third-party intelligence sources, commercial feeds, and open-source tooling into the analytic stack and validate vendor claims through independent verification and benchmarking.
- Mentor and train junior analysts on OSINT methodologies, analytic tradecraft, ethical collection practices, and privacy-preserving techniques to raise team capability and consistency.
- Maintain operational security (OPSEC) and ethical guidelines across collection and dissemination activities, ensuring compliance with organizational policies and applicable laws and regulations.
- Conduct red-team-style research to identify organizational exposure (leaked credentials, infrastructure misconfigurations, exposed data) and prioritize remediation based on business impact.
- Engage with cross-functional stakeholders (product, legal, PR, security ops) to contextualize intelligence findings, support incident communication plans, and provide subject-matter expertise during crises.
- Track and report emerging technologies, geopolitical developments, regulatory changes, and market dynamics that could alter threat landscapes or introduce new intelligence requirements.
- Design and run data quality assurance and validation checks to reduce false positives/negatives and improve confidence in automated detection and alerting systems.
- Prepare and present briefings to executive leadership, customers, and partner organizations, tailoring complexity and emphasis to technical and non-technical audiences for maximum impact.
- Contribute to the development of open-source research projects, whitepapers, and community threat reports to build organizational reputation and support industry collaboration.
Secondary Functions
- Support ad-hoc data requests and exploratory data analysis.
- Contribute to the organization's data strategy and roadmap.
- Collaborate with business units to translate data needs into engineering requirements.
- Participate in sprint planning and agile ceremonies within the data engineering team.
- Maintain and curate internal knowledge bases, playbooks, and SOPs for repeatable analytic activities and incident response.
- Participate in intelligence sharing communities, industry consortiums, and cross-organizational working groups to exchange indicators and best practices.
- Assist with procurement and evaluation of new intelligence collection and analytic tools, providing technical and operational feedback for purchase decisions.
- Provide periodic training sessions for non-intelligence teams (executive, legal, communications) on interpreting intelligence outputs and threat briefings.
Required Skills & Competencies
Hard Skills (Technical)
- Open-Source Intelligence (OSINT) collection and verification techniques (social media, forums, dark web, public records).
- Threat intelligence analysis and threat actor TTP profiling using frameworks such as MITRE ATT&CK.
- Proficiency in Python for data collection, automation, parsing, and analysis (BeautifulSoup, Requests, pandas).
- Strong SQL skills for querying, joining, and aggregating large relational datasets.
- Natural Language Processing (NLP) techniques and libraries (spaCy, NLTK, transformers) for text extraction and classification.
- Experience with data visualization and dashboarding tools (Tableau, Kibana, Grafana, Power BI).
- Link analysis and graph databases (Neo4j, NetworkX) for entity resolution and relationship mapping.
- Geospatial analysis and tooling (QGIS, ArcGIS, geopy, satellite imagery interpretation).
- Familiarity with cyber threat intelligence platforms, IOCs, and standards (STIX/TAXII, MISP).
- API integration, web scraping, and automation tools (Selenium, Scrapy, APIs for social platforms).
- Malware and infrastructure analysis fundamentals (indicators, C2, reverse-engineering awareness) — operational context for CTI.
- Experience working with large datasets, data pipelines, and data quality assurance processes.
- Knowledge of operational security (OPSEC), legal/ethical collection constraints, and privacy-preserving research techniques.
- Familiarity with machine learning basics for forecasting and anomaly detection applied to intelligence signals.
- Multilingual research capability or experience conducting analysis in non-English languages (preferred).
Soft Skills
- Strong written communication for producing concise, compelling intelligence reports and executive briefings.
- Clear oral presentation skills and experience briefing technical and non-technical stakeholders.
- Critical thinking and structured analytic techniques (analysis of competing hypotheses, red teaming).
- Attention to detail and methodical approach to evidence validation and provenance documentation.
- Intellectual curiosity, initiative, and persistence in long-running or complex investigations.
- Collaboration and cross-functional teamwork with engineers, legal, product, and operational units.
- Time management and prioritization under shifting operational requirements and incident-driven workloads.
- Ethical judgment and professional discretion when handling sensitive information.
- Adaptability to evolving threat environments, tooling, and analytic methodologies.
- Mentoring and knowledge-sharing orientation to develop junior team members and build institutional capability.
Education & Experience
Educational Background
Minimum Education:
- Bachelor’s degree in Intelligence Studies, International Relations, Political Science, Computer Science, Data Science, Cybersecurity, Linguistics, or a related field.
Preferred Education:
- Master’s degree in Intelligence Analysis, National Security Studies, Data Science, Computer Science, or an advanced technical or regional studies degree.
- Professional certifications such as GIAC Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), OSINT certifications, or related data science certifications are a plus.
Relevant Fields of Study:
- Intelligence Studies / National Security
- International Relations / Political Science
- Computer Science / Data Science
- Cybersecurity / Information Security
- Linguistics / Area Studies / Modern Languages
Experience Requirements
Typical Experience Range:
- 3–8 years of progressively responsible experience in intelligence analysis, OSINT, cyber threat research, investigative journalism, or data-driven research roles.
Preferred:
- 5+ years of applied intelligence research experience with demonstrable outcomes (published reports, operational support, incident investigations).
- Prior experience working with security operations centers (SOCs), law enforcement, military intelligence, think tanks, or commercial threat intelligence teams is highly desirable.
- Hands-on experience deploying analytics at scale, contributing to product/engineering requirements, and mentoring junior analysts.