Intelligence Analyst

ZeroFox
Remote

About The Position

This role supports one of the world's most recognized consumer brands — a company with a global footprint, a high-profile executive population, and threat exposure that spans every timezone and threat landscape. You'll sit inside ZeroFox's Services and Analysis Team, producing intelligence that shapes real security decisions for a client whose brand is visible everywhere, all the time. This isn't background noise work. When something moves in a market or region your client operates in, you're the person connecting it to risk before it becomes an incident. You'll own the intelligence cycle for a strategic enterprise account — collecting, evaluating, and synthesizing information from open, deep, and dark web sources into products that actually help security and risk leaders act. That means daily and recurring deliverables: alerts, threat reports, trend assessments, and executive briefings. It also means being the analyst who picks up the phone when something breaks outside of business hours, because the adversary doesn't work a 9-to-5. This isn't a passive monitoring role. You'll use ZeroFox's platform alongside your own research instincts to track threat actors, identify emerging patterns, and brief stakeholders who need clarity under pressure. You'll work alongside ZeroFox analysts and engage directly with your client's security team — which means your communication has to be as sharp as your analysis. In your first 90 days, you'd be expected to get certified on ZeroFox's platform and methodology, take ownership of at least one recurring deliverable, and begin building the threat landscape context specific to your client's geography and risk profile.

Requirements

  • 2–3 years of experience in open source research, investigations, or intelligence analysis.
  • Demonstrated ability to assess credibility and relevance across disparate data sources and produce clear, sourced, actionable analysis.
  • Strong written communication — specifically report writing.
  • Comfort across social media platforms, paste sites, message boards, and at least entry-level dark web environments.
  • Proficiency with at least one investigative tool (Whois, Traceroute, Ping, or equivalent).
  • Working knowledge of Google Suite.

Nice To Haves

  • Genuine geopolitical instincts — ability to follow regional developments, understand how international dynamics translate to physical and reputational risk, and map world events to organizational impact.
  • Real OSINT work experience — multi-source collection across surface, deep, and dark web environments, and ability to turn raw findings into a coherent threat narrative.
  • Experience producing written intelligence products — reports, assessments, briefings — and understanding of the BLUF model.
  • Fluency in a second language sufficient for research.
  • Comfort with incomplete investigations and uncertainty as a phase.
  • Fluency in a second language, particularly one relevant to global manufacturing, retail, or apparel supply chains.
  • Background in public or private sector intelligence, risk consulting, or security operations.
  • Familiarity with IPv4/IPv6, DNS records, email header analysis, or P2P environments.
  • Experience with tools like Maltego, MISP, VirusTotal, Shodan, or similar investigative platforms.
  • Experience briefing decision-makers or senior leaders in a professional setting.

Responsibilities

  • Own the intelligence cycle for a strategic enterprise account — collecting, evaluating, and synthesizing information from open, deep, and dark web sources into products that actually help security and risk leaders act.
  • Produce daily and recurring deliverables: alerts, threat reports, trend assessments, and executive briefings.
  • Be the analyst who picks up the phone when something breaks outside of business hours.
  • Use ZeroFox's platform alongside research instincts to track threat actors, identify emerging patterns, and brief stakeholders.
  • Work alongside ZeroFox analysts and engage directly with the client's security team.
  • Get certified on ZeroFox's platform and methodology within the first 90 days.
  • Take ownership of at least one recurring deliverable within the first 90 days.
  • Begin building the threat landscape context specific to the client's geography and risk profile within the first 90 days.

Benefits

  • Generous time off
  • Comprehensive health benefits & 401(k) plan with employer matching
  • Respectful and nourishing work environment, where every opinion is heard and everyone is encouraged to be an active part of the organizational culture
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service