Who are we?
IOG, is a technology company focused on Blockchain research and development. We are renowned for our scientific approach to blockchain development, emphasizing peer-reviewed research and formal methods to ensure security, scalability, and sustainability. Our projects include decentralized finance (DeFi), governance, and identity management, aiming to advance the capabilities and adoption of blockchain technology globally.
We invest in the unknown, applying our curiosity and desire for positive change to everything we do. By fueling creativity, innovation, and progress within our teams, our products and services are designed for people to be fearless, to be changemakers.
What the role involves:
As the Open Source Intelligence (OSINT) Analyst in the Protective Intelligence team, you are responsible for collecting, evaluating, and interpreting complex open-source data to support proactive threat identification and trend analysis. The role identifies analytical pivot points, connects disparate data sets, and carries intelligence investigations from initial collection through to final assessment. It includes scraping and analysing information from niche and hard-to-access online environments to identify, assess, and contextualise security-relevant threats to executives, personnel, facilities, and events, using both advanced analytical methods and Python-based tooling.
- Develop and maintain Python-based scraping tools and automation scripts targeting a wide range of open-source platforms, including fringe forums, encrypted channels (where legally accessible), niche social media platforms, paste sites, and dark web markets.
- Collect, clean, and structure large datasets from diverse online sources for analysis and long-term monitoring.
- Design and implement ETL workflows, including metadata tagging, and automated data validation to ensure repeatable, scalable collection and analysis.
- Normalize and harmonize collected data to enable seamless integration across analytic tools, dashboards, and internal intelligence systems.
- Identify emerging threat actors, narratives, and patterns relevant to executive security and corporate protective intelligence missions.
- Conduct continuous monitoring of online spaces for indicators of physical threats, coordinated campaigns, targeted harassment, or emerging security trends.
- Produce clear, actionable intelligence deliverables for protective operations, including alerts, short assessments, and integration with broader intelligence products.
- Collaborate closely with protective operations, cyber security, and executive protection teams to align collection priorities with operational requirements.
- Maintain rigorous compliance with legal, ethical, and organizational guidelines for open-source collection.
Requirements
Who you are:
- Certifications or formal training in the Intelligence Cycle, OSINT tradecraft, Python programming, or related disciplines are preferred. Relevant professional experience may be accepted in lieu of formal credentials. A Python proficiency assessment will be included as part of the selection process.
- Minimum 5 years of professional experience in Intelligence/OSINT/Protective Intelligence.
- Strong analytic writing skills with the ability to produce concise and operationally relevant intelligence products.
- Familiarity with threat actor behaviors, protest dynamics, doxxing tactics, and other security-relevant online activity.
- Working knowledge of OPSEC best practices in intelligence collection.
- Experience working in a distributed or remote environment, including collaboration across time zones and secure data-sharing practices.
- Willingness and ability to travel domestically or internationally in support of special assignments or executive movements (valid passport preferred).
- Proficiency in Python with demonstrated experience in building and maintaining scraping frameworks (e.g., BeautifulSoup, Scrapy, Selenium, Playwright, or equivalent).
- Proven ability to identify and monitor niche or hard-to-reach online ecosystems.
- Experience with data processing, enrichment, and storage (e.g., regex, JSON manipulation, APIs, database handling, PostgreSQL).
- Prior experience in a corporate protective intelligence, executive security, or government security environment.
- Experience integrating Python-based collection pipelines into intelligence platforms.
- Familiarity with foreign language sources and/or language models for multilingual data exploitation.
- Develop and maintain analytic tools, dashboards, and interfaces that enhance data visualization, querying, and integration with internal systems.
- Contribute to user interface and user experience (UI/UX) design for internally developed tools to improve accessibility and analyst efficiency.
- Evaluate emerging technologies, datasets, and platforms/vendors for relevance, applicability, and integration into existing protective intelligence workflows.
- Assess data sources for continued value and reliability, ensuring resources are appropriately allocated and deprecating obsolete items.
- Provide cross-functional support to team members as needed to ensure continuity of protective intelligence operations.
Benefits
The base salary for this position has a range of $120 - $135k per year at the commencement of employment. Any offer is determined by overall experience and performance during the interview process. This is only part of the total compensation package.
All Employees
- Remote Working
- Laptop reimbursement
- New starter package to buy hardware essentials (headphones, monitor, etc)
- Learning & Development opportunities
US Employees
- Medical, Dental, and Vision benefits coverage through Anthem for the employee and dependents
- 401k
- Health Savings Account
- Life Insurance
At IOG, we value diversity and always treat all employees and job applicants based on merit, qualifications, competence, and talent. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Top Skills
Similar Jobs
What you need to know about the Colorado Tech Scene
Key Facts About Colorado Tech
- Number of Tech Workers: 260,000; 8.5% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Lockheed Martin, Century Link, Comcast, BAE Systems, Level 3
- Key Industries: Software, artificial intelligence, aerospace, e-commerce, fintech, healthtech
- Funding Landscape: $4.9 billion in VC funding in 2024 (Pitchbook)
- Notable Investors: Access Venture Partners, Ridgeline Ventures, Techstars, Blackhorn Ventures
- Research Centers and Universities: Colorado School of Mines, University of Colorado Boulder, University of Denver, Colorado State University, Mesa Laboratory, Space Science Institute, National Center for Atmospheric Research, National Renewable Energy Laboratory, Gottlieb Institute

