Protective Intelligence Lead Analyst

Anduril Anduril · Defense · Costa Mesa, CA · Core Operations : Security

This role is for a Protective Intelligence Lead Analyst at Anduril Industries, a defense technology company. The role involves designing and executing threat monitoring using OSINT and social listening tools, conducting threat assessments, and producing intelligence products to support executive safety and geopolitical risk management. The analyst will also provide operational intelligence support, manage case continuity, contribute to program governance, and collaborate with cross-functional teams. The company utilizes an AI-powered operating system and focuses on AI, computer vision, and sensor fusion in its defense technology solutions.

What you'd actually do

  1. Design and execute threat monitoring using OSINT and social listening tools to track global developments, including protests, political unrest, diplomatic tensions, and nation-state activities impacting Anduril's personnel, operations, or leadership
  2. Conduct structured threat assessments and analyses, evaluating actors, intent, capability, behavioral indicators, and escalation pathways aligned with the program's pillars
  3. Develop and deliver actionable intelligence products, such as spot reports, risk profiles, and briefs, with clear implications and recommended protective measures for executives and stakeholders
  4. Provide operational intelligence support, including pre-mission briefs, real-time monitoring during executive movements or events, and assistance to EP, GSOC, investigations, and crisis response teams
  5. Manage case continuity for persons or groups of concern, performing cross-case pattern recognition, longitudinal analysis, and ensuring smooth handoffs with investigations, HR, Legal, and EP

Skills

Required

  • Bachelor's degree in Intelligence Studies, International Relations, Security Management, or related field
  • 5+ years of experience in protective intelligence, threat assessment, or national security roles
  • Demonstrated expertise in OSINT tools, social media monitoring, and geopolitical risk analysis
  • Strong knowledge of threat assessment principles, including behavioral indicators and escalation pathways
  • Experience producing analytical reports and briefs for executive audiences
  • Proficiency in crisis management and real-time operational support
  • Exceptional analytical writing, problem-solving, and communication skills
  • Ability to obtain and maintain a security clearance
  • Flexibility in schedule management, prioritization of tasks, and adaptability to rapidly changing environments
  • Must be a U.S. Person due to required access to U.S. export controlled information or facilities

Nice to have

  • Professional certifications such as Certified Threat Manager (CTM), CPP (Certified Protection Professional), or equivalent
  • Background in military intelligence, diplomatic security, think tanks, or defense policy
  • Experience with SaaS platforms for threat monitoring (e.g., Dataminr, Liferaft)
  • Strong project management skills and experience building intelligence programs
  • Familiarity with AI and defense sector sensitivities, including geopolitical forecasting
  • Adept at working in fast-paced environments and making sound decisions under pressure

What the JD emphasized

  • Must be a U.S. Person due to required access to U.S. export controlled information or facilities
  • Ability to obtain and maintain a security clearance