Head of Intelligence
4 days ago
New York
Head of Intelligence New York City (On-Site) | $140,000–$155,000 + Equity | Full Benefits The Company The company is a venture-backed claims intelligence startup building technology that helps insurers and businesses identify and prevent property and casualty insurance fraud. Our platform analyzes data across employers, insurers, contractors, and other sources to uncover fraud networks that cost the U.S. economy billions annually. They are not a mile-wide, inch-deep solution. The company goes a mile deep—finding social media accounts under aliases, uncovering post-claim activity that contradicts injury narratives, and mapping fraud rings that look more like criminal networks than simple one-off schemes. Our clients already see enormous value from what we do; now we need someone to help us do it at scale. The Opportunity We are hiring a Head of Intelligence to own and operationalize our investigative intelligence function. This is a hands-on, execution-first role. You are not coming in to write strategy decks or build an empire of analysts—you are coming in to do the work, build repeatable processes around it, and work directly with our engineering and data science teams to turn manual tradecraft into scalable, programmatic solutions. The strategy is already defined. We know what our clients will pay for. What we need is someone who can execute at a high level and figure out how to do it faster, better, and at volume. What You Will Do • Conduct and lead structured OSINT investigations to locate individuals, uncover hidden social media accounts, and surface post-claim activity that contradicts reported injuries. This is what you will spend most of your time doing, especially early on., • Identify and map fraud networks and identity relationships across claims—connecting claimants, contractors, and accomplices using network analysis techniques similar to those used in counterterrorism and criminal intelligence., • Evaluate and integrate off-the-shelf intelligence tools (commercial OSINT platforms, social media monitoring, identity resolution tools) into they company’s workflows, configuring them for our specific use cases to get 80% of the way there before custom engineering takes over., • Partner directly with our machine learning engineer, CTO, and data science team to convert investigative insights and manual processes into structured data signals that feed our fraud scoring models., • Build repeatable, scalable processes for intelligence collection, validation, and documentation—taking what currently works at a dozen investigations per week and making it work at thousands., • Produce intelligence products that support fraud investigations, litigation defense, and client decision-making., • Manage a small number of offshore analysts performing manual research, with the potential to grow the team over time based on results. What We Are Looking For Required • Demonstrated, hands-on OSINT expertise. You have personally conducted structured open-source investigations—finding people who don’t want to be found, locating accounts under aliases, pulling actionable intelligence from social media, public records, deep web sources, and foreign-language content. This is not a “I managed a team that did OSINT” role. You need to be the person who can sit down and do the work., • Experience with identity networks and link analysis. You think in networks, not individuals. You understand how to map relationships between people, entities, and claims—whether that background comes from counterterrorism, criminal intelligence, fraud investigation, or similar domains., • Comfort working with technical teams. You do not need to be a software engineer, but you need to understand how data pipelines, APIs, and intelligence platforms work well enough to tell an engineering team exactly what needs to be built and why. You should be able to articulate investigative logic in terms that data scientists can operationalize., • Execution orientation. You are in the 3–7 year experience range (military, government, private sector, or a mix) and still deeply engaged in doing investigative work—not someone who has moved entirely into management or strategy., • Willingness to relocate to New York City. This is a fully on-site role in our Manhattan office. There is no remote or hybrid option. Strongly Preferred • Military intelligence, HUMINT, SIGINT, or CI background—especially if you conducted or supported network-based targeting or identity analysis., • Experience at federal agencies (DHS, DoS, CISA, FBI, FEMA, or IC elements) in roles involving threat intelligence, fraud investigation, or counter-disinformation., • Familiarity with commercial OSINT and intelligence platforms (Recorded Future, Maltego, Babel Street, Skopenow, open-source tools, etc.) and a track record of configuring off-the-shelf tools for specific mission sets., • Insurance fraud, litigation support, or financial crime investigation experience., • Exposure to graph databases (Neo4j or similar) or network visualization tools., • Working knowledge of Spanish, Portuguese, or other languages relevant to Central and South American open-source research. What This Role Is Not To be direct: this is not a role where you come in, hire a team of analysts on day one, and manage from a distance. Early on, you are the analyst, the investigator, and the process builder. You will have support from our existing team and engineering resources, but you need to be comfortable being the person in the weeds doing the investigative work while simultaneously thinking about how to scale it. We are also not looking for someone whose primary orientation is strategy and business development. We know the strategy. We need someone who can execute it. Compensation & Benefits • Base salary: $140,000–$155,000, • Equity participation, • 100% employer-paid medical coverage, • Dental and vision coverage, • On-site in Manhattan (currently Midtown, relocating to Chelsea) Reports To CTO and COO