SHUM CAMP is an international analytical community focused on open-source investigations, cyber threat intelligence, and documentation of war-related activity. The team works with open data, digital evidence, and technical analysis to support situational awareness and resilience in the context of russia’s war against Ukraine.

We are looking for volunteers interested in contributing to cyber threat intelligence and OSINT analysis, particularly in tracking nation-state actors, disinformation, and cyber activity related to regional conflicts.

What You Will Be Doing#

Depending on your focus and experience, your work may include:

  • Conducting OSINT investigations across open web, social media, and relevant platforms
  • Tracking and analyzing nation-state threat actors and cyber operations
  • Monitoring emerging threats, disinformation campaigns, and cyber incidents
  • Supporting the production of analytical outputs (INTSUM, SITREP, brief reports)
  • Identifying TTPs and mapping activity using frameworks such as MITRE ATT&CK
  • Correlating data from multiple sources to build a coherent intelligence picture
  • Contributing to team-based intelligence sharing and collaborative analysis
  • Supporting broader cyber threat intelligence efforts related to Ukraine

Who We Are Looking For#

  • Individuals with strong analytical and critical thinking skills
  • Ability to work with incomplete, fragmented, or conflicting information
  • Attention to detail and a structured approach to analysis
  • Interest in cybersecurity, geopolitics, and conflict-related intelligence
  • Ability to work independently in a volunteer, mission-driven environment
  • Willingness to contribute on a regular basis

Preferred Background#

  • Experience in OSINT, cyber threat intelligence, or analytical work (including academic or self-initiated projects)
  • Practical experience in collecting, verifying, and analysing information from open sources
  • Ability to work with multiple data points (social media, maps, satellite imagery, public databases) and identify patterns or inconsistencies
  • Basic understanding of cybersecurity concepts and cyber operations (SOC, CIRT, blue/red team fundamentals)
  • Familiarity with frameworks such as MITRE ATT&CK or basic understanding of cyber kill chain concepts
  • Experience in analysing or tracking cyber incidents, threat actors, or campaigns (even at a basic level)
  • Good written English for working with sources and preparing reports

Will be an advantage:#

  • Experience in tracking APT or other nation-state actors (in-depth)
  • Experience in producing intelligence reports (INTREP, SITREP, INTSUM)
  • Knowledge of IOC lifecycle and prioritisation
  • Experience working with OSINT, CLOSINT, or dark web sources
  • Familiarity with threat intelligence platforms
  • Basic scripting, crawling, or scraping skills
  • Experience with SIEM and/or SOAR platforms
  • Background in cybersecurity (SOC, CIRT, threat hunting, etc.)

What We Offer#

  • Remote, flexible volunteer format
  • Work on real-world analytical and intelligence tasks
  • Experience in cyber threat intelligence and OSINT investigations
  • Collaboration within an international analytical community
  • Opportunity to develop practical skills relevant to security, intelligence, and research fields

This role is suitable for those who want to gain hands-on experience in cyber intelligence, contribute to meaningful work, and develop analytical capabilities in a real operational context.

We work with volunteers from all over Ukraine and worldwide.

Join us and become part of a team that makes real change!