{"id":2829,"date":"2026-03-06T22:24:05","date_gmt":"2026-03-06T22:24:05","guid":{"rendered":"https:\/\/www.gc4ss.org\/?p=2829"},"modified":"2026-04-06T23:11:23","modified_gmt":"2026-04-06T22:11:23","slug":"from-open-source-to-actionable-intelligence-the-role-of-data-analysts-and-data-scientists-in-nlp-driven-cyber-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.gc4ss.org\/?p=2829","title":{"rendered":"From Open Source to Actionable Intelligence: The Role of Data Analysts and Data Scientists in NLP-Driven Cyber Threat Intelligence"},"content":{"rendered":"\r\n<p style=\"padding-left: 40px;\"><span style=\"color: #ff0000;\"><strong>Aziz Ozmen, PhD<\/strong><\/span><br \/><a title=\"\" href=\"mailto:aziz.ozmen@gc4ss.org\">aziz.ozmen@gc4ss.org<\/a><\/p>\r\n\r\n\r\n\r\n<p><strong>Senior<\/strong> <strong>Security Analyst<\/strong><br \/><strong>Global Center for Security Studies<\/strong><\/p>\r\n\r\n\r\n","protected":false},"excerpt":{"rendered":"<p>Aziz Ozmen, PhDaziz.ozmen@gc4ss.org Senior Security AnalystGlobal Center for Security Studies<\/p>\n","protected":false},"author":519,"featured_media":2838,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[56],"tags":[244,230,247,246,233,245,248],"class_list":["post-2829","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cyber-threat-intelligence","tag-data-science","tag-large-language-models","tag-named-entity-recognition","tag-natural-language-processing","tag-open-source-intelligence","tag-security-operations-center"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2026\/03\/aozmen2026.png?fit=1081%2C400&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9RaMN-JD","jetpack-related-posts":[{"id":2825,"url":"https:\/\/www.gc4ss.org\/?p=2825","url_meta":{"origin":2829,"position":0},"title":"The Force Multiplier: Institutionalizing the Data Analyst and Data Scientist in Modern Cybersecurity Operations","author":"Aziz Ozmen","date":"July 6, 2025","format":false,"excerpt":"Aziz Ozmen, PhDaziz.ozmen@gc4ss.org \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Senior Security Analyst\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Global Center for Security Studies The Force Multiplier: Institutionalizing the Data Analyst and Data Scientist in Modern Cybersecurity Operations Abstract The contemporary cybersecurity landscape is characterized by an unprecedented volume, velocity, and variety of data,\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.gc4ss.org\/?cat=56"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2025\/07\/aozmen2025.png?fit=1081%2C400&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2025\/07\/aozmen2025.png?fit=1081%2C400&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2025\/07\/aozmen2025.png?fit=1081%2C400&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2025\/07\/aozmen2025.png?fit=1081%2C400&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2025\/07\/aozmen2025.png?fit=1081%2C400&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2591,"url":"https:\/\/www.gc4ss.org\/?p=2591","url_meta":{"origin":2829,"position":1},"title":"The ongoing efforts to regulate the use of autonomous weapons systems.","author":"Emirhan Darcan","date":"December 22, 2020","format":false,"excerpt":"","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.gc4ss.org\/?cat=56"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2020\/12\/Emirhan-1.webp?fit=1200%2C686&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2020\/12\/Emirhan-1.webp?fit=1200%2C686&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2020\/12\/Emirhan-1.webp?fit=1200%2C686&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2020\/12\/Emirhan-1.webp?fit=1200%2C686&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2020\/12\/Emirhan-1.webp?fit=1200%2C686&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2821,"url":"https:\/\/www.gc4ss.org\/?p=2821","url_meta":{"origin":2829,"position":2},"title":"Silent Signals: The Role of Data Analysts and Data Scientists in Algorithmic Market Anomaly Detection for Fraud and Insider Trading Identification","author":"Aziz Ozmen","date":"February 6, 2024","format":false,"excerpt":"Aziz Ozmen, PhDaziz.ozmen@gc4ss.org \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Senior Security Analyst\u00a0 \u00a0 \u00a0 \u00a0 \u00a0Global Center for Security Studies Silent Signals: The Role of Data Analysts and Data Scientists in Algorithmic Market Anomaly Detection for Fraud and Insider Trading Identification Abstract The digitization of global financial markets has produced an\u2026","rel":"","context":"In \"Silent Signals: The Role of Data Analysts and Data Scientists in Algorithmic Market Anomaly Detection for Fraud and Insider Trading Identification\"","block_context":{"text":"Silent Signals: The Role of Data Analysts and Data Scientists in Algorithmic Market Anomaly Detection for Fraud and Insider Trading Identification","link":"https:\/\/www.gc4ss.org\/?tag=silent-signals-the-role-of-data-analysts-and-data-scientists-in-algorithmic-market-anomaly-detection-for-fraud-and-insider-trading-identification"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/aozmen2024.png?fit=1081%2C400&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/aozmen2024.png?fit=1081%2C400&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/aozmen2024.png?fit=1081%2C400&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/aozmen2024.png?fit=1081%2C400&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/aozmen2024.png?fit=1081%2C400&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2677,"url":"https:\/\/www.gc4ss.org\/?p=2677","url_meta":{"origin":2829,"position":3},"title":"Interagency Network Approach To Information Sharing In Combating Terrorism","author":"Ismail Sahin","date":"November 1, 2023","format":false,"excerpt":"Ismail Sahin, PhDismail.sahin@gc4ss.org Expert Global Center for Security Studies Introduction The aftermath of the 9\/11 terrorist attacks highlighted critical issues in information sharing among law enforcement agencies. The failure to track the movements leading to 9\/11 was attributed to inadequate sharing of counter-terrorism information among different agencies (the U.S. Congress\u2026","rel":"","context":"In &quot;Conflicting Zones&quot;","block_context":{"text":"Conflicting Zones","link":"https:\/\/www.gc4ss.org\/?cat=43"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/isahin2.png?fit=1200%2C686&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/isahin2.png?fit=1200%2C686&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/isahin2.png?fit=1200%2C686&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/isahin2.png?fit=1200%2C686&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/isahin2.png?fit=1200%2C686&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2823,"url":"https:\/\/www.gc4ss.org\/?p=2823","url_meta":{"origin":2829,"position":4},"title":"The Digital Pulse: Leveraging Natural Language Processing and Social Media Analytics for Real-Time Societal Sentiment Tracking","author":"Aziz Ozmen","date":"August 6, 2024","format":false,"excerpt":"Aziz Ozmen, PhDaziz.ozmen@gc4ss.org Senior Security AnalystGlobal Center for Security Studies The Digital Pulse: Leveraging Natural Language Processing and Social Media Analytics for Real-Time Societal Sentiment Tracking Abstract The advent of social media has transformed the public sphere into an unprecedented source of real-time, high-velocity textual data. This paper investigates the\u2026","rel":"","context":"In \"Computational Social Science\"","block_context":{"text":"Computational Social Science","link":"https:\/\/www.gc4ss.org\/?tag=computational-social-science"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/08\/aozmen2024-2.png?fit=1081%2C400&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/08\/aozmen2024-2.png?fit=1081%2C400&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/08\/aozmen2024-2.png?fit=1081%2C400&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/08\/aozmen2024-2.png?fit=1081%2C400&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/08\/aozmen2024-2.png?fit=1081%2C400&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":521,"url":"https:\/\/www.gc4ss.org\/?p=521","url_meta":{"origin":2829,"position":5},"title":"Fresh Start for a Secure World","author":"gc4ss","date":"March 21, 2018","format":false,"excerpt":"\u00a0 \u00a0Global Center for Security Studies The true sign of intelligence is not knowledge but imagination Albert Einstein \u00a0 Thanks for joining us! We will create a network of professionals who dedicated their lives to a more secure World! We will share ideas and opinions with you. With our team\u2026","rel":"","context":"In \"Fresh Start for a Secure World\"","block_context":{"text":"Fresh Start for a Secure World","link":"https:\/\/www.gc4ss.org\/?tag=fresh-start-for-a-secure-world"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2018\/03\/IMG_3413-Kopya-2-300x100.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2018\/03\/IMG_3413-Kopya-2-300x100.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2018\/03\/IMG_3413-Kopya-2-300x100.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/posts\/2829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/users\/519"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2829"}],"version-history":[{"count":0,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/posts\/2829\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/media\/2838"}],"wp:attachment":[{"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}