Providing Threat Warnings And Actionable Intelligence Jobs in Austin, TX

Positions 129,322 Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Austin, TX? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Austin, TX area.

Data Scientist

Company: IBM

Location: Austin, US

Posted Dec 04, 2025

IBM's Cost Optimization team is seeking a talented individual to collaborate across teams in finance, supply chain, product management, development, and engineering to drive process improvements and optimize costs using AI tools, financial analysis, and data science.

2026 Intern – Information Architecture

Company: IBM

Location: Austin, US

Posted Dec 04, 2025

IBM offers a summer 2026 internship with responsibilities in information architecture and marketing. The role involves improving site experience and requires a bachelor's degree. It's based in Austin with hybrid work.

Associate X-Force Incident Response Intern 2026

Company: IBM

Location: Austin, US

Posted Dec 04, 2025

IBM Consulting offers a career rooted in long-term relationships and collaboration with global clients. The company values curiosity, knowledge, and creative problem-solving. They are seeking interns for their XForce Incident Response team, partnering with Fortune 1000 clients to minimize security incident revenue loss. Positions are available in Austin, TX, starting summer 2026.

System Support Tech Apprentice

Company: IBM

Location: Austin, US

Posted Dec 04, 2025

IBM offers an apprenticeship program for Systems Support Apprentices to work with experienced engineers and mentors, applying hardware knowledge and learning new technologies. The program provides a nationally-recognized credential and opportunities for full-time roles after graduation.

Digital Sales Specialist: Federal Automation Platform

Company: IBM

Location: Austin, US

Posted Dec 04, 2025

The role of a Digital Sales Specialist at IBM involves working with AI-powered products to help clients reduce repetitive work and improve business performance. The position offers excellent onboarding, a collaborative sales environment, and opportunities for career advancement. Key responsibilities include accurate deal closure forecasting, cross-selling opportunities, collaboration on new business campaigns, designing use cases and proofs of concept, and presenting high-level value propositions to clients.

Digital Technical Specialist - Red Hat

Company: IBM

Location: Austin, US

Posted Dec 04, 2025

The text is a job description for a Sales Digital Technical Specialist role at IBM, supporting Red Hat. It highlights the company's global presence, focus on solving big problems using various technologies, and the need for talented sales professionals. The role involves being a technical expert and advisor, collaborating with teams, driving sales processes, delivering workshops and demonstrations, and maintaining product knowledge. The position is based in Austin, TX, with a hybrid work arrangement.

Customer Success Engineer

Company: IBM

Location: Austin, US

Posted Dec 04, 2025

The text describes a career opportunity at IBM Software, focusing on a role as a Customer Success Engineer (CSE) for HashiCorp tools. The CSE role involves helping customers adopt and optimize HashiCorp solutions, driving value attainment, and ensuring customer success throughout the customer journey. The position requires technical expertise, strong communication skills, and the ability to work in a dynamic environment.

Data Scientist Intern

Company: IBM

Location: Austin, US

Posted Dec 04, 2025

The IBM Cost Optimization team is seeking a talented individual to join a passionate team of high-skilled experts. The role involves collaborating with stakeholders across various disciplines to drive process improvements and optimize costs using AI tools, financial analysis, and data science. The ideal candidate should have a passion for technology, engineering, and cross-team collaboration.

Frequently Asked Questions

What are typical salary ranges by seniority in threat intelligence?
Entry‑level analysts earn $70,000–$90,000 annually. Mid‑level professionals with 3–5 years of experience and GIAC GCTI certification command $110,000–$140,000. Senior analysts or threat intel leads with 7+ years and advanced certifications such as CISM or CEH typically receive $160,000–$200,000 plus performance bonuses.
Which skills and certifications are required for these roles?
Core skills include mastery of MITRE ATT&CK, data ingestion in MISP or Recorded Future, SIEM expertise (Splunk, QRadar), Python for automation, and OSINT sourcing. Certifications highly valued are GIAC GCTI, GIAC GCIH, CISSP, CISM, and CEH. Proficiency with threat hunting frameworks (MITRE CAPEC) and knowledge of threat modeling tools (Microsoft Threat Modeling Tool) also boost employability.
Is remote work available for threat intelligence positions?
Yes, many organizations offer fully remote or hybrid setups for analysts and platform engineers, especially for data‑driven roles. Incident response and on‑site threat hunting teams may require occasional in‑office presence for low‑latency collaboration during critical incidents, but most daily analysis tasks can be performed remotely.
What career progression paths exist in threat intelligence?
Typical advancement starts with Junior Analyst → Senior Analyst → Threat Intelligence Lead → Threat Intelligence Architect → Director of Cyber Threat Intelligence. From there, professionals can transition into broader security roles such as SOC Manager, Cybersecurity Consultant, or even Chief Information Security Officer (CISO), leveraging deep domain knowledge and strategic insight.
What industry trends are shaping threat intelligence today?
The field is increasingly driven by AI‑powered analytics that automate indicator enrichment and predictive threat modeling. Real‑time threat feeds from platforms like Recorded Future are integrated into SIEMs for instant context. Organizations are adopting zero‑trust architectures, requiring threat intel to map lateral movement paths. Additionally, threat hunting automation and threat intelligence sharing via standards such as STIX/TAXII are becoming standard practice.

Related Pages

© 2026 Job Transparency. All rights reserved.