Providing Threat Warnings And Actionable Intelligence Jobs in Remote

490,445 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Remote? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Remote area.

Senior Partner Enablement Manager, EMEA Central Region

Company: Saviynt

Location: Remote

Posted Feb 03, 2025

Saviynt, a leading cloud-based Identity Governance and Administration solutions provider, is seeking a Senior Manager Partner Delivery Enablement for the EMEA Central Region, based in Germany. The role involves partner enablement activities, strategic global initiatives, and driving business process improvements. The ideal candidate should have a Bachelor's equivalent in Engineering, fluency in German and English, and 5+ years of industry experience in Identity Management and Governance products. The role offers a competitive total rewards package, learning opportunities, and a chance to grow in a high-growth environment. Saviynt is an equal opportunity employer.

EHS Specialist

Company: Equinix, Inc

Location: Stockholm, Sweden / Remote

Posted Feb 03, 2025

App Dev Engineer

Company: Atlassian

Location: Remote

Posted Feb 03, 2025

Senior Staff Infrastructure Engineer

Company: Equinix, Inc

Location: Bogota, Colombia / Remote

Posted Feb 03, 2025

Advisory Principal, Artificial Intelligence

Company: Atlassian

Location: New York, NY / Remote

Posted Feb 03, 2025

MuleSoft Application Developer Technical Lead (remote)

Company: Cencora

Location: Remote

Posted Feb 03, 2025

Cencora is seeking a MuleSoft Application Developer Technical Lead to work closely with clients, business analysts, and team members to understand business requirements and design quality technical solutions. The role involves the full systems life cycle, including designing, coding, testing, implementing, and supporting application software. The ideal candidate should have a Bachelor's degree in Programming, Systems, or Computer Science, or equivalent work experience, and at least eight years of application programming and analysis experience. They should possess advanced programming skills in several languages, a deep understanding of relational database design, and experience in leading projects. Cencora offers competitive compensation, benefits, and resources to support a highly inclusive culture, focusing on physical, emotional, financial, and social wellness. The company is committed to providing equal employment opportunities and reasonable accommodations to individuals with disabilities.

NX CAD Implementation Consultant

Company: Siemens Digital Industries Software

Location: Newcastle upon Tyne, United Kingdom / Remote

Posted Feb 03, 2025

Frequently Asked Questions

What are typical salary ranges by seniority for threat intelligence roles?
Entry‑level analysts earn $70,000–$90,000; mid‑level analysts $90,000–$130,000; senior/lead analysts $130,000–$180,000; principal or director positions range $180,000–$250,000, depending on geography and industry.
Which skills and certifications are most valued in this field?
Core skills include Python, Bash, or PowerShell scripting; proficiency with OSINT tools such as Maltego, Shodan, and Recon‑NG; experience with threat intel platforms like MISP, OpenCTI, and TheHive; and knowledge of MITRE ATT&CK, STIX/TAXII, and threat‑modeling frameworks. Certifications such as GIAC Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), CISSP, GCIH, and CEH are highly sought after.
Is remote work available for threat intelligence positions?
Yes, most organizations offer fully remote or hybrid options for analyst, engineer, and lead roles, especially when the job involves monitoring feeds, analyzing data, and generating reports that can be performed from any secure environment.
What career progression paths exist in threat intelligence?
Typical progression is Analyst → Senior Analyst → Lead Analyst → Threat Intelligence Manager → Director of Threat Intelligence → VP of Security Operations → Chief Information Security Officer (CISO). Each step adds leadership responsibilities, broader strategic influence, and higher compensation.
What industry trends are shaping threat intelligence today?
Key trends include AI‑driven automated IOC correlation, integration of threat intel feeds into SIEM/SOAR for real‑time response, increased supply‑chain security focus, adoption of zero‑trust architectures, and collaborative threat sharing via ATT&CK and TAXII. Organizations are also investing in threat model automation and continuous monitoring of emerging attack techniques.

Related Pages