Providing Threat Warnings And Actionable Intelligence Jobs in Remote

490,445 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Remote? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Remote area.

Surety Senior Underwriter

Company: Liberty Mutual Insurance

Location: Charlotte, NC / Remote

Posted Jan 24, 2025

Head of Microsoft Alliance LATAM

Company: Kyndryl

Location: Sebring, FL / Remote

Posted Jan 24, 2025

Kyndryl is seeking a Head of Microsoft Alliance LATAM to lead growth, revenue, and customer adoption through innovative partnerships. The role involves managing a team to expand services signings and revenue, collaborating with customer partners, and creating, building, and managing relationships with alliance partners. The ideal candidate should have 5+ years of sales and business development experience, deep knowledge of Microsoft Partner programs, and outstanding client management skills. Kyndryl offers a competitive compensation range, comprehensive benefits, and opportunities for career growth.

Software Engineer II - Message Security Detection

Company: Abnormal Security

Location: Remote

Posted Jan 24, 2025

Abnormal Security is recruiting a Software Engineer to join the Threat Response Engine team, crucial in their mission to safeguard global enterprises from diverse email threats. Utilizing behavioral AI, they've developed advanced protection for over 15% of Fortune 500 companies. The role involves architecting, designing, and building the Automated Threat Response Engine, operationalizing a highly autonomous and scalable threat response system for multiple datacenters and regions. The ideal candidate should have 3+ years of Python backend development experience, proven ability to solve complex problems, and experience with log analytic tools.

Customer Partner

Company: Kyndryl

Location: Tokyo, Japan / Remote

Posted Jan 24, 2025

Kyndryl is seeking an Account Management Partner to drive proactive account growth, develop and execute cutting-edge account strategies, and build trusted relationships with top-level executives. The role involves leading one or more Portfolio or Strategic accounts, generating new opportunities, and expanding existing work into larger scopes and new capabilities. The ideal candidate should have 5+ years of experience running account P&L, deep knowledge of business and technology trends, and proven experience with revenue growth, cost, profitability, trends, and risks. Japanese language proficiency and experience in the Manufacturing industry are preferred. Kyndryl values diversity and offers opportunities for career growth, including hands-on experience, learning opportunities, and certification in major platforms.

Sr. VoIP Engineer (Remote, IND)

Company: CrowdStrike

Location: Remote

Posted Jan 24, 2025

CrowdStrike, a global leader in cybersecurity, is seeking a Senior VoIP Engineer. The role involves expanding and supporting enterprise VoIP, collaborating with solution providers, and providing advanced support for various VoIP platforms. The ideal candidate should have extensive experience in VoIP and contact center engineering, strong troubleshooting skills, and excellent customer service abilities. The position offers a dynamic, fast-paced environment with opportunities for continuous learning and improvement. CrowdStrike values inclusivity, career flexibility, and commitment to customers, community, and team members.

Software Engineer II

Company: Pathward

Location: Remote

Posted Jan 24, 2025

Pathward is a hybrid remote office company dedicated to growing talent anywhere, with onsite locations in Sioux Falls, Scottsdale, Troy, Franklin, and Dallas. They are a financial empowerment company working with innovators to increase financial availability, choice, and opportunity for all. Pathward is seeking a software developer with experience in Python frameworks, AWS services, and CICD tools. The role involves developing flexible, maintainable solutions, solving development problems, and participating in software development processes. The company values diversity and inclusion, and encourages applications from women and people of color. The salary range is $69,098 - $127,614, with additional benefits including health insurance, 401k, life insurance, disability benefits, and paid time off.

IT Internal Audit Associate Director

Company: Oscar Health

Location: Payson, AZ / Remote

Posted Jan 24, 2025

Frequently Asked Questions

What are typical salary ranges by seniority for threat intelligence roles?
Entry‑level analysts earn $70,000–$90,000; mid‑level analysts $90,000–$130,000; senior/lead analysts $130,000–$180,000; principal or director positions range $180,000–$250,000, depending on geography and industry.
Which skills and certifications are most valued in this field?
Core skills include Python, Bash, or PowerShell scripting; proficiency with OSINT tools such as Maltego, Shodan, and Recon‑NG; experience with threat intel platforms like MISP, OpenCTI, and TheHive; and knowledge of MITRE ATT&CK, STIX/TAXII, and threat‑modeling frameworks. Certifications such as GIAC Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), CISSP, GCIH, and CEH are highly sought after.
Is remote work available for threat intelligence positions?
Yes, most organizations offer fully remote or hybrid options for analyst, engineer, and lead roles, especially when the job involves monitoring feeds, analyzing data, and generating reports that can be performed from any secure environment.
What career progression paths exist in threat intelligence?
Typical progression is Analyst → Senior Analyst → Lead Analyst → Threat Intelligence Manager → Director of Threat Intelligence → VP of Security Operations → Chief Information Security Officer (CISO). Each step adds leadership responsibilities, broader strategic influence, and higher compensation.
What industry trends are shaping threat intelligence today?
Key trends include AI‑driven automated IOC correlation, integration of threat intel feeds into SIEM/SOAR for real‑time response, increased supply‑chain security focus, adoption of zero‑trust architectures, and collaborative threat sharing via ATT&CK and TAXII. Organizations are also investing in threat model automation and continuous monitoring of emerging attack techniques.

Related Pages