Providing Threat Warnings And Actionable Intelligence Jobs in Remote

490,445 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Remote? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Remote area.

Director, Product Analysis - USDS Infrastructure

Company: Liberty Mutual Insurance

Location: Boston, MA / Remote

Posted Jan 23, 2025

Liberty Mutual is seeking an Assistant Director or Director, Product Analysis to lead the design and build of major pricing and underwriting programs in Earnix. The role involves driving best practices within Earnix, coordinating with modeling, data, and technology teams, and increasing speed to market with sophisticated models. Responsibilities include leading a team to build pricing programs, creating and maintaining rigorous data models, facilitating design of Rate Order Calculations, and ensuring accuracy of pricing outputs. The ideal candidate should have a Bachelor's degree in a quantitative field, 8+ years of relevant experience, and proven experience in creating rating logic and implementing rating programs in tools like Earnix. Strong understanding of rating algorithm structures and Python language skills are preferred. The company values diversity, equitable and inclusive workplace, and offers comprehensive benefits.

Associate General Counsel, Corporate and Securities

Company: Abnormal Security

Location: Remote

Posted Jan 23, 2025

Abnormal Security's Legal Department is seeking a senior corporate and securities attorney to report directly to the Chief Legal Officer. The role involves handling a wide range of corporate, securities, and compliance matters, with an initial focus on preparing the company for a potential Initial Public Offering (IPO). Key responsibilities include leading the legal aspects of the company's public company readiness process, managing post-IPO filings, developing and implementing internal policies, collaborating with various teams, and ensuring compliance with securities laws. The ideal candidate should have a JD, US law degree, and bar admission in good standing in at least one US state, with a minimum of 10 years of relevant experience, including significant experience in corporate and securities law at a national law firm and at least 2 years in-house at a publicly traded technology or B2B SaaS company. Deep knowledge of SEC rules and regulations, strong communication skills, and the ability to work effectively in a fast-paced environment are required. The base salary range is $290,000—$320,000 USD.

Senior Manager, HRIS & People Operations

Company: Pie Insurance

Location: Gunnison, CO / Remote

Posted Jan 23, 2025

Pie Insurance is dedicated to empowering small businesses by making commercial insurance affordable and user-friendly through technology. The company values diversity and entrepreneurship, as reflected in its team and operations. The Senior Manager, People Operations plays a crucial role in leading the People Team, managing HRIS (Workday), and ensuring alignment with business needs and HR technology trends. Responsibilities include system administration, configuration, integration, project management, continuous improvement, training, end-user support, data integrity, compliance, and team management. The ideal candidate should have a Bachelor's Degree, 4-6 years of HRIS or People Operations experience, and proficiency in Workday. Pie Insurance offers competitive compensation, benefits, and a flexible work environment, emphasizing its commitment to equal opportunity and employee well-being.

Frequently Asked Questions

What are typical salary ranges by seniority for threat intelligence roles?
Entry‑level analysts earn $70,000–$90,000; mid‑level analysts $90,000–$130,000; senior/lead analysts $130,000–$180,000; principal or director positions range $180,000–$250,000, depending on geography and industry.
Which skills and certifications are most valued in this field?
Core skills include Python, Bash, or PowerShell scripting; proficiency with OSINT tools such as Maltego, Shodan, and Recon‑NG; experience with threat intel platforms like MISP, OpenCTI, and TheHive; and knowledge of MITRE ATT&CK, STIX/TAXII, and threat‑modeling frameworks. Certifications such as GIAC Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), CISSP, GCIH, and CEH are highly sought after.
Is remote work available for threat intelligence positions?
Yes, most organizations offer fully remote or hybrid options for analyst, engineer, and lead roles, especially when the job involves monitoring feeds, analyzing data, and generating reports that can be performed from any secure environment.
What career progression paths exist in threat intelligence?
Typical progression is Analyst → Senior Analyst → Lead Analyst → Threat Intelligence Manager → Director of Threat Intelligence → VP of Security Operations → Chief Information Security Officer (CISO). Each step adds leadership responsibilities, broader strategic influence, and higher compensation.
What industry trends are shaping threat intelligence today?
Key trends include AI‑driven automated IOC correlation, integration of threat intel feeds into SIEM/SOAR for real‑time response, increased supply‑chain security focus, adoption of zero‑trust architectures, and collaborative threat sharing via ATT&CK and TAXII. Organizations are also investing in threat model automation and continuous monitoring of emerging attack techniques.

Related Pages