Providing Threat Warnings And Actionable Intelligence Jobs in Remote

490,445 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Remote? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Remote area.

NOC Operator

Company: Kyndryl

Location: Bogota, Colombia / Remote

Posted Jan 23, 2025

Inside Sales Representative II - Parts and Services

Company: Thermo Fisher Scientific

Location: Remote

Posted Jan 23, 2025

Thermo Fisher Scientific is seeking an Inside Sales Representative II. The role involves engaging with prospects and existing customers to generate new sales opportunities, managing lead pipelines, and exceeding regional targets. The ideal candidate should have a Bachelor's degree or equivalent experience, preferably in Science or Business. They will be responsible for completing professional sales calls, crafting business plans, and promoting Thermo Fisher Scientific's eCommerce platform and digital customer tools.

Senior Power System Engineer

Company: GE Vernova

Location: New York, NY / Remote

Posted Jan 23, 2025

Electrical Equipment Engineer - Power Plant

Company: GE Vernova

Location: Greenville, SC / Remote

Posted Jan 23, 2025

GE Gas Power, part of GE Vernova, is seeking an Electrical Equipment Engineer for a hybrid role in Schenectady or Greenville. The engineer will be responsible for specifying key electrical equipment for power plants, including Generator Power Plant Equipment and Generator Electrical protection panel. The role involves preparing functional specifications, supporting supplier design evaluation, reviewing technical documentations, and assisting with installation and commissioning. The ideal candidate will have a minimum of 5 years of experience in Medium or High Voltage systems of power plant installations, a Bachelor's or Master's degree in Electrical Engineering, and familiarity with OSHA requirements and power plant equipment. Fluency in MS Office applications and understanding of short circuit current, current rating, protection studies, and insulation level are beneficial. The position offers competitive benefits and a path for career growth.

Lead EHS Specialist-ONW Thailand Project and Services

Company: GE Vernova

Location: Amnat Charoen, Thailand / Remote

Posted Jan 23, 2025

Partner Tax Preparation Advisor Senior Associate

Company: PwC

Location: Milwaukee, WI / Remote

Posted Jan 23, 2025

Frequently Asked Questions

What are typical salary ranges by seniority for threat intelligence roles?
Entry‑level analysts earn $70,000–$90,000; mid‑level analysts $90,000–$130,000; senior/lead analysts $130,000–$180,000; principal or director positions range $180,000–$250,000, depending on geography and industry.
Which skills and certifications are most valued in this field?
Core skills include Python, Bash, or PowerShell scripting; proficiency with OSINT tools such as Maltego, Shodan, and Recon‑NG; experience with threat intel platforms like MISP, OpenCTI, and TheHive; and knowledge of MITRE ATT&CK, STIX/TAXII, and threat‑modeling frameworks. Certifications such as GIAC Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), CISSP, GCIH, and CEH are highly sought after.
Is remote work available for threat intelligence positions?
Yes, most organizations offer fully remote or hybrid options for analyst, engineer, and lead roles, especially when the job involves monitoring feeds, analyzing data, and generating reports that can be performed from any secure environment.
What career progression paths exist in threat intelligence?
Typical progression is Analyst → Senior Analyst → Lead Analyst → Threat Intelligence Manager → Director of Threat Intelligence → VP of Security Operations → Chief Information Security Officer (CISO). Each step adds leadership responsibilities, broader strategic influence, and higher compensation.
What industry trends are shaping threat intelligence today?
Key trends include AI‑driven automated IOC correlation, integration of threat intel feeds into SIEM/SOAR for real‑time response, increased supply‑chain security focus, adoption of zero‑trust architectures, and collaborative threat sharing via ATT&CK and TAXII. Organizations are also investing in threat model automation and continuous monitoring of emerging attack techniques.

Related Pages