Providing Threat Warnings And Actionable Intelligence Jobs in Remote

490,445 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Remote? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Remote area.

Chief of Staff to Head of Data

Company: Atlassian

Location: San Francisco, CA / Remote

Posted Jan 23, 2025

Atlassian is hiring a Chief of Staff for their Head of Data in Corporate Engineering. This role is remote, but the candidate must be located in the Pacific timezone. The Chief of Staff will prioritize tasks, amplify the team, direct strategic initiatives, act as a liaison, supervise operations, cultivate relationships, enhance processes, and provide recommendations. The ideal candidate has 12+ years of relevant experience, analytical skills, and the ability to turn strategy into actionable plans. Atlassian offers competitive compensation and a variety of perks and benefits.

AR Consultant

Company: CDW

Location: Remote

Posted Jan 23, 2025

Data Scientist II

Company: Coinbase

Location: Remote

Posted Jan 23, 2025

Implementation Consultant - SIS

Company: Anthology

Location: Remote

Posted Jan 23, 2025

Anthology, a leading EdTech company with a global reach, is seeking an Implementation Consultant for its Student Information System, Anthology Student. The role involves supporting the entire implementation and training lifecycle, including business process review, software configuration, end-user training, and functional documentation. The ideal candidate should have a Bachelor's degree, 2-5 years of relevant experience, and proficiency in Microsoft Office applications. Fluency in Spanish and experience with Student Information Systems or Anthology Student are preferred. The role offers a competitive pay range of $65,000 - $85,000/year, depending on experience. Anthology values diversity and inclusion, and this role is part of a company committed to making these a foundational part of its culture.

Account Executive, Mid Market (EST/CST)

Company: Samsara Inc.

Location: Remote

Posted Jan 23, 2025

Samsara, a pioneer in the Connected Operations™ Cloud, is seeking a dynamic sales professional to bring IoT solutions to mid-sized customers. The role involves building Samsara's business, managing trials, and selling to executives and CXOs. The ideal candidate should have 2+ years of full-cycle sales experience, a proven track record of consistent quota achievement, and a growth mindset. The position is remote, open to US candidates except those in the NYC Metro Area, and requires working hours in EST/CST. Samsara offers competitive compensation, benefits, and a flexible working model.

Sales Outreach Manager

Company: HiBob

Location: Remote

Posted Jan 23, 2025

The job posting is for a sales communication role with 3+ years of experience required. The ideal candidate should have a proven track record in developing and executing communication strategies, excellent interpersonal skills, and proficiency in CRM tools. Benefits include competitive compensation, stock options, comprehensive health coverage, 401k with company match, work from home allowance, remote work opportunities, wellness benefits, employee referral program, and frequent social events. The company culture emphasizes fun, ambition, and high performance.

People and Culture Partner

Company: HiBob

Location: Remote

Posted Jan 23, 2025

HiBob, a fast-growing global HR platform, is seeking an enthusiastic and driven People & Culture Partner to join their dynamic team. The role involves partnering with people leaders across various functions, supporting Bobbers, and building exceptional employee experiences. The ideal candidate should have a growth mindset, experience in employee relations, and strong knowledge of HR policies and UK employment legislation. HiBob offers competitive compensation, benefits, and pre-IPO equity, along with a hybrid working model and a commitment to fostering a diverse and inclusive workplace.

Frequently Asked Questions

What are typical salary ranges by seniority in threat intelligence?
Entry‑level analysts earn $70,000–$90,000 annually. Mid‑level professionals with 3–5 years of experience and GIAC GCTI certification command $110,000–$140,000. Senior analysts or threat intel leads with 7+ years and advanced certifications such as CISM or CEH typically receive $160,000–$200,000 plus performance bonuses.
Which skills and certifications are required for these roles?
Core skills include mastery of MITRE ATT&CK, data ingestion in MISP or Recorded Future, SIEM expertise (Splunk, QRadar), Python for automation, and OSINT sourcing. Certifications highly valued are GIAC GCTI, GIAC GCIH, CISSP, CISM, and CEH. Proficiency with threat hunting frameworks (MITRE CAPEC) and knowledge of threat modeling tools (Microsoft Threat Modeling Tool) also boost employability.
Is remote work available for threat intelligence positions?
Yes, many organizations offer fully remote or hybrid setups for analysts and platform engineers, especially for data‑driven roles. Incident response and on‑site threat hunting teams may require occasional in‑office presence for low‑latency collaboration during critical incidents, but most daily analysis tasks can be performed remotely.
What career progression paths exist in threat intelligence?
Typical advancement starts with Junior Analyst → Senior Analyst → Threat Intelligence Lead → Threat Intelligence Architect → Director of Cyber Threat Intelligence. From there, professionals can transition into broader security roles such as SOC Manager, Cybersecurity Consultant, or even Chief Information Security Officer (CISO), leveraging deep domain knowledge and strategic insight.
What industry trends are shaping threat intelligence today?
The field is increasingly driven by AI‑powered analytics that automate indicator enrichment and predictive threat modeling. Real‑time threat feeds from platforms like Recorded Future are integrated into SIEMs for instant context. Organizations are adopting zero‑trust architectures, requiring threat intel to map lateral movement paths. Additionally, threat hunting automation and threat intelligence sharing via standards such as STIX/TAXII are becoming standard practice.

Related Pages