Providing Threat Warnings And Actionable Intelligence Jobs in Remote

490,445 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Remote? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Remote area.

Mid-Market Account Executive - PubSec

Company: Samsara Inc.

Location: Remote

Posted Jan 23, 2025

Samsara, a pioneer in the Connected Operations™ Cloud, is seeking a dynamic sales professional to bring IoT solutions to mid-sized customers. The role involves end-to-end customer engagement, strategic outbound prospecting, and embedding Samsara's cultural principles. Ideal candidates have 2+ years of closing sales experience, a proven track record in quota achievement, and experience in new school, government, and/or public sector accounts. The position is remote and open to US residents. Samsara offers competitive compensation, benefits, and a flexible working model.

Senior Software Development Engineer

Company: Autodesk

Location: Remote

Posted Jan 23, 2025

Autodesk is seeking a Senior Software Development Engineer to build and maintain a distributed compute system. The ideal candidate should have 4+ years of hands-on software development experience, preferably in Go, Java, Python, or .NET. They should be comfortable with public cloud infrastructure components and have experience implementing unit and integration tests. The role involves writing testable, readable, and maintainable code, performing code reviews, and engaging in technical discussions. The candidate will also proactively automate processes, improve code quality, and participate in on-call rotations to support production systems. Autodesk values a culture of belonging and offers competitive compensation packages.

Territory Account Manager

Company:

Location: St. Louis, MO / Remote

Posted Jan 23, 2025

Uline, a leading distributor of shipping, industrial, and packaging materials, is seeking a Sales Account Manager in St. Louis, Missouri. The role involves building and maintaining strong customer relationships, managing and growing existing accounts, and bringing in new business. Uline offers comprehensive training, mentorship, and a range of benefits including complete insurance coverage, 401(k) with employer match, paid holidays, and generous paid time off. The company culture emphasizes incredible service, quality products, and same-day shipping. As a Sales Account Manager, one can expect to design their day, manage accounts across various industries, and have opportunities for travel and career growth.

Power Electronics Field Sales Representative

Company: Arrow Electronics

Location: Remote

Posted Jan 23, 2025

Richardson RFPD, an Arrow Company, is seeking an experienced Field Sales Representative for a Power Electronics role in the Central or Eastern U.S. The ideal candidate will have at least 5 years of related sales experience, a 4-year degree, and a strong understanding of high power components. Key responsibilities include demand creation, relationship management, and driving new opportunities within accounts. The role involves working closely with suppliers and customers, understanding their needs, and translating them into Richardson RFPD's requirements. The company offers competitive compensation, benefits, and growth opportunities.

Lead BI Analyst

Company: CDW

Location: Remote

Posted Jan 23, 2025

CDW, a Fortune 200 leader, invites a Lead BI Analyst to optimize digital user journey and enhance website/mobile app performance. The role involves building KPIs, automating dashboards, and creating innovative solutions. Candidates should have a Bachelor's degree with 3+ years in advanced analytics, Python expertise, and knowledge of BI/visualization tools. CDW values collaboration, integrity, inclusivity, and personal growth, offering a supportive work environment with diverse perspectives.

Sr. Brand Manager- Federal

Company: CDW

Location: Remote

Posted Jan 23, 2025

Channel Account Manager, MCR (Florida)

Company: Cloudflare

Location: Mexico City, Mexico / Remote

Posted Jan 23, 2025

Frequently Asked Questions

What are typical salary ranges by seniority in threat intelligence?
Entry‑level analysts earn $70,000–$90,000 annually. Mid‑level professionals with 3–5 years of experience and GIAC GCTI certification command $110,000–$140,000. Senior analysts or threat intel leads with 7+ years and advanced certifications such as CISM or CEH typically receive $160,000–$200,000 plus performance bonuses.
Which skills and certifications are required for these roles?
Core skills include mastery of MITRE ATT&CK, data ingestion in MISP or Recorded Future, SIEM expertise (Splunk, QRadar), Python for automation, and OSINT sourcing. Certifications highly valued are GIAC GCTI, GIAC GCIH, CISSP, CISM, and CEH. Proficiency with threat hunting frameworks (MITRE CAPEC) and knowledge of threat modeling tools (Microsoft Threat Modeling Tool) also boost employability.
Is remote work available for threat intelligence positions?
Yes, many organizations offer fully remote or hybrid setups for analysts and platform engineers, especially for data‑driven roles. Incident response and on‑site threat hunting teams may require occasional in‑office presence for low‑latency collaboration during critical incidents, but most daily analysis tasks can be performed remotely.
What career progression paths exist in threat intelligence?
Typical advancement starts with Junior Analyst → Senior Analyst → Threat Intelligence Lead → Threat Intelligence Architect → Director of Cyber Threat Intelligence. From there, professionals can transition into broader security roles such as SOC Manager, Cybersecurity Consultant, or even Chief Information Security Officer (CISO), leveraging deep domain knowledge and strategic insight.
What industry trends are shaping threat intelligence today?
The field is increasingly driven by AI‑powered analytics that automate indicator enrichment and predictive threat modeling. Real‑time threat feeds from platforms like Recorded Future are integrated into SIEMs for instant context. Organizations are adopting zero‑trust architectures, requiring threat intel to map lateral movement paths. Additionally, threat hunting automation and threat intelligence sharing via standards such as STIX/TAXII are becoming standard practice.

Related Pages