Providing Threat Warnings And Actionable Intelligence Jobs in Remote

490,445 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Remote? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Remote area.

Field Sales Manager, Central Massachusetts

Company: PAX Labs

Location: Remote

Posted Jan 23, 2025

PAX, a leading global cannabis brand, is seeking a dynamic field sales representative for the Central Massachusetts area. The role involves driving sales execution standards, launching new products, and retaining existing accounts. The ideal candidate should have 3+ years of outside sales experience in the Massachusetts cannabis market, excellent interpersonal and communication skills, and the ability to work autonomously. PAX offers competitive compensation, equity, comprehensive benefits, and a supportive work environment.

Principal Backend Software Development Engineer - Mexico

Company: Zillow

Location: Mexico City, Mexico / Remote

Posted Jan 23, 2025

Zillow, the leading real estate website in the US, is seeking a Principal Software Development Engineer with 7+ years of experience in Java, Python, NodeJS, and Go. The role involves leading project delivery, contributing to feature design, code review, advocating for methodologies, mentoring juniors, and participating in a dynamic team. The position is a teleworker role, preferably based in Mexico City, offering a competitive salary, benefits, and potential equity awards. Zillow values diverse backgrounds and fosters an innovative, inclusive culture, recognized by various awards and rankings.

Project Management Leadership Program

Company: GE Vernova

Location: Singapore / Remote

Posted Jan 23, 2025

Analytics Engineer, Growth Acquisition

Company: DigitalOcean

Location: Gunnison, CO / Remote

Posted Jan 23, 2025

Senior Security Operations Engineer - Incident Response

Company: Samsara Inc.

Location: Remote

Posted Jan 23, 2025

Samsara, a pioneer in the Connected Operations™ Cloud, seeks a Security Operations Team member to monitor and respond to security events, lead incidents, and conduct digital forensic investigations. The role involves collaborating with a global team, creating runbooks, and assisting in process refinement. The ideal candidate has 4+ years of experience in Security Incident Response, proficiency in Python, and understanding of cloud architecture and security. Samsara offers a competitive compensation package, flexible working model, and a commitment to diversity and inclusion.

Lead Field Service Engineer - Automation

Company: GE Vernova

Location: Abilene, TX / Remote

Posted Jan 23, 2025

Frequently Asked Questions

What are typical salary ranges by seniority in threat intelligence?
Entry‑level analysts earn $70,000–$90,000 annually. Mid‑level professionals with 3–5 years of experience and GIAC GCTI certification command $110,000–$140,000. Senior analysts or threat intel leads with 7+ years and advanced certifications such as CISM or CEH typically receive $160,000–$200,000 plus performance bonuses.
Which skills and certifications are required for these roles?
Core skills include mastery of MITRE ATT&CK, data ingestion in MISP or Recorded Future, SIEM expertise (Splunk, QRadar), Python for automation, and OSINT sourcing. Certifications highly valued are GIAC GCTI, GIAC GCIH, CISSP, CISM, and CEH. Proficiency with threat hunting frameworks (MITRE CAPEC) and knowledge of threat modeling tools (Microsoft Threat Modeling Tool) also boost employability.
Is remote work available for threat intelligence positions?
Yes, many organizations offer fully remote or hybrid setups for analysts and platform engineers, especially for data‑driven roles. Incident response and on‑site threat hunting teams may require occasional in‑office presence for low‑latency collaboration during critical incidents, but most daily analysis tasks can be performed remotely.
What career progression paths exist in threat intelligence?
Typical advancement starts with Junior Analyst → Senior Analyst → Threat Intelligence Lead → Threat Intelligence Architect → Director of Cyber Threat Intelligence. From there, professionals can transition into broader security roles such as SOC Manager, Cybersecurity Consultant, or even Chief Information Security Officer (CISO), leveraging deep domain knowledge and strategic insight.
What industry trends are shaping threat intelligence today?
The field is increasingly driven by AI‑powered analytics that automate indicator enrichment and predictive threat modeling. Real‑time threat feeds from platforms like Recorded Future are integrated into SIEMs for instant context. Organizations are adopting zero‑trust architectures, requiring threat intel to map lateral movement paths. Additionally, threat hunting automation and threat intelligence sharing via standards such as STIX/TAXII are becoming standard practice.

Related Pages