Providing Threat Warnings And Actionable Intelligence Jobs in Remote

490,445 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Remote? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Remote area.

Reg Affairs Manager - Global CTAs (ATMP/GMO)

Company: Thermo Fisher Scientific

Location: Remote

Posted Jan 23, 2025

Thermo Fisher Scientific is seeking a Regulatory Affairs Manager to join their global team. The role involves leading global regulatory submissions, providing regulatory strategy advice, and managing project budgeting. The ideal candidate should have a Bachelor's or advanced degree, at least 5 years of experience, and excellent communication and interpersonal skills. The company offers a competitive salary, extensive benefits, and a flexible working culture. The mission is to make the world healthier, cleaner, and safer.

Underwriter II - Tax Credit

Company: PNC

Location: Remote

Posted Jan 23, 2025

Microsoft Senior Implementation Analyst(Hybrid) - SP or RJ

Company: Equinix, Inc

Location: Santana de Parnaíba, Brazil / Remote

Posted Jan 23, 2025

Manager, Business Marketing

Company: Liftoff

Location: Reedley, CA / Remote

Posted Jan 23, 2025

Director, Web Strategy

Company: Equinix, Inc

Location: Atlanta, GA / Remote

Posted Jan 23, 2025

Squad Leader

Company: Kyndryl

Location: Mexico City, Mexico / Remote

Posted Jan 23, 2025

Coding Specialist

Company: Evergreen Nephrology

Location: Remote

Posted Jan 23, 2025

Evergreen Nephrology is seeking a Coding Specialist who is devoted, compassionate, and thrives in innovative environments. The role involves accurately coding diagnoses, ensuring compliance with regulatory requirements, and maintaining a high productivity rate. The ideal candidate should have 2+ years of recent outpatient medical coding experience, possess a coding credential, and have strong knowledge of ICD10CM, CPT coding, and healthcare laws. Evergreen Nephrology offers a competitive total rewards package, family-friendly policies, and a robust training and development program.

Frequently Asked Questions

What are typical salary ranges by seniority in threat intelligence?
Entry‑level analysts earn $70,000–$90,000 annually. Mid‑level professionals with 3–5 years of experience and GIAC GCTI certification command $110,000–$140,000. Senior analysts or threat intel leads with 7+ years and advanced certifications such as CISM or CEH typically receive $160,000–$200,000 plus performance bonuses.
Which skills and certifications are required for these roles?
Core skills include mastery of MITRE ATT&CK, data ingestion in MISP or Recorded Future, SIEM expertise (Splunk, QRadar), Python for automation, and OSINT sourcing. Certifications highly valued are GIAC GCTI, GIAC GCIH, CISSP, CISM, and CEH. Proficiency with threat hunting frameworks (MITRE CAPEC) and knowledge of threat modeling tools (Microsoft Threat Modeling Tool) also boost employability.
Is remote work available for threat intelligence positions?
Yes, many organizations offer fully remote or hybrid setups for analysts and platform engineers, especially for data‑driven roles. Incident response and on‑site threat hunting teams may require occasional in‑office presence for low‑latency collaboration during critical incidents, but most daily analysis tasks can be performed remotely.
What career progression paths exist in threat intelligence?
Typical advancement starts with Junior Analyst → Senior Analyst → Threat Intelligence Lead → Threat Intelligence Architect → Director of Cyber Threat Intelligence. From there, professionals can transition into broader security roles such as SOC Manager, Cybersecurity Consultant, or even Chief Information Security Officer (CISO), leveraging deep domain knowledge and strategic insight.
What industry trends are shaping threat intelligence today?
The field is increasingly driven by AI‑powered analytics that automate indicator enrichment and predictive threat modeling. Real‑time threat feeds from platforms like Recorded Future are integrated into SIEMs for instant context. Organizations are adopting zero‑trust architectures, requiring threat intel to map lateral movement paths. Additionally, threat hunting automation and threat intelligence sharing via standards such as STIX/TAXII are becoming standard practice.

Related Pages