Providing Threat Warnings And Actionable Intelligence Jobs in San Francisco, CA

1,129,455 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in San Francisco, CA? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the San Francisco, CA area.

Senior/Lead Blockchain SDK Engineer

Company: Crossbar

Location: Santa Clara, CA

Posted Oct 05, 2025

We are looking for an experienced blockchain engineer to lead the design and development of our Wallet SDK, which powers mobile, browser, desktop, and embedded…

carpenter/drywall

Company: Terraform Builders Inc.

Location: Poway, CA

Posted Oct 04, 2025

This is not a pure carpentry or drywall position and will require someone with a solid set of tools and capability to wear many hats in a fast paced detailed…

LOCAL Class A Driver TEXAS, NM, AZ

Company: ATL

Location: San Antonio, TX

Posted Oct 04, 2025

Excellent driving skills with a clean driving record. Follow all traffic laws and safety regulations while driving.

Pharmacist in Charge

Company: AAA PHARMACY

Location: San Fernando, CA

Posted Oct 04, 2025

We're seeking a Pharmacist-In-Charge (PIC) to oversee daily operations, ensure compliance with all state and federal regulations, and deliver outstanding…

Welder II - and III

Company: Continental Tide Defense System INC.

Location: Lincoln Acres, CA

Posted Oct 05, 2025

Must be able to select required welding filler materials, joint design, heat ranges and most effective or required welding process/procedure to ensure quality…

Frequently Asked Questions

What are typical salary ranges by seniority for threat intelligence roles?
Entry‑level analysts earn $70,000–$90,000; mid‑level analysts $90,000–$130,000; senior/lead analysts $130,000–$180,000; principal or director positions range $180,000–$250,000, depending on geography and industry.
Which skills and certifications are most valued in this field?
Core skills include Python, Bash, or PowerShell scripting; proficiency with OSINT tools such as Maltego, Shodan, and Recon‑NG; experience with threat intel platforms like MISP, OpenCTI, and TheHive; and knowledge of MITRE ATT&CK, STIX/TAXII, and threat‑modeling frameworks. Certifications such as GIAC Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), CISSP, GCIH, and CEH are highly sought after.
Is remote work available for threat intelligence positions?
Yes, most organizations offer fully remote or hybrid options for analyst, engineer, and lead roles, especially when the job involves monitoring feeds, analyzing data, and generating reports that can be performed from any secure environment.
What career progression paths exist in threat intelligence?
Typical progression is Analyst → Senior Analyst → Lead Analyst → Threat Intelligence Manager → Director of Threat Intelligence → VP of Security Operations → Chief Information Security Officer (CISO). Each step adds leadership responsibilities, broader strategic influence, and higher compensation.
What industry trends are shaping threat intelligence today?
Key trends include AI‑driven automated IOC correlation, integration of threat intel feeds into SIEM/SOAR for real‑time response, increased supply‑chain security focus, adoption of zero‑trust architectures, and collaborative threat sharing via ATT&CK and TAXII. Organizations are also investing in threat model automation and continuous monitoring of emerging attack techniques.

Related Pages