Providing Threat Warnings And Actionable Intelligence Jobs in Washington DC

107,736 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Washington DC? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Washington DC area.

Data Architect Expert

Company:

Location: Washington, DC

Posted Feb 03, 2025

System Concepts Optimization Engineering Manager

Company: The Aerospace Corporation

Location: Washington DC

Posted Feb 03, 2025

The Aerospace Corporation is seeking a System Concepts Optimization Engineering Manager to lead a team of engineers, mathematicians, and scientists. The role involves building and leading teams, applying innovative optimization techniques to spacecraft and orbit design, and contributing to technical analyses. The ideal candidate will have a BS degree in aerospace, astronautical, or mechanical engineering, significant professional experience, and a history of contributing to substantial technical projects. They should also have experience with constellation design, orbital mechanics, and programming languages like Python, C, C++, or MATLAB. The role offers a competitive compensation package and a culture that promotes innovation, growth, and technical excellence.

Apex Developer-Mid

Company:

Location: Washington, DC

Posted Feb 03, 2025

Associate General Counsel, IP Product

Company: Meta

Location: Washington, DC

Posted Feb 03, 2025

Store Sales Merchandiser

Company:

Location: Washington, DC

Posted Feb 03, 2025

Consulting Marketing Manager

Company: Agilian.com

Location: Washington DC

Posted Feb 02, 2025

Agilian, a full-service strategy, technology, and change management consulting firm, is seeking a Consulting Marketing Manager to bridge account success and market growth, maximizing the company's impact on the Medicaid ecosystem. The role involves delivering billable consulting services, designing and executing account-based marketing campaigns, and contributing to measurable Medicaid retention improvement rates. The ideal candidate should have analytical thinking, client relationship management, and project execution skills for consulting services, and strategic thinking, content creation, and tech savviness for marketing management. The position offers a competitive salary, comprehensive benefits, and the opportunity to work remotely with a preference for candidates within the DMV.

Frequently Asked Questions

What are typical salary ranges by seniority for threat intelligence roles?
Entry‑level analysts earn $70,000–$90,000; mid‑level analysts $90,000–$130,000; senior/lead analysts $130,000–$180,000; principal or director positions range $180,000–$250,000, depending on geography and industry.
Which skills and certifications are most valued in this field?
Core skills include Python, Bash, or PowerShell scripting; proficiency with OSINT tools such as Maltego, Shodan, and Recon‑NG; experience with threat intel platforms like MISP, OpenCTI, and TheHive; and knowledge of MITRE ATT&CK, STIX/TAXII, and threat‑modeling frameworks. Certifications such as GIAC Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), CISSP, GCIH, and CEH are highly sought after.
Is remote work available for threat intelligence positions?
Yes, most organizations offer fully remote or hybrid options for analyst, engineer, and lead roles, especially when the job involves monitoring feeds, analyzing data, and generating reports that can be performed from any secure environment.
What career progression paths exist in threat intelligence?
Typical progression is Analyst → Senior Analyst → Lead Analyst → Threat Intelligence Manager → Director of Threat Intelligence → VP of Security Operations → Chief Information Security Officer (CISO). Each step adds leadership responsibilities, broader strategic influence, and higher compensation.
What industry trends are shaping threat intelligence today?
Key trends include AI‑driven automated IOC correlation, integration of threat intel feeds into SIEM/SOAR for real‑time response, increased supply‑chain security focus, adoption of zero‑trust architectures, and collaborative threat sharing via ATT&CK and TAXII. Organizations are also investing in threat model automation and continuous monitoring of emerging attack techniques.

Related Pages