Providing Threat Warnings And Actionable Intelligence Jobs in Washington DC

107,736 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Washington DC? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Washington DC area.

Senior Java Developer

Company: MicroHealth

Location: Washington DC

Posted Jan 31, 2025

MicroHealth is looking for a skilled Senior Java Developer with 7+ years of experience. The ideal candidate should have strong Java programming skills, proficiency in Spring Boot, and experience with RESTful APIs. Familiarity with JavaScript is a plus. The role involves developing high-quality software solutions, integrating applications with various systems, and collaborating with cross-functional teams. The position is remote and requires a Secret Security Clearance. The salary range is $100,000 - $115,000. MicroHealth is committed to equal employment opportunities and will not discriminate based on race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.

Manager, Cyber Risk & Analysis - Cyber External Client Assurance - Independent Assurance (SOC 2, ISO 27001)

Company: Capital One

Location: Washington DC

Posted Jan 31, 2025

The Manager Cyber Risk & Analysis role involves facilitating Capital One's commercialized products and services through their Commercialized Attestation goals, SOC 2, and ISO 27001. The associate will perform process and technology risk assessments, evaluate control deviations, collect evidence for external auditors, and interpret control design for senior leadership. The role requires strong analytical skills, collaboration, and subject matter expertise. Basic qualifications include a high school diploma, 4 years of experience in Internal Controls Risk Management or Audit, and 2 years of experience in IT controls. Preferred qualifications include a Bachelor's degree, 5+ years of auditing experience, and cloud technology certifications. The role is eligible for performance-based incentives and offers a competitive salary range.

Marketing Programs Associate - Industry Dive (Hybrid DMV)

Company: Informa

Location: Washington DC

Posted Jan 31, 2025

Informa TechTarget is a global leader in B2B technology, offering a vibrant community of world-class practitioners with offices in 19 locations. They provide expert-led, data-driven services to help clients accelerate growth. The company is seeking an Entry Level Marketing Program Associate to play a vital role in the growth of the company, responsible for the full sales cycle and client retention. The role offers excellent professional communication skills, negotiation, multitasking, phone skills, and the opportunity to learn about business media, sales, and marketing. The compensation includes a salary of $45,000 to $50,000 plus commission, a generous benefit package, and opportunities for rapid advancement.

Principal Data Analyst - Retail Bank

Company: Capital One

Location: Washington DC

Posted Jan 31, 2025

Capital One is seeking a Principal Data Analyst for its Retail Bank line of business. The ideal candidate will have a degree in a Science, Technology, Engineering, or Mathematics discipline, scripting experience in Python, R, Spark, and SQL, and experience with data in various forms and AWS services. The role involves innovation, business intelligence, and data management, including mining complex data sources, building data solutions, and ensuring data quality. The candidate will partner with the business to provide consultancy and translate business needs into tools, metrics, and dashboards for insights and data visualization. The role is based in McLean, VA or Richmond, VA, with a salary range of $127,500 - $145,500 or $115,900 - $132,200, respectively.

25-1043 Senior Salesforce Developer

Company: Navitas Business Consulting

Location: Washington DC

Posted Jan 31, 2025

Navitas, a leading digital transformation company since 2006, is seeking an experienced Senior Salesforce Developer. The role involves reviewing existing Salesforce solution architectures, designing and deploying complex solutions, enhancing platform performance, leading integrations with third-party systems, and establishing best practices. The ideal candidate should have 5+ years of Salesforce development experience, Salesforce Omnistudio expertise, in-depth understanding of Salesforce architecture, and Salesforce certifications.

Frequently Asked Questions

What are typical salary ranges by seniority for threat intelligence roles?
Entry‑level analysts earn $70,000–$90,000; mid‑level analysts $90,000–$130,000; senior/lead analysts $130,000–$180,000; principal or director positions range $180,000–$250,000, depending on geography and industry.
Which skills and certifications are most valued in this field?
Core skills include Python, Bash, or PowerShell scripting; proficiency with OSINT tools such as Maltego, Shodan, and Recon‑NG; experience with threat intel platforms like MISP, OpenCTI, and TheHive; and knowledge of MITRE ATT&CK, STIX/TAXII, and threat‑modeling frameworks. Certifications such as GIAC Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), CISSP, GCIH, and CEH are highly sought after.
Is remote work available for threat intelligence positions?
Yes, most organizations offer fully remote or hybrid options for analyst, engineer, and lead roles, especially when the job involves monitoring feeds, analyzing data, and generating reports that can be performed from any secure environment.
What career progression paths exist in threat intelligence?
Typical progression is Analyst → Senior Analyst → Lead Analyst → Threat Intelligence Manager → Director of Threat Intelligence → VP of Security Operations → Chief Information Security Officer (CISO). Each step adds leadership responsibilities, broader strategic influence, and higher compensation.
What industry trends are shaping threat intelligence today?
Key trends include AI‑driven automated IOC correlation, integration of threat intel feeds into SIEM/SOAR for real‑time response, increased supply‑chain security focus, adoption of zero‑trust architectures, and collaborative threat sharing via ATT&CK and TAXII. Organizations are also investing in threat model automation and continuous monitoring of emerging attack techniques.

Related Pages