Providing Threat Warnings And Actionable Intelligence Jobs in Washington DC

107,736 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Washington DC? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Washington DC area.

SEO Account Strategist

Company: BluShark Digital

Location: Washington DC

Posted Jan 28, 2025

BluShark Digital, a leading digital marketing agency based in Washington DC, is seeking an experienced SEO Account Strategist. The role involves collaborating with legal and medical clients, tailoring digital marketing strategies, and managing multiple client accounts. The agency offers a competitive salary, comprehensive benefits, and a dynamic work environment. BluShark Digital is committed to a respectful and inclusive work culture.

Federal Regional Sales Director - FSI (Remote, DMV)

Company: Dynatrace

Location: Washington DC

Posted Jan 28, 2025

The job posting is for a sales role at Dynatrace, a leader in unified observability and security. The role involves developing a sales team, cultivating a sustainable product sales pipeline, monitoring competitors, and creating GTM plans. The ideal candidate should have a minimum of 5 years of enterprise software sales experience, preferably with sales management experience. Dynatrace offers competitive compensation, unlimited personal time off, an employee stock purchase plan, and a reward system. The company works with major cloud providers and uses cutting-edge technologies. Over 50 of the Fortune 100 companies are current customers.

Human Resources Director

Company: BLN24

Location: Washington DC

Posted Jan 28, 2025

BLN24 is a rapidly growing management consulting firm supporting the US Federal Government. They are seeking an experienced Human Resources Director to lead and manage all HR functions, including benefits compliance, employee engagement, and performance management. The role offers a high-energy, flexible corporate environment with opportunities for professional and personal growth. BLN24 emphasizes a positive work culture, continuous improvement, and employee well-being, providing generous medical, dental, and vision plans. They value diversity and inclusion, offering equal opportunities and reasonable accommodations for all employees.

Frequently Asked Questions

What are typical salary ranges by seniority for threat intelligence roles?
Entry‑level analysts earn $70,000–$90,000; mid‑level analysts $90,000–$130,000; senior/lead analysts $130,000–$180,000; principal or director positions range $180,000–$250,000, depending on geography and industry.
Which skills and certifications are most valued in this field?
Core skills include Python, Bash, or PowerShell scripting; proficiency with OSINT tools such as Maltego, Shodan, and Recon‑NG; experience with threat intel platforms like MISP, OpenCTI, and TheHive; and knowledge of MITRE ATT&CK, STIX/TAXII, and threat‑modeling frameworks. Certifications such as GIAC Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), CISSP, GCIH, and CEH are highly sought after.
Is remote work available for threat intelligence positions?
Yes, most organizations offer fully remote or hybrid options for analyst, engineer, and lead roles, especially when the job involves monitoring feeds, analyzing data, and generating reports that can be performed from any secure environment.
What career progression paths exist in threat intelligence?
Typical progression is Analyst → Senior Analyst → Lead Analyst → Threat Intelligence Manager → Director of Threat Intelligence → VP of Security Operations → Chief Information Security Officer (CISO). Each step adds leadership responsibilities, broader strategic influence, and higher compensation.
What industry trends are shaping threat intelligence today?
Key trends include AI‑driven automated IOC correlation, integration of threat intel feeds into SIEM/SOAR for real‑time response, increased supply‑chain security focus, adoption of zero‑trust architectures, and collaborative threat sharing via ATT&CK and TAXII. Organizations are also investing in threat model automation and continuous monitoring of emerging attack techniques.

Related Pages