Providing Threat Warnings And Actionable Intelligence Jobs in Washington DC

107,736 open positions · Updated daily

Looking for Providing Threat Warnings And Actionable Intelligence jobs in Washington DC? Browse our curated listings with transparent salary information to find the perfect Providing Threat Warnings And Actionable Intelligence position in the Washington DC area.

Sales Development Representative, Dragonfly

Company: FiscalNote

Location: Washington DC

Posted Jan 27, 2025

The Sales Development Representative role at Dragonfly involves generating sales opportunities with non-clients for the Business Development team. The primary focus is on creating meetings for the North America Business Development team through cold outreach and nurturing existing marketing-generated leads. Success is measured by the number of leads converted into qualified opportunities. The role requires 80% of time on sales-related activities, including generating fully qualified sales meetings, building strategic plans, and running targeted email campaigns. The remaining 20% is spent on marketing tasks such as nurturing leads, inviting prospects to analyst calls, and maintaining the prospect marketing database. The base salary range is $50,000 - $55,000 per year. The ideal candidate should have a BA in a relevant subject, strong interpersonal skills, and a demonstrable ability to work in a targeted environment.

Senior Software Engineer, Full Stack

Company: Capital One

Location: Washington DC

Posted Jan 27, 2025

Capital One is seeking a Full Stack Software Engineer with at least 3 years of experience. The role involves collaborating with Agile teams, designing and implementing technical solutions, and utilizing various programming languages and technologies. The company offers a competitive salary, comprehensive benefits, and a drug-free workplace. They are committed to diversity and inclusion, and will consider qualified applicants with a criminal history.

Business Development Representative

Company: BluShark Digital

Location: Washington DC

Posted Jan 27, 2025

BluShark Digital, a leading digital marketing agency based in Washington DC, is seeking a motivated Business Development Representative. The role involves driving new business within the legal, home, and medical industries by identifying potential clients, developing relationships, and educating them on BluShark's digital marketing strategies. The ideal candidate should have proven sales experience, a consultative sales approach, strong communication skills, and a self-motivated entrepreneurial mindset. BluShark Digital offers a competitive salary, comprehensive benefits, and a dynamic work environment. The company is committed to a respectful work environment and equal employment opportunities.

Lead Financial Engineer (Flexible Hybrid)

Company: Fannie Mae

Location: Washington DC

Posted Jan 27, 2025

Fannie Mae is seeking a Lead Financial Engineer to join their team. The role involves working with a team to assess and monitor credit risk on Fannie Mae's $500 billion multifamily securitization book of business. The engineer will learn and execute proprietary in-house forecasting and pricing models, analyze loan-level results, and quantitatively analyze multifamily loan terms, products, and securitizations. The ideal candidate will have a minimum of 4 years of experience, preferably with an MBA or a Master's/PhD in a relevant field, and experience developing and running financial models or analyzing large datasets. Familiarity with GSE multifamily lending business underwriting requirements and GSE multifamily securitizations structured transactions is also desired. The role offers the flexibility to make each day your own while working alongside a supportive team.

Data Scientist (Top Secret)

Company: Spry Methods, Inc.

Location: Washington DC

Posted Jan 27, 2025

Spry is looking for a highly skilled Data Scientist with a Top Secret clearance. The ideal candidate should have extensive experience in designing and building complex data models, and be familiar with machine learning and AI. The role involves designing data models, developing machine learning algorithms, analyzing large datasets, collaborating with cross-functional teams, creating documentation, staying updated with advancements in data science, developing data visualizations, ensuring data quality, and identifying data-related issues.

Frequently Asked Questions

What are typical salary ranges by seniority for threat intelligence roles?
Entry‑level analysts earn $70,000–$90,000; mid‑level analysts $90,000–$130,000; senior/lead analysts $130,000–$180,000; principal or director positions range $180,000–$250,000, depending on geography and industry.
Which skills and certifications are most valued in this field?
Core skills include Python, Bash, or PowerShell scripting; proficiency with OSINT tools such as Maltego, Shodan, and Recon‑NG; experience with threat intel platforms like MISP, OpenCTI, and TheHive; and knowledge of MITRE ATT&CK, STIX/TAXII, and threat‑modeling frameworks. Certifications such as GIAC Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), CISSP, GCIH, and CEH are highly sought after.
Is remote work available for threat intelligence positions?
Yes, most organizations offer fully remote or hybrid options for analyst, engineer, and lead roles, especially when the job involves monitoring feeds, analyzing data, and generating reports that can be performed from any secure environment.
What career progression paths exist in threat intelligence?
Typical progression is Analyst → Senior Analyst → Lead Analyst → Threat Intelligence Manager → Director of Threat Intelligence → VP of Security Operations → Chief Information Security Officer (CISO). Each step adds leadership responsibilities, broader strategic influence, and higher compensation.
What industry trends are shaping threat intelligence today?
Key trends include AI‑driven automated IOC correlation, integration of threat intel feeds into SIEM/SOAR for real‑time response, increased supply‑chain security focus, adoption of zero‑trust architectures, and collaborative threat sharing via ATT&CK and TAXII. Organizations are also investing in threat model automation and continuous monitoring of emerging attack techniques.

Related Pages