Job Search and Career Advice Platform
  • Jobs
  • Headhunters
  • Free resume review
  • About Us
EN
29

Remote Commander Jobs

Principal Threat Intel Incident Commander

Huntress Labs

United States
Remote
USD 200,000 - 220,000
Yesterday
Be an early applicant
I want to receive the latest job alerts for “Commander” jobs

Lead Threat Intel & Rapid Response Commander (Remote)

Huntress Labs

United States
Remote
USD 200,000 - 220,000
Yesterday
Be an early applicant

Weekend Incident Commander, Tech Support Manager (Remote)

Jamf

United States
Remote
USD 80,000 - 100,000
Yesterday
Be an early applicant

Technical Support Manager (Incident Commander) - Weekend Shift

Jamf

United States
Remote
USD 80,000 - 100,000
Yesterday
Be an early applicant

Team Site Producer, Washington Commanders, SB Nation

Vox Media

Washington (District of Columbia)
Remote
USD 73,000 - 75,000
2 days ago
Be an early applicant
discover more jobs illustrationDiscover more opportunities than anywhere else. Find more jobs now

Principal Incident Commander

Pegasystems, Inc.

San Diego (CA)
Remote
USD 98,000 - 151,000
7 days ago
Be an early applicant

Remote Crisis Management Leader — Incident Commander

CrowdStrike

United States
Remote
USD 110,000 - 160,000
7 days ago
Be an early applicant

Senior Incident Commander, Cloud SaaS | Remote

Pegasystems, Inc.

San Diego (CA)
Remote
USD 98,000 - 151,000
7 days ago
Be an early applicant
HeadhuntersConnect with headhunters to apply for similar jobs

Remote Construction Project Manager - Waterworks

Ferguson Enterprises, Inc.

Ferguson (MO)
Remote
USD 80,000 - 100,000
3 days ago
Be an early applicant

Senior Incident Commander

Instacart

Myrtle Point (OR)
Remote
USD 200,000 - 211,000
10 days ago

Senior Incident Commander

Instacart

Alaska
Remote
USD 182,000 - 230,000
12 days ago

Remote Crisis Management Leader — Incident Commander

CrowdStrike

Utah
Remote
USD 110,000 - 160,000
10 days ago

Remote Crisis Management Leader — Incident Commander

CrowdStrike

Colorado
Remote
USD 110,000 - 160,000
10 days ago

Remote Crisis Management Leader — Incident Commander

CrowdStrike

California (MO)
Remote
USD 110,000 - 160,000
13 days ago

Remote Crisis Management Leader — Incident Commander

CrowdStrike

Wyoming (OH)
Remote
USD 110,000 - 160,000
15 days ago

Remote Crisis Management Leader — Incident Commander

CrowdStrike

New Mexico
Remote
USD 110,000 - 160,000
15 days ago

Remote Security Response Engineer – Incident Commander

Framework Ventures

United States
Remote
USD 100,000 - 150,000
9 days ago

Remote Crisis Management Leader — Incident Commander

CrowdStrike

Oregon (WI)
Remote
USD 110,000 - 160,000
10 days ago

Remote Senior Incident Commander – Security Response Leader

Instacart

Myrtle Point (OR)
Remote
USD 200,000 - 211,000
10 days ago

Senior Incident Commander — Remote Security Lead

Instacart

Alaska
Remote
USD 182,000 - 230,000
12 days ago

Team Site Producer, Washington Commanders, SB Nation

Vox Media

United States
Remote
USD 73,000 - 75,000
10 days ago

Construction Project Manager - Waterworks

Ferguson

United States
Remote
USD 60,000 - 80,000
9 days ago

Finance Incident Commander - Remote Crisis Leader

Truelogic Software LLC

New York (NY)
Remote
USD 100,000 - 125,000
16 days ago

Security Incident Response Lead & Incident Commander

O'Neil Digital Solutions, LLC

Town of Texas (WI)
Remote
USD 100,000 - 120,000
17 days ago

Remote Cyber Incident Commander

Data Analysis Incorporated

Myrtle Point (OR)
Remote
USD 100,000 - 130,000
17 days ago

Similar jobs:

Remote Web Manager JobsRemote Desktop Manager JobsRemote Asset Manager JobsRemote Data Officer JobsRemote Chief Product Officer JobsRemote Task Manager JobsRemote Terminal Manager JobsRemote Program Coordinator JobsRemote Case Coordinator JobsRemote Assistant Controller Jobs
Principal Threat Intel Incident Commander
Huntress Labs
Remote
USD 200,000 - 220,000
Full time
Yesterday
Be an early applicant

Job summary

A cybersecurity company is seeking a Principal Threat Intel Incident Commander to lead their Adversary Tactics team. The candidate will be responsible for researching threats and coordinating Rapid Response incidents. A minimum of 7 years in Threat Intelligence is required, alongside experience with SIEM tools and OSINT analysis. This fully remote role offers competitive compensation and a comprehensive benefits package.

Benefits

Generous paid time off
401(k) with 5% contribution
Stock options
Professional development allowance
Home office reimbursement

Qualifications

  • Minimum of 7 years of experience in the field of Threat Intelligence.
  • Understanding of cybersecurity, threat actors, and threat life cycle.
  • Experience conducting OSINT gathering and analysis.

Responsibilities

  • Run Rapid Response incidents, coordinating with departments.
  • Conduct research on emerging adversary tradecraft.
  • Aggregate threat data and build reports for customers.

Skills

Threat Intelligence
SIEM tools
OSINT gathering
Detection engineering
Malware research

Tools

C/C++
GoLang
Python
Job description
Principal Threat Intel Incident Commander

United States of America

Reports to: Senior Director of Adversary Tactics

Location: Remote US

Compensation Range: $200,000 to $220,000 base plus bonus and equity

What We Do

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Whether creating purpose-built security solutions, hunting down hackers, or impacting our community, our people go above and beyond to change the security game and make a real difference.

Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center (SOC) in mind and is never separated from our service.

We protect 4M+ endpoints and 7M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting.

What You’ll Do

The Huntress Adversary Tactics team has the unique honor of waking up every morning knowing we’re going to make hackers regret targeting our partners and customers. We’re looking for someone who wants to pour their creativity into researching, hunting, and uncovering threats in our customer networks. Competitive candidates have experience leading a team of researchers across the threat intelligence cycle. Candidates should also have experience creating Threat Intelligence reports, advocating for product enhancements, and public speaking.

Threat Intelligence Analysts aggregate threat data from the previous month and build out reports for our customers. These reports may also be used for marketing and help show the value of what Huntress provides to customers and the community. Threat Intelligence Analysts are also responsible for writing blog posts and marketing materials regarding emerging threat trends. They also work closely with Security Researchers to obtain more context about threat data. In addition, you will own the Rapid Response process end-to-end while working closely with stakeholders across multiple departments.

Familiarity with product management, scripting/development, incident response, malware analysis, configuration management, and antivirus technologies is an additional way to differentiate yourself.

As you can imagine, success doesn’t happen in a vacuum. An effective analyst fosters highly collaborative environments between the Product, Marketing, and Security teams to accelerate our mission and secure the 99% of businesses that fall below the enterprise poverty line. This collaboration is needed to produce and prioritize a unified technical vision, ultimately delivering our most impactful features and capabilities.

We defend over 2.5 million endpoints and counting across tens of thousands of mid‑sized and small business customers, and that number continues to grow each month. Given this market’s tighter budgets, it’s impossible to assign human analysts to each client. The R&D team addresses this challenge head‑on by building and scaling highly automated efficiencies—often lightly augmented by our Threat Analysts—that make intruders earn every inch of their access while maintaining affordability and healthy gross margins.

Responsibilities
  • Responsible for running Rapid Response incidents, including coordinating with other departments, and owning the process end-to-end.
  • Conduct research on emerging adversary tradecraft to help scope and conduct hunt missions.
  • Aggregate threat data to build out reports for customers to show Huntress’ value, and inform them of various threats that have been seen and reported.
  • Create reports for marketing to show Huntress’ value to the larger community.
  • Promote Huntress’ reputation through media interaction, public speaking, and blogs.
  • Work with the Sr. Director of Adversary Tactics, the Security Operations Center, Product, and others to develop the Product and threat operations roadmap.
  • Provide technical leadership for some members of the ThreatOps team.
  • Support the professional development of researchers in the organization through coaching and mentorship.
  • Enhance Huntress visibility by ingesting and utilizing IOCs from external threat intel sources.
  • Produce blog posts and other marketing materials regarding threat trends.
What You Bring To The Team
  • Minimum of 7 years of experience in the field of Threat Intelligence
  • Experience with SIEM tools for scaled log analysis
  • Familiarity with detection engineering, detection logic, i.e., Sigma Rules
  • Experience researching and scoping threat hunt missions
  • Understanding of cybersecurity, threat actors, and end-to-end threat life cycle, including one or more of the following: digital forensics, malware research, incident response, vulnerabilities, and exploits
  • Experience with 3rd‑party intelligence tools, feeds, and reputation services
  • Experience conducting OSINT gathering and analysis
  • Foundational development experience across multiple platforms (e.g., Windows and/or macOS), C/C++, GoLang, and Python (nice to have)
  • Proficient knowledge of Windows and/or macOS subsystems and how they interact both at the user and kernel level (nice to have)
What We Offer
  • 100% remote work environment – since our founding in 2015
  • Generous paid time off policy, including vacation, sick time, and paid holidays
  • 12 weeks of paid parental leave
  • Highly competitive and comprehensive medical, dental, and vision benefits plans
  • 401(k) with a 5% contribution regardless of employee contribution
  • Life and Disability insurance plans
  • Stock options for all full‑time employees
  • One‑time $500 reimbursement for building/upgrading home office
  • Annual allowance for education and professional development assistance
  • Access to the BetterUp platform for coaching, personal, and professional growth

Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are.

We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.

We do discriminate against hackers who try to exploit businesses of all sizes.

Accommodations

If you require reasonable accommodation to complete this application, interview, or pre‑employment testing or participate in the employee selection process, please direct your inquiries to accommodations@huntresslabs.com. Please note that non‑accommodation requests to this inbox will not receive a response.

Huntress uses artificial intelligence tools to assist in reviewing and evaluating job applications, including resume screening, skills assessment, and candidate matching and comparisons. These AI tools support our human recruiters in the initial review process, but do not make final hiring decisions without human involvement. By submitting your application, you acknowledge this use of AI in our recruitment process. Please review our Candidate Privacy Notice for more details on our practices and your data privacy rights.

* The salary benchmark is based on the target salaries of market leaders in their relevant sectors. It is intended to serve as a guide to help Premium Members assess open positions and to help in salary negotiations. The salary benchmark is not provided directly by the company, which could be significantly higher or lower.

Job Search and Career Advice Platform

Empoweringjob seekers

Tools
  • Jobs
  • Resume review
  • Headhunters
  • Browse jobs
Company
  • About us
  • Careers at JobLeads
  • Site notice
  • Press
  • Reviews
Support
  • Help
  • Partner integration
  • ATS Partners
Social
  • JobLeads Blog
  • YouTube
  • LinkedIn
  • Instagram
  • Facebook
  • Privacy Policy
  • Terms of Use

© JobLeads 2007 - 2026 | All rights reserved