Threat Intelligence Analyst
Electronic Consulting Services, Inc (ECS Federal)
Portland, OR (In Person)
Full-Time
Skill Insights
Compare your current skills to what this opportunity needs—we'll show you what you already have and what could strengthen your application.
Job Description
Please Note:
This position is contingent upon contract award. The Threat Intelligence Analyst supports cybersecurity operations by collecting, analyzing, producing, and disseminating actionable intelligence on cyber threats, adversary tactics, vulnerabilities, campaigns, and emerging risks relevant to the organization. This role helps transform internal and external threat information into timely context that supports SOC monitoring, threat hunting, incident response, vulnerability management, and leadership decision-making. The ideal candidate has strong analytical and writing skills, understands adversary behavior and cybersecurity operations, and can evaluate threat information from multiple sources to produce clear, prioritized, and actionable intelligence for technical and non-technical stakeholders. Key Responsibilities Threat Intelligence Collection & Requirements Collect and evaluate cyber threat information from open-source, commercial, government, industry, and internal security sources Support development and refinement of intelligence requirements aligned to organizational mission, assets, technology, and risk priorities Monitor threat actor activity, malware trends, exploitation activity, vulnerability disclosures, campaigns, and sector-specific threat reporting Maintain awareness of current threat landscape developments that may affect enterprise, cloud, identity, endpoint, network, or operational environments Analysis & Production Analyze threat reporting, indicators, tactics, techniques, and procedures to assess relevance, credibility, confidence, and potential impact Produce intelligence products such as threat briefs, situational awareness reports, actor profiles, vulnerability intelligence notes, and executive summaries Map observed or reported adversary behavior to recognized frameworks such asMITRE ATT&CK
Identify trends, patterns, knowledge gaps, and intelligence priorities that support security operations and risk management Indicator & Context Management Validate, enrich, and manage indicators of compromise and other threat artifacts for operational use Provide context around indicators, including associated campaigns, malware, infrastructure, confidence levels, and recommended handling Coordinate with SOC, threat hunting, and engineering teams to support detection logic, alert enrichment, watchlists, and monitoring use cases Recommend tuning, suppression, or prioritization guidance when intelligence indicates changes in threat relevance or confidence SOC, Threat Hunting & Incident Support Support SOC analysts with threat context during alert triage, investigation, escalation, and incident response activities Provide intelligence inputs to threat hunting hypotheses, hunt priorities, and post-incident analysis Assist with research on suspicious activity, adversary tradecraft, malicious infrastructure, malware families, and exploitation techniques Document intelligence findings, assumptions, confidence levels, and recommended follow-up actions clearly and defensibly Reporting, Briefing & Collaboration Prepare written and verbal intelligence briefings for technical teams, program leadership, and other stakeholders Translate complex threat information into clear operational and business risk language Collaborate with SOC analysts, threat hunters, forensics personnel, security engineers, Splunk teams, and program leadership Contribute to knowledge bases, intelligence repositories, recurring reports, and lessons-learned materials Continuous Improvement Help improve intelligence workflows, source evaluation practices, reporting templates, tagging standards, and dissemination processes Track intelligence usefulness, stakeholder feedback, recurring intelligence gaps, and opportunities to improve operational impact Stay current with adversary tradecraft, intelligence analysis methods, security operations practices, and relevant frameworks Required Skills 3-5 years of experience in cyber threat intelligence, security operations, incident response, threat hunting, intelligence analysis, or related cybersecurity roles Working knowledge of cyber threat actors, malware, vulnerabilities, attack lifecycle concepts, and adversary tactics, techniques, and procedures Experience collecting, evaluating, analyzing, and summarizing threat information from multiple sources Familiarity with SOC operations, SIEM workflows, indicators of compromise, detection concepts, and incident investigation processes Strong written communication skills, including the ability to produce concise, accurate , and actionable intelligence products Ability to assess source reliability, analytic confidence, operational relevance, and potential impact Desired Skills Experience with threat intelligence platforms, SIEM tools, EDR platforms, case management systems, or intelligence repositories Familiarity with MITRE ATT&CK, Diamond Model, Cyber Kill Chain, STIX/TAXII, YARA, Sigma, or other intelligence and detection frameworks Experience supporting regulated, government, defense, critical infrastructure, financial, or enterprise security environments Knowledge of scripting, query languages, malware analysis concepts, vulnerability intelligence, or digital forensics concepts Certifications such as Security+, CySA +, GCTI, GCIH, GCIA, CISSP, or equivalent experience ECS Federal LLC is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law. Everforth ECS is the federal segment of Everforth , a $4B global organization with over 10,000 employees. Our nearly 3,500 professionals deliver advanced technology solutions in data and AI, cybersecurity, and enterprise transformation, serving defense, intelligence, and federal civilian agencies. Our work powers mission-critical outcomes, strengthens technology partnerships, and creates meaningful opportunities for our people. We are defined by a commitment to excellence in delivery, a culture of innovation, and an environment where talent can thrive and grow.We value:
Attracting and developing top talent and high-performing teams Fostering a culture that is engaging, accountable, and mission-driven Meet the challenge. Make a difference with Everforth ECS!Similar remote jobs
Commonwealth of PA
Pennsylvania
Posted1 day ago
Updated58 minutes ago
Cornell University
New York, NY
Posted1 day ago
Updated58 minutes ago
Similar jobs in Portland, OR
Accountable Healthcare Staffing
Portland, OR
Posted1 day ago
Updated58 minutes ago
Jacobs
Portland, OR
Posted1 day ago
Updated58 minutes ago
Artface
Portland, OR
Posted1 day ago
Updated58 minutes ago
Simpson Housing LLLP
Portland, OR
Posted1 day ago
Updated58 minutes ago
Similar jobs in Oregon
Accountable Healthcare Staffing
Portland, OR
Posted1 day ago
Updated58 minutes ago
Equip
Oregon
Posted1 day ago
Updated58 minutes ago
Jacobs
Portland, OR
Posted1 day ago
Updated58 minutes ago
Associated Insurance Services
Oregon
Posted1 day ago
Updated58 minutes ago