Tallo logoTallo logo

Threat Intelligence Analyst

Job

Electronic Consulting Services, Inc (ECS Federal)

Portland, OR (In Person)

Full-Time

Posted 1 day ago (Updated 58 minutes ago) • Actively hiring

Expires 6/20/2026

Apply for this opportunity

This job application is on an outside website. Be sure to review the job posting there to verify it's the same.

Review key factors to help you decide if the role fits your goals.
Pay Growth
?
out of 5
Not enough data
Not enough info to score pay or growth
Job Security
?
out of 5
Not enough data
Calculating job security score...
Total Score
77
out of 100
Average of individual scores

Were these scores useful?

Skill Insights

Compare your current skills to what this opportunity needs—we'll show you what you already have and what could strengthen your application.

Job Description

Job Description Everforth ECS is seeking a Threat Intelligence Analyst to work in our Portland, OR office.
Please Note:
This position is contingent upon contract award. The Threat Intelligence Analyst supports cybersecurity operations by collecting, analyzing, producing, and disseminating actionable intelligence on cyber threats, adversary tactics, vulnerabilities, campaigns, and emerging risks relevant to the organization. This role helps transform internal and external threat information into timely context that supports SOC monitoring, threat hunting, incident response, vulnerability management, and leadership decision-making. The ideal candidate has strong analytical and writing skills, understands adversary behavior and cybersecurity operations, and can evaluate threat information from multiple sources to produce clear, prioritized, and actionable intelligence for technical and non-technical stakeholders. Key Responsibilities Threat Intelligence Collection & Requirements Collect and evaluate cyber threat information from open-source, commercial, government, industry, and internal security sources Support development and refinement of intelligence requirements aligned to organizational mission, assets, technology, and risk priorities Monitor threat actor activity, malware trends, exploitation activity, vulnerability disclosures, campaigns, and sector-specific threat reporting Maintain awareness of current threat landscape developments that may affect enterprise, cloud, identity, endpoint, network, or operational environments Analysis & Production Analyze threat reporting, indicators, tactics, techniques, and procedures to assess relevance, credibility, confidence, and potential impact Produce intelligence products such as threat briefs, situational awareness reports, actor profiles, vulnerability intelligence notes, and executive summaries Map observed or reported adversary behavior to recognized frameworks such as
MITRE ATT&CK
Identify trends, patterns, knowledge gaps, and intelligence priorities that support security operations and risk management Indicator & Context Management Validate, enrich, and manage indicators of compromise and other threat artifacts for operational use Provide context around indicators, including associated campaigns, malware, infrastructure, confidence levels, and recommended handling Coordinate with SOC, threat hunting, and engineering teams to support detection logic, alert enrichment, watchlists, and monitoring use cases Recommend tuning, suppression, or prioritization guidance when intelligence indicates changes in threat relevance or confidence SOC, Threat Hunting & Incident Support Support SOC analysts with threat context during alert triage, investigation, escalation, and incident response activities Provide intelligence inputs to threat hunting hypotheses, hunt priorities, and post-incident analysis Assist with research on suspicious activity, adversary tradecraft, malicious infrastructure, malware families, and exploitation techniques Document intelligence findings, assumptions, confidence levels, and recommended follow-up actions clearly and defensibly Reporting, Briefing & Collaboration Prepare written and verbal intelligence briefings for technical teams, program leadership, and other stakeholders Translate complex threat information into clear operational and business risk language Collaborate with SOC analysts, threat hunters, forensics personnel, security engineers, Splunk teams, and program leadership Contribute to knowledge bases, intelligence repositories, recurring reports, and lessons-learned materials Continuous Improvement Help improve intelligence workflows, source evaluation practices, reporting templates, tagging standards, and dissemination processes Track intelligence usefulness, stakeholder feedback, recurring intelligence gaps, and opportunities to improve operational impact Stay current with adversary tradecraft, intelligence analysis methods, security operations practices, and relevant frameworks Required Skills 3-5 years of experience in cyber threat intelligence, security operations, incident response, threat hunting, intelligence analysis, or related cybersecurity roles Working knowledge of cyber threat actors, malware, vulnerabilities, attack lifecycle concepts, and adversary tactics, techniques, and procedures Experience collecting, evaluating, analyzing, and summarizing threat information from multiple sources Familiarity with SOC operations, SIEM workflows, indicators of compromise, detection concepts, and incident investigation processes Strong written communication skills, including the ability to produce concise, accurate , and actionable intelligence products Ability to assess source reliability, analytic confidence, operational relevance, and potential impact Desired Skills Experience with threat intelligence platforms, SIEM tools, EDR platforms, case management systems, or intelligence repositories Familiarity with MITRE ATT&CK, Diamond Model, Cyber Kill Chain, STIX/TAXII, YARA, Sigma, or other intelligence and detection frameworks Experience supporting regulated, government, defense, critical infrastructure, financial, or enterprise security environments Knowledge of scripting, query languages, malware analysis concepts, vulnerability intelligence, or digital forensics concepts Certifications such as Security+, CySA +, GCTI, GCIH, GCIA, CISSP, or equivalent experience ECS Federal LLC is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law. Everforth ECS is the federal segment of Everforth , a $4B global organization with over 10,000 employees. Our nearly 3,500 professionals deliver advanced technology solutions in data and AI, cybersecurity, and enterprise transformation, serving defense, intelligence, and federal civilian agencies. Our work powers mission-critical outcomes, strengthens technology partnerships, and creates meaningful opportunities for our people. We are defined by a commitment to excellence in delivery, a culture of innovation, and an environment where talent can thrive and grow.
We value:
Attracting and developing top talent and high-performing teams Fostering a culture that is engaging, accountable, and mission-driven Meet the challenge. Make a difference with Everforth ECS!

Similar remote jobs

Similar jobs in Portland, OR

Similar jobs in Oregon