Threat Intelligence Analyst

Portland, OR, US • Posted 4 hours ago • Updated 4 hours ago
Full Time
On-site
Fitment

Dice Job Match Score™

⭐ Evaluating experience...

Job Details

Skills

  • Vulnerability Management
  • Decision-making
  • Writing
  • Open Source
  • Cloud Computing
  • Network
  • Risk Management
  • Use Cases
  • Research
  • Collaboration
  • Forensics
  • Splunk
  • Leadership
  • Continuous Improvement
  • Evaluation
  • Reporting
  • Security Operations
  • Incident Management
  • Intelligence Analysis
  • System On A Chip
  • Workflow
  • Communication
  • Analytical Skill
  • Threat Analysis
  • SIEM
  • Management
  • Finance
  • Scripting
  • Malware Analysis
  • Digital Forensics
  • Security+
  • GCIH
  • GCIA
  • CISSP
  • SAP BASIS
  • Law
  • Artificial Intelligence
  • Cyber Security
  • Partnership
  • Innovation
  • Accountability

Summary

Job Description

Everforth ECS is seeking a Threat Intelligence Analyst to work in our Portland, OR office. Please Note: This position is contingent upon contract award.

The Threat Intelligence Analyst supports cybersecurity operations by collecting, analyzing, producing, and disseminating actionable intelligence on cyber threats, adversary tactics, vulnerabilities, campaigns, and emerging risks relevant to the organization. This role helps transform internal and external threat information into timely context that supports SOC monitoring, threat hunting, incident response, vulnerability management, and leadership decision-making.

The ideal candidate has strong analytical and writing skills, understands adversary behavior and cybersecurity operations, and can evaluate threat information from multiple sources to produce clear, prioritized, and actionable intelligence for technical and non-technical stakeholders.

Key Responsibilities

Threat Intelligence Collection & Requirements
  • Collect and evaluate cyber threat information from open-source, commercial, government, industry, and internal security sources
  • Support development and refinement of intelligence requirements aligned to organizational mission, assets, technology, and risk priorities
  • Monitor threat actor activity, malware trends, exploitation activity, vulnerability disclosures, campaigns, and sector-specific threat reporting
  • Maintain awareness of current threat landscape developments that may affect enterprise, cloud, identity, endpoint, network, or operational environments
Analysis & Production
  • Analyze threat reporting, indicators, tactics, techniques, and procedures to assess relevance, credibility, confidence, and potential impact
  • Produce intelligence products such as threat briefs, situational awareness reports, actor profiles, vulnerability intelligence notes, and executive summaries
  • Map observed or reported adversary behavior to recognized frameworks such as MITRE ATT&CK
  • Identify trends, patterns, knowledge gaps, and intelligence priorities that support security operations and risk management
Indicator & Context Management
  • Validate, enrich, and manage indicators of compromise and other threat artifacts for operational use
  • Provide context around indicators, including associated campaigns, malware, infrastructure, confidence levels, and recommended handling
  • Coordinate with SOC, threat hunting, and engineering teams to support detection logic, alert enrichment, watchlists, and monitoring use cases
  • Recommend tuning, suppression, or prioritization guidance when intelligence indicates changes in threat relevance or confidence
SOC, Threat Hunting & Incident Support
  • Support SOC analysts with threat context during alert triage, investigation, escalation, and incident response activities
  • Provide intelligence inputs to threat hunting hypotheses, hunt priorities, and post-incident analysis
  • Assist with research on suspicious activity, adversary tradecraft, malicious infrastructure, malware families, and exploitation techniques
  • Document intelligence findings, assumptions, confidence levels, and recommended follow-up actions clearly and defensibly
Reporting, Briefing & Collaboration
  • Prepare written and verbal intelligence briefings for technical teams, program leadership, and other stakeholders
  • Translate complex threat information into clear operational and business risk language
  • Collaborate with SOC analysts, threat hunters, forensics personnel, security engineers, Splunk teams, and program leadership
  • Contribute to knowledge bases, intelligence repositories, recurring reports, and lessons-learned materials
Continuous Improvement
  • Help improve intelligence workflows, source evaluation practices, reporting templates, tagging standards, and dissemination processes
  • Track intelligence usefulness, stakeholder feedback, recurring intelligence gaps, and opportunities to improve operational impact
  • Stay current with adversary tradecraft, intelligence analysis methods, security operations practices, and relevant frameworks


Required Skills

  • 3-5 years of experience in cyber threat intelligence, security operations, incident response, threat hunting, intelligence analysis, or related cybersecurity roles
  • Working knowledge of cyber threat actors, malware, vulnerabilities, attack lifecycle concepts, and adversary tactics, techniques, and procedures
  • Experience collecting, evaluating, analyzing, and summarizing threat information from multiple sources
  • Familiarity with SOC operations, SIEM workflows, indicators of compromise, detection concepts, and incident investigation processes
  • Strong written communication skills, including the ability to produce concise, accurate , and actionable intelligence products
  • Ability to assess source reliability, analytic confidence, operational relevance, and potential impact


Desired Skills

  • Experience with threat intelligence platforms, SIEM tools, EDR platforms, case management systems, or intelligence repositories
  • Familiarity with MITRE ATT&CK, Diamond Model, Cyber Kill Chain, STIX/TAXII, YARA, Sigma, or other intelligence and detection frameworks
  • Experience supporting regulated, government, defense, critical infrastructure, financial, or enterprise security environments
  • Knowledge of scripting, query languages, malware analysis concepts, vulnerability intelligence, or digital forensics concepts
  • Certifications such as Security+, CySA +, GCTI, GCIH, GCIA, CISSP, or equivalent experience

ECS Federal LLC is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.

Everforth ECS is the federal segment of Everforth , a $4B global organization with over 10,000 employees. Our nearly 3,500 professionals deliver advanced technology solutions in data and AI, cybersecurity, and enterprise transformation, serving defense, intelligence, and federal civilian agencies.

Our work powers mission-critical outcomes, strengthens technology partnerships, and creates meaningful opportunities for our people. We are defined by a commitment to excellence in delivery, a culture of innovation, and an environment where talent can thrive and grow.

We value:
  • Attracting and developing top talent and high-performing teams
  • Fostering a culture that is engaging, accountable, and mission-driven

Meet the challenge. Make a difference with Everforth ECS!
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 10112MAN
  • Position Id: 3944
  • Posted 4 hours ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Portland, Oregon

Today

Full-time

Portland, Oregon

Today

Full-time

Portland, Oregon

Today

Full-time

Portland, Oregon

Today

Full-time

Search all similar jobs