Job Description Everforth ECS is seeking a
Threat Intelligence Analyst to work in our
Portland, OR office.
Please Note: This position is contingent upon contract award. The Threat Intelligence Analyst supports cybersecurity operations by collecting, analyzing, producing, and disseminating actionable intelligence on cyber threats, adversary tactics, vulnerabilities, campaigns, and emerging risks relevant to the organization. This role helps transform internal and external threat information into timely context that supports SOC monitoring, threat hunting, incident response, vulnerability management, and leadership decision-making.
The ideal candidate has strong analytical and writing skills, understands adversary behavior and cybersecurity operations, and can evaluate threat information from multiple sources to produce clear, prioritized, and actionable intelligence for technical and non-technical stakeholders.
Key Responsibilities Threat Intelligence Collection & Requirements - Collect and evaluate cyber threat information from open-source, commercial, government, industry, and internal security sources
- Support development and refinement of intelligence requirements aligned to organizational mission, assets, technology, and risk priorities
- Monitor threat actor activity, malware trends, exploitation activity, vulnerability disclosures, campaigns, and sector-specific threat reporting
- Maintain awareness of current threat landscape developments that may affect enterprise, cloud, identity, endpoint, network, or operational environments
Analysis & Production - Analyze threat reporting, indicators, tactics, techniques, and procedures to assess relevance, credibility, confidence, and potential impact
- Produce intelligence products such as threat briefs, situational awareness reports, actor profiles, vulnerability intelligence notes, and executive summaries
- Map observed or reported adversary behavior to recognized frameworks such as MITRE ATT&CK
- Identify trends, patterns, knowledge gaps, and intelligence priorities that support security operations and risk management
Indicator & Context Management - Validate, enrich, and manage indicators of compromise and other threat artifacts for operational use
- Provide context around indicators, including associated campaigns, malware, infrastructure, confidence levels, and recommended handling
- Coordinate with SOC, threat hunting, and engineering teams to support detection logic, alert enrichment, watchlists, and monitoring use cases
- Recommend tuning, suppression, or prioritization guidance when intelligence indicates changes in threat relevance or confidence
SOC, Threat Hunting & Incident Support - Support SOC analysts with threat context during alert triage, investigation, escalation, and incident response activities
- Provide intelligence inputs to threat hunting hypotheses, hunt priorities, and post-incident analysis
- Assist with research on suspicious activity, adversary tradecraft, malicious infrastructure, malware families, and exploitation techniques
- Document intelligence findings, assumptions, confidence levels, and recommended follow-up actions clearly and defensibly
Reporting, Briefing & Collaboration - Prepare written and verbal intelligence briefings for technical teams, program leadership, and other stakeholders
- Translate complex threat information into clear operational and business risk language
- Collaborate with SOC analysts, threat hunters, forensics personnel, security engineers, Splunk teams, and program leadership
- Contribute to knowledge bases, intelligence repositories, recurring reports, and lessons-learned materials
Continuous Improvement - Help improve intelligence workflows, source evaluation practices, reporting templates, tagging standards, and dissemination processes
- Track intelligence usefulness, stakeholder feedback, recurring intelligence gaps, and opportunities to improve operational impact
- Stay current with adversary tradecraft, intelligence analysis methods, security operations practices, and relevant frameworks
Required Skills - 3-5 years of experience in cyber threat intelligence, security operations, incident response, threat hunting, intelligence analysis, or related cybersecurity roles
- Working knowledge of cyber threat actors, malware, vulnerabilities, attack lifecycle concepts, and adversary tactics, techniques, and procedures
- Experience collecting, evaluating, analyzing, and summarizing threat information from multiple sources
- Familiarity with SOC operations, SIEM workflows, indicators of compromise, detection concepts, and incident investigation processes
- Strong written communication skills, including the ability to produce concise, accurate , and actionable intelligence products
- Ability to assess source reliability, analytic confidence, operational relevance, and potential impact
Desired Skills - Experience with threat intelligence platforms, SIEM tools, EDR platforms, case management systems, or intelligence repositories
- Familiarity with MITRE ATT&CK, Diamond Model, Cyber Kill Chain, STIX/TAXII, YARA, Sigma, or other intelligence and detection frameworks
- Experience supporting regulated, government, defense, critical infrastructure, financial, or enterprise security environments
- Knowledge of scripting, query languages, malware analysis concepts, vulnerability intelligence, or digital forensics concepts
- Certifications such as Security+, CySA +, GCTI, GCIH, GCIA, CISSP, or equivalent experience
ECS Federal LLC is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.
Everforth ECS is the federal segment of
Everforth , a $4B global organization with over 10,000 employees. Our nearly 3,500 professionals deliver advanced technology solutions in data and AI, cybersecurity, and enterprise transformation, serving defense, intelligence, and federal civilian agencies.
Our work powers mission-critical outcomes, strengthens technology partnerships, and creates meaningful opportunities for our people. We are defined by a commitment to excellence in delivery, a culture of innovation, and an environment where talent can thrive and grow.
We value:
- Attracting and developing top talent and high-performing teams
- Fostering a culture that is engaging, accountable, and mission-driven
Meet the challenge. Make a difference with Everforth ECS!