×
Register Here to Apply for Jobs or Post Jobs. X

Senior Cybersecurity Threat Intelligence Analyst

Job in Washington, District of Columbia, 20022, USA
Listing for: Electronic Consulting Services, Inc (ECS Federal)
Full Time position
Listed on 2026-01-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 120000 - 135000 USD Yearly USD 120000.00 135000.00 YEAR
Job Description & How to Apply Below

Job Description

ECS is seeking a Senior Cybersecurity Threat Intelligence Analyst to work in our Washington, DC office.

  • Responsible for development and leadership of the CTI team establishment of the mission, maturity, optimizing , task management, and maintenance of threat intelligence processes and documentation.

  • Identify threat tactics, methodologies, gaps, and shortfalls.

  • Provide subject matter expertise to the development of cyber operations specific indicators.

  • Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.

  • Assist in the identification of intelligence collection shortfalls.

  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives , etc. as related to designated cyber operations warning problem sets

  • Monitor open-source websites for hostile content directed towards organizational or partner interests.

  • Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements.

  • Produce timely , fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).

  • Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives ; supporting operation planning and execution; and assessing the effects of operations.

  • Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.

  • Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives , resources, or capabilities.

  • Report intelligence-derived significant network events and intrusions.

  • Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up to date.

Salary Range: $120,000 – $135,000

General Description of Benefits

Required Skills

  • 7+ years of experience in identifying potential and real threats to computing infrastructure and data and providing risk mitigation strategies and recommendations.

  • Review prioritized intelligence requirements (PIR) for additions, deletions, and changes in priority.

  • Ensure alignment with decision made by USCB leadership on program objectives , scope, and escalation criteria.

  • Research, analyze, and disseminate classified cyber threat briefings, reports, and information in accordance with all relevant controls for handling and disseminating classified information.

  • Strong written and verbal communication skills .

  • Experience using multiple search engines (e.g., Google, Yahoo, Lexis Nexis, Data Star ) and tools in conducting open-source searches.

  • Experience using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, Maltego , A‑Space, Anchory , M3, divergent/convergent thinking, link charts, matrices, etc.).

  • Ability to communicate and brief complex information, concepts, or ideas in a confident and well‑organized manner through verbal, written, and/or visual means.

  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).

  • Knowledge of physical computer components and architectures , including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

  • Knowledge of cyber‑attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).

  • Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

  • Ability to clearly articulate intelligence requirements into well‑formulated research questions and data tracking variables for inquiry tracking purposes.

  • Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

  • 7 + years ‘ cyber threat intelligence experience focused on Cyber operations fundamentals, operational…

Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary