Senior Cybersecurity Threat Intelligence Analyst
Listed on 2026-01-01
-
IT/Tech
Cybersecurity, Information Security
Job Description
ECS is seeking a Senior Cybersecurity Threat Intelligence Analyst to work in our Washington, DC office.
Responsible for development and leadership of the CTI team establishment of the mission, maturity, optimizing , task management, and maintenance of threat intelligence processes and documentation.
Identify threat tactics, methodologies, gaps, and shortfalls.
Provide subject matter expertise to the development of cyber operations specific indicators.
Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.
Assist in the identification of intelligence collection shortfalls.
Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives , etc. as related to designated cyber operations warning problem sets
Monitor open-source websites for hostile content directed towards organizational or partner interests.
Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements.
Produce timely , fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives ; supporting operation planning and execution; and assessing the effects of operations.
Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.
Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives , resources, or capabilities.
Report intelligence-derived significant network events and intrusions.
Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up to date.
Salary Range: $120,000 – $135,000
General Description of Benefits
Required Skills
7+ years of experience in identifying potential and real threats to computing infrastructure and data and providing risk mitigation strategies and recommendations.
Review prioritized intelligence requirements (PIR) for additions, deletions, and changes in priority.
Ensure alignment with decision made by USCB leadership on program objectives , scope, and escalation criteria.
Research, analyze, and disseminate classified cyber threat briefings, reports, and information in accordance with all relevant controls for handling and disseminating classified information.
Strong written and verbal communication skills .
Experience using multiple search engines (e.g., Google, Yahoo, Lexis Nexis, Data Star ) and tools in conducting open-source searches.
Experience using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, Maltego , A‑Space, Anchory , M3, divergent/convergent thinking, link charts, matrices, etc.).
Ability to communicate and brief complex information, concepts, or ideas in a confident and well‑organized manner through verbal, written, and/or visual means.
Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
Knowledge of physical computer components and architectures , including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
Knowledge of cyber‑attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
Ability to clearly articulate intelligence requirements into well‑formulated research questions and data tracking variables for inquiry tracking purposes.
Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
7 + years ‘ cyber threat intelligence experience focused on Cyber operations fundamentals, operational…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).