ECS
ECS is seeking a
Senior Cyber Incident Analyst
to work in a
HYBRID
setting out of our
Arlington, VA
office. ECS is seeking talented professionals to join our growing team in supporting the Joint Cyber Defense Collaborative (JCDC), CISA’s premier initiative for whole-of-nation cyber defense. JCDC brings together federal agencies, private sector leaders, and international partners to analyze emerging threats, share actionable intelligence, and coordinate strategic responses to protect critical infrastructure. Our team plays a vital role in enabling real-time collaboration, threat detection, and mitigation across sectors. We help shape the strategies and workflows that turn raw intelligence into decisive action—whether responding to active campaigns, developing joint defense plans, or strengthening national cyber resilience. We’re looking for driven professionals who thrive in a fast-paced, mission-focused environment where critical thinking, cyber expertise, and collaborative instincts are essential. A passion for cybersecurity, continuous learning, and public service is vital. As a small team committed to radically improving government, every member directly shapes ECS’s direction and success. We take pride in our stewardship, holding deep responsibility for the solutions we develop. Collaboration is at the heart of our work—both within our team and alongside our federal partners at CISA. The JCDC is CISA’s flagship initiative for uniting government, industry, and international partners to proactively defend against cyber threats. Our ECS team is at the center of providing support to JCDC as they continue to plan, share, and respond to cyber threats in real time to support the greater cyber community and we are looking to grow our team supporting this critical mission. We are seeking a highly skilled and experienced Sr. Cyber Threat Analyst to join our team. The successful candidate will analyze and identify cyber threats, develop and implement mitigation strategies, and provide expert-level advice to senior management and stakeholders. This role requires a strong understanding of cybersecurity principles, threat intelligence, and risk management. The ideal candidate will provide technical triage and enrichment of partner-shared cyber insights, map technical insights to frameworks like MITRE ATT&CK, develop and implement mitigation techniques based on CVE IDs and CPEs, engage with stakeholders, including DHS CISA and Agency security analysts, and present solutions to various audiences, from users to senior government leaders. They will also collaborate with Agile teams to satisfy customer requirements and develop and implement technical solutions to advance Threat Hunting and Incident Response capabilities within CISA, FCEB, CI, and SLTT. Responsibilities Perform analysis on active cyber incidents, events and vulnerabilities to provide guidance and targeted recommendations for mitigation Conduct threat intelligence research and analysis to stay up-to-date on emerging threats and trends Stay current with emerging technologies and trends in cybersecurity, and apply this knowledge to improve threat detection and mitigation efforts Create written guidance and recommendations to assist JCDC partners with solutions for active and ongoing cyber threats Map technical insights on cyber threats to frameworks like MITRE ATT&CK and other cyber frameworks Oversee the translation of strategic products into clear, practical formats that are tailored to the specific needs and operational constraints of different stakeholder groups, including large and small jurisdictions and critical infrastructure (CI) partners Provide tailored vulnerability mitigation recommendations and contextualized examples to stakeholders to address implementation challenges and encourage rapid adoption Required Skills US Citizenship and the ability to obtain and maintain DHS (Suitability) EOD/ Public Trust 10+ Years of previous experience in a threat intelligence, cyber security, incident response, or similar role Analyze active cyber threats, including but not limited to, phishing, malware, and ransomware attacks Proven understanding of cybersecurity frameworks such as MITRE ATT&CK Proven understanding of computer and network fundamentals Strong understanding of computer architecture, operating systems, vulnerabilities, encryption, or other areas of expertise Ability to perform in-depth research tasks and produce written summaries to include insights and predictions based on an analytical process Excellent written and oral communication skills Understand current cyber threats/exploits, attack methodology, and detection techniques using a wide variety of security products including COTS and open source Familiarity with AI/ML concepts and applications Desired Skills DHS Entry on Duty (EOD) clearance and/or TS/SCI clearance Familiarity with the .gov Cyber Mission space and legal constraints applicable to civilian Government Agencies (e.g., FISMA) Experience collecting, analyzing, and categorizing threat intelligence data from multiple sources to author actionable intelligence reports Familiarity with at least one scripting language such as Python, and capable of manipulating data, interfacing with APIs, automating repetitive tasks, etc. Familiarity with federal reporting mandates and secure-by-design principles Ability to interpret complex cybersecurity topics and effectively communicate or present information to various groups of stakeholders (Executives, SOC, etc.) Field-related certifications such as (CTIA, CEH, GREM, GCIH, GCFA) Experience with tools in both Linux and Windows environments Experience applying AI/ML to identify anomalous behavior in security data, esp. using Elasticsearch ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.
#J-18808-Ljbffr
Senior Cyber Incident Analyst
to work in a
HYBRID
setting out of our
Arlington, VA
office. ECS is seeking talented professionals to join our growing team in supporting the Joint Cyber Defense Collaborative (JCDC), CISA’s premier initiative for whole-of-nation cyber defense. JCDC brings together federal agencies, private sector leaders, and international partners to analyze emerging threats, share actionable intelligence, and coordinate strategic responses to protect critical infrastructure. Our team plays a vital role in enabling real-time collaboration, threat detection, and mitigation across sectors. We help shape the strategies and workflows that turn raw intelligence into decisive action—whether responding to active campaigns, developing joint defense plans, or strengthening national cyber resilience. We’re looking for driven professionals who thrive in a fast-paced, mission-focused environment where critical thinking, cyber expertise, and collaborative instincts are essential. A passion for cybersecurity, continuous learning, and public service is vital. As a small team committed to radically improving government, every member directly shapes ECS’s direction and success. We take pride in our stewardship, holding deep responsibility for the solutions we develop. Collaboration is at the heart of our work—both within our team and alongside our federal partners at CISA. The JCDC is CISA’s flagship initiative for uniting government, industry, and international partners to proactively defend against cyber threats. Our ECS team is at the center of providing support to JCDC as they continue to plan, share, and respond to cyber threats in real time to support the greater cyber community and we are looking to grow our team supporting this critical mission. We are seeking a highly skilled and experienced Sr. Cyber Threat Analyst to join our team. The successful candidate will analyze and identify cyber threats, develop and implement mitigation strategies, and provide expert-level advice to senior management and stakeholders. This role requires a strong understanding of cybersecurity principles, threat intelligence, and risk management. The ideal candidate will provide technical triage and enrichment of partner-shared cyber insights, map technical insights to frameworks like MITRE ATT&CK, develop and implement mitigation techniques based on CVE IDs and CPEs, engage with stakeholders, including DHS CISA and Agency security analysts, and present solutions to various audiences, from users to senior government leaders. They will also collaborate with Agile teams to satisfy customer requirements and develop and implement technical solutions to advance Threat Hunting and Incident Response capabilities within CISA, FCEB, CI, and SLTT. Responsibilities Perform analysis on active cyber incidents, events and vulnerabilities to provide guidance and targeted recommendations for mitigation Conduct threat intelligence research and analysis to stay up-to-date on emerging threats and trends Stay current with emerging technologies and trends in cybersecurity, and apply this knowledge to improve threat detection and mitigation efforts Create written guidance and recommendations to assist JCDC partners with solutions for active and ongoing cyber threats Map technical insights on cyber threats to frameworks like MITRE ATT&CK and other cyber frameworks Oversee the translation of strategic products into clear, practical formats that are tailored to the specific needs and operational constraints of different stakeholder groups, including large and small jurisdictions and critical infrastructure (CI) partners Provide tailored vulnerability mitigation recommendations and contextualized examples to stakeholders to address implementation challenges and encourage rapid adoption Required Skills US Citizenship and the ability to obtain and maintain DHS (Suitability) EOD/ Public Trust 10+ Years of previous experience in a threat intelligence, cyber security, incident response, or similar role Analyze active cyber threats, including but not limited to, phishing, malware, and ransomware attacks Proven understanding of cybersecurity frameworks such as MITRE ATT&CK Proven understanding of computer and network fundamentals Strong understanding of computer architecture, operating systems, vulnerabilities, encryption, or other areas of expertise Ability to perform in-depth research tasks and produce written summaries to include insights and predictions based on an analytical process Excellent written and oral communication skills Understand current cyber threats/exploits, attack methodology, and detection techniques using a wide variety of security products including COTS and open source Familiarity with AI/ML concepts and applications Desired Skills DHS Entry on Duty (EOD) clearance and/or TS/SCI clearance Familiarity with the .gov Cyber Mission space and legal constraints applicable to civilian Government Agencies (e.g., FISMA) Experience collecting, analyzing, and categorizing threat intelligence data from multiple sources to author actionable intelligence reports Familiarity with at least one scripting language such as Python, and capable of manipulating data, interfacing with APIs, automating repetitive tasks, etc. Familiarity with federal reporting mandates and secure-by-design principles Ability to interpret complex cybersecurity topics and effectively communicate or present information to various groups of stakeholders (Executives, SOC, etc.) Field-related certifications such as (CTIA, CEH, GREM, GCIH, GCFA) Experience with tools in both Linux and Windows environments Experience applying AI/ML to identify anomalous behavior in security data, esp. using Elasticsearch ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.
#J-18808-Ljbffr