We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

Senior All-Source Intel Analyst

ANALYGENCE
United States, D.C., Washington
Jan 20, 2026

ANALYGENCE is seeking a Senior All-Source Analyst to support the I&A Cyber Intelligence Center. The Analyst will research, analyze, and produce intelligence assessments on cyber threats to U.S. critical infrastructure, delivering reports and briefings in alignment with Intelligence Community standards.



  • Provide strategic, operational, and tactical analysis based on raw intelligence collected from multiple sources.
  • Analyze current and emerging threats that impact national security and critical infrastructure.
  • Prepare written analytic products that clearly communicate findings and assessments.
  • Deliver oral briefings to stakeholders, leadership, and mission partners.
  • Maintain and share situational awareness of evolving threat streams and geopolitical developments.
  • Apply intelligence-specific analysis techniques to evaluate and interpret intelligence data.
  • Utilize databases and software programs commonly used in the intelligence environment.
  • Communicate findings clearly and concisely through oral briefings and written reports, meeting or exceeding established analytical standards, often under tight deadlines.
  • Adapt quickly to evolving analytical priorities in dynamic mission environments.
  • Active TS/SCI Clearance
  • Bachelor's degree or higher from an accredited institution in a relevant field. Preferred degree concentrations: Strategic Intelligence, National Security Studies, Homeland Security, Regional Studies, Computer Science, Cybersecurity, Computer Engineering, Communications, Project Management.
  • 10 years of intelligence analysis experience including 5 years working in the U.S. Intelligence Community (IC); emphasis on cyber threat analysis and sharing actionable information with a broad set of customers, including intelligence assessments, malicious actor and malware data, and indicators of compromise (IOC).
  • Preferred experience directing intelligence operations and production, including cyber threat analysis and reporting.
  • Strong understanding of DHS component missions and the role of I&A in supporting the DHS Intelligence Enterprise, Intelligence Community (IC).
  • Familiarity with I&A's intelligence research, analysis, and production processes.
  • Demonstrated knowledge of U.S. Intelligence Community Directives ICD 203 and ICD 206 and analytic tradecraft; is experienced in research and applying analytic techniques and methodologies; has strong research and writing skills, and knowledge of cybersecurity principles and cyber threat analysis.
  • Must possess excellent oral, writing, and coordination skills to communicate factual information clearly and concisely, both orally and in writing, often under tight deadlines that meets or exceeds established analytical standards.

  • May supervise and review work outputs of lower-level team members.



Applied = 0

(web-54bd5f4dd9-dz8tw)