Twenty-posted 11 days ago
Full-time • Mid Level
Arlington, VA

Twenty is seeking a Cyber Mission Architect – Intelligence Community to bridge elite Title 50 cyber tradecraft with Twenty’s AI‑powered cyber operations products. This role is for a senior operator or targeteer whose credibility and operational excellence already make them a go‑to voice for shaping missions – and who now wants to scale that impact by 100× through software . You’ve spent years in offensive cyber operations and intelligence analysis. You’re the person key stakeholders seek out before they do hard things. You understand how missions actually run across DNEA/EA, multi‑domain intelligence, and complex targeting problems, and you care most about more/better/faster operational impact . At Twenty, you'll be equally comfortable engaging highly technical cyber operations personnel, program personnel of varying seniority, and senior intelligence officials. Your impact will be magnified by our world-class engineering team as you ensure that our AI-powered graph database applications meet the complex demands of modern cyber operations.

  • Subject Matter Expertise & Requirements Translation
  • Maintain operational proficiency and credibility through regular engagement with live cyber operations and intelligence production (within appropriate constraints).
  • Serve as a primary SME for cyber operations and intelligence analysis, translating complex operational workflows into clear, prioritized technical requirements for Twenty’s product and engineering teams.
  • Validate that our AI‑powered graph database applications accurately represent and enhance offensive and defensive cyber operations, including DNEA / EA tradecraft.
  • Lead structured requirements‑gathering sessions with government customers and convert operational needs into actionable, testable development work.
  • Growth Engineering & Workflow Design
  • Go beyond demos: design, build, and refine operational workflows in Twenty’s products for new and existing IC user groups.
  • Work directly with cyber operators and analysts to gather feedback on user interfaces, graph models, and workflows, then iterate quickly with Forward Deployed Analysts and core engineering.
  • Identify relevant datasets and signals through deep engagement with customer problems, and partner with Forward Deployed Analysts to integrate them into stable, extensible pipelines.
  • Present mission workflows, results, and next‑step proposals to audiences ranging from operators to senior executives.
  • Scope new deployments and use cases across additional IC elements, helping Twenty expand from initial adopters to broader mission footprints.
  • Customer Engagement & Strategic Leadership
  • Represent Twenty in customer engagements, using your operational credibility to build trust and long‑term partnerships.
  • Lead high‑impact technical demonstrations that show how our AI and graph capabilities materially improve mission outcomes (more/better/faster operations across more targets).
  • Collaborate with government stakeholders to surface emerging operational requirements, capability gaps, and opportunities for new product directions.
  • Act as the connective tissue between operators, leadership, and Twenty’s internal teams so we always build for real‑world mission impact, not slideware.
  • Operational Experience & Expertise
  • 10+ years of professional experience in cyber operations and intelligence analysis within U.S. Government military or intelligence organizations.
  • Deep expertise in Targeteering, Digital Network Exploitation and Analysis (DNEA) and/or Exploitation Analyst (EA) methodologies and tools.
  • Strong understanding of both offensive and defensive cyber mission sets and how they intersect with other domains.
  • Extensive experience with multi‑domain intelligence analysis (e.g., correlating CYBER, SIGINT, GEOINT, HUMINT) in support of real operations.
  • Demonstrated expertise in network analysis, persona development, and threat actor attribution.
  • Strong background in operational planning and mission execution in cyber environments, including shaping and assessing effects.
  • Technical Skills & Knowledge
  • Advanced understanding of network protocols, exploitation techniques, and cyber attack methodologies.
  • Experience using graph‑based analysis tools and methodologies for intelligence analysis and targeting.
  • Familiarity with AI/ML applications in cyber operations or intelligence analysis, and interest in pushing these further in production systems.
  • Understanding of cloud platforms and their security implications for government/IC environments.
  • Familiarity with IoT protocols, Wi‑Fi exploitation, and electromagnetic spectrum operations.
  • Experience with data visualization tools and techniques for complex intelligence products and decision briefs.
  • Leadership & Communication
  • Proven ability to translate complex operational and technical concepts for diverse audiences, including senior government officials.
  • Experience mentoring analysts or leading operational teams, with examples of raising the bar for tradecraft and impact.
  • Excellent written and verbal communication skills, with a track record of producing high‑quality intelligence products or operational briefs.
  • Comfortable briefing senior leadership and providing clear, actionable recommendations under time pressure.
  • Demonstrated ability to work effectively in cross‑functional teams that include operators, analysts, engineers, and product leaders.
  • Education & Certifications
  • Bachelor’s degree in Computer Science, Cybersecurity, Intelligence Studies, or a related field, or equivalent operational experience.
  • Advanced degrees and/or relevant operational or technical certifications are a plus.
  • Security Requirements
  • Active TS/SCI - Full Scope Poly (or equivalent) required.
  • Willingness to travel occasionally for customer engagements and operational support.
  • Distinguishing Qualifications (Nice to Have)
  • Previous experience as a technical lead or senior analyst in government cyber operations units.
  • Track record of successfully transitioning from purely operational roles into product development, requirements engineering, or capability development.
  • Experience with government acquisition, requirements development, or capability roadmapping processes.
  • Background in training and doctrine development for cyber operations.
  • Previous experience working with defense contractors or in public‑private partnerships.
  • Publications, conference talks, or recognized contributions in cyber operations or intelligence analysis.
  • Advanced technical certifications in cyber operations or intelligence analysis.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service