Twenty · 6 days ago
Cyber Mission Architect – Intelligence Community
Twenty is seeking a Cyber Mission Architect – Intelligence Community to bridge elite Title 50 cyber tradecraft with Twenty’s AI‑powered cyber operations products. This role focuses on leveraging extensive experience in offensive cyber operations and intelligence analysis to enhance operational workflows and technical requirements for modern cyber operations.
Cyber SecurityMilitarySoftware
Responsibilities
Maintain operational proficiency and credibility through regular engagement with live cyber operations and intelligence production (within appropriate constraints)
Serve as a primary SME for cyber operations and intelligence analysis, translating complex operational workflows into clear, prioritized technical requirements for Twenty’s product and engineering teams
Validate that our AI‑powered graph database applications accurately represent and enhance offensive and defensive cyber operations, including DNEA / EA tradecraft
Lead structured requirements‑gathering sessions with government customers and convert operational needs into actionable, testable development work
Go beyond demos: design, build, and refine operational workflows in Twenty’s products for new and existing IC user groups
Work directly with cyber operators and analysts to gather feedback on user interfaces, graph models, and workflows, then iterate quickly with Forward Deployed Analysts and core engineering
Identify relevant datasets and signals through deep engagement with customer problems, and partner with Forward Deployed Analysts to integrate them into stable, extensible pipelines
Present mission workflows, results, and next‑step proposals to audiences ranging from operators to senior executives
Scope new deployments and use cases across additional IC elements, helping Twenty expand from initial adopters to broader mission footprints
Represent Twenty in customer engagements, using your operational credibility to build trust and long‑term partnerships
Lead high‑impact technical demonstrations that show how our AI and graph capabilities materially improve mission outcomes (more/better/faster operations across more targets)
Collaborate with government stakeholders to surface emerging operational requirements, capability gaps, and opportunities for new product directions
Act as the connective tissue between operators, leadership, and Twenty’s internal teams so we always build for real‑world mission impact, not slideware
Qualification
Required
10+ years of professional experience in cyber operations and intelligence analysis within U.S. Government military or intelligence organizations
Deep expertise in Targeteering, Digital Network Exploitation and Analysis (DNEA) and/or Exploitation Analyst (EA) methodologies and tools
Strong understanding of both offensive and defensive cyber mission sets and how they intersect with other domains
Extensive experience with multi‑domain intelligence analysis (e.g., correlating CYBER, SIGINT, GEOINT, HUMINT) in support of real operations
Demonstrated expertise in network analysis, persona development, and threat actor attribution
Strong background in operational planning and mission execution in cyber environments, including shaping and assessing effects
Advanced understanding of network protocols, exploitation techniques, and cyber attack methodologies
Experience using graph‑based analysis tools and methodologies for intelligence analysis and targeting
Familiarity with AI/ML applications in cyber operations or intelligence analysis, and interest in pushing these further in production systems
Understanding of cloud platforms and their security implications for government/IC environments
Familiarity with IoT protocols, Wi‑Fi exploitation, and electromagnetic spectrum operations
Experience with data visualization tools and techniques for complex intelligence products and decision briefs
Proven ability to translate complex operational and technical concepts for diverse audiences, including senior government officials
Experience mentoring analysts or leading operational teams, with examples of raising the bar for tradecraft and impact
Excellent written and verbal communication skills, with a track record of producing high‑quality intelligence products or operational briefs
Comfortable briefing senior leadership and providing clear, actionable recommendations under time pressure
Demonstrated ability to work effectively in cross‑functional teams that include operators, analysts, engineers, and product leaders
Bachelor's degree in Computer Science, Cybersecurity, Intelligence Studies, or a related field, or equivalent operational experience
Active TS/SCI - Full Scope Poly (or equivalent) required
Willingness to travel occasionally for customer engagements and operational support
Preferred
Previous experience as a technical lead or senior analyst in government cyber operations units
Track record of successfully transitioning from purely operational roles into product development, requirements engineering, or capability development
Experience with government acquisition, requirements development, or capability roadmapping processes
Background in training and doctrine development for cyber operations
Previous experience working with defense contractors or in public‑private partnerships
Publications, conference talks, or recognized contributions in cyber operations or intelligence analysis
Advanced technical certifications in cyber operations or intelligence analysis
Company
Twenty
We apply world-class software engineering to a warfighting domain of persistent conflict.
Funding
Current Stage
Early StageTotal Funding
$38MKey Investors
Caffeinated Capital
2025-11-20Series A· $38M
Company data provided by crunchbase