Cyber Mission Architect – Intelligence Community
Listed on 2026-01-01
-
IT/Tech
Cybersecurity, Data Security
Role Overview
Twenty is seeking a Cyber Mission Architect – Intelligence Community to bridge elite Title 50 cyber tradecraft with Twenty’s AI‑powered cyber operations products. This role is for a senior operator or targeteer whose credibility and operational excellence already make them a go‑to voice for shaping missions – and who now wants to scale that impact by 100× through software
.
You’ve spent years in offensive cyber operations and intelligence analysis. You’re the person key stakeholders seek out before they do hard things. You understand how missions actually run across DNEA/EA, multi‑domain intelligence, and complex targeting problems, and you care most about more/better/faster operational impact
.
At Twenty, you'll be equally comfortable engaging highly technical cyber operations personnel, program personnel of varying seniority, and senior intelligence officials. Your impact will be magnified by our world‑class engineering team as you ensure that our AI‑powered graph database applications meet the complex demands of modern cyber operations.
What You’ll DoSubject Matter Expertise & Requirements TranslationMaintain operational proficiency and credibility through regular engagement with live cyber operations and intelligence production (within appropriate constraints).
Serve as a primary SME for cyber operations and intelligence analysis, translating complex operational workflows into clear, prioritized technical requirements for Twenty’s product and engineering teams.
Validate that our AI‑powered graph database applications accurately represent and enhance offensive and defensive cyber operations, including DNEA / EA tradecraft.
Lead structured requirements‑gathering sessions with government customers and convert operational needs into actionable, testable development work.
Go beyond demos: design, build, and refine operational workflows in Twenty’s products for new and existing IC user groups.
Work directly with cyber operators and analysts to gather feedback on user interfaces, graph models, and workflows, then iterate quickly with Forward Deployed Analysts and core engineering.
Identify relevant datasets and signals through deep engagement with customer problems, and partner with Forward Deployed Analysts to integrate them into stable, extensible pipelines.
Present mission workflows, results, and next‑step proposals to audiences ranging from operators to senior executives.
Scope new deployments and use cases across additional IC elements, helping Twenty expand from initial adopters to broader mission footprints.
Represent Twenty in customer engagements, using your operational credibility to build trust and long‑term partnerships.
Lead high‑impact technical demonstrations that show how our AI and graph capabilities materially improve mission outcomes (more/better/faster operations across more targets).
Collaborate with government stakeholders to surface emerging operational requirements, capability gaps, and opportunities for new product directions.
Act as the connective tissue between operators, leadership, and Twenty’s internal teams so we always build for real‑world mission impact, not slideware.
10+ years of professional experience in cyber operations and intelligence analysis within U.S. Government military or intelligence organizations.
Deep expertise in Targeteering, Digital Network Exploitation and Analysis (DNEA) and/or Exploitation Analyst (EA) methodologies and tools.
Strong understanding of both offensive and defensive cyber mission sets and how they intersect with other domains.
Extensive experience with multi‑domain intelligence analysis (e.g., correlating CYBER, SIGINT, GEOINT, HUMINT) in support of real operations.
Demonstrated expertise in network analysis, persona development, and threat actor attribution.
Strong background in operational planning and mission execution in cyber environments, including shaping and assessing effects.
Advanced understanding of network protocols, exploitation techniques, and cyber attack…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).