Twenty logo

Senior Forward Deployed Analyst

Twenty
Full-time
On-site
Fort Meade, Maryland, United States

Senior Forward Deployed Analyst

Twenty is seeking a Senior Forward Deployed Analyst in the Fort Meade area to serve as the subject matter expert (SME) bridging the gap between our revolutionary cyber technologies and real-world operational requirements. We're looking for someone with 10+ years of experience in cyber operations and intelligence analysis, with deep expertise in Digital Network Exploitation and Analysis (DNEA) and/or Exploitation Analyst (EA) operations within the U.S. Government military or intelligence organizations. In this role, you'll be the technical voice of the operator, working directly with our world-class engineering team to ensure our AI-powered graph database applications meet the complex demands of modern cyber operations. You'll translate operational requirements into technical specifications, validate that our systems enhance rather than hinder operator decision-making, and serve as the critical link between the battlefield of cyberspace and the development teams building tomorrow's cyber capabilities. If you're passionate about leveraging your operational expertise to shape the next generation of cyber tools while making a direct impact on national security, we want to talk to you.

About the Company

At Twenty, we're taking on one of the most critical challenges of our time: defending democracies in the digital age. We develop revolutionary technologies that operate at the intersection of cyber and electromagnetic domains, where the speed of operations exceeds human sensing and complexity transcends conventional boundaries. Our team doesn't just solve problems – we deliver game-changing outcomes that directly impact national security. We're pragmatic optimists who understand that while our mission of protecting America and its allies is challenging, success is possible.

Role Details

Cyber Operations & Analysis

  • Perform Digital Network Exploitation and Analysis (DNEA) analysis or Exploitation Analyst cyber operations as an integrated member of our operational team, conducting real-world cyber intelligence analysis and exploitation activities

  • Execute network analysis, persona development, and threat actor attribution using both traditional methods and our AI-enhanced graph database systems

  • Maintain operational proficiency and credibility through regular engagement in live cyber operations and intelligence production

Subject Matter Expertise & Requirements Translation

  • Serve as the primary SME for cyber operations and intelligence analysis, translating complex operational workflows into technical requirements for engineering teams

  • Validate that AI-powered graph database applications accurately represent and enhance cyber operations in both defensive and offensive contexts

  • Lead requirements gathering sessions with government customers and translate operational needs into actionable development priorities

Operational Integration & Validation

  • Work directly with cyber operators to gather feedback on user interface designs and system workflows

  • Create training materials and documentation that help operators effectively utilize our AI-enhanced cyber tools

Customer Engagement & Strategic Leadership

  • Represent Twenty in customer engagements, leveraging operational credibility to build trust and understanding

  • Lead technical demonstrations that showcase how our AI and graph database technologies enhance operational effectiveness

  • Collaborate with government stakeholders to identify emerging operational requirements and capability gaps

Qualifications

Operational Experience & Expertise

  • 10+ years of professional experience in cyber operations and intelligence analysis within U.S. Government military or intelligence organizations

  • Expert-level knowledge of Digital Network Exploitation and Analysis (DNEA) and Exploitation Analyst (EA) methodologies and tools

  • Deep understanding of cyber operations across both defensive and offensive mission sets

  • Extensive experience with multi-domain intelligence analysis correlating cyber, SIGINT, GEOINT, and HUMINT

  • Demonstrated expertise in network analysis, persona development, and threat actor attribution

  • Strong background in operational planning and mission execution in cyber environments

Technical Skills & Knowledge

  • Advanced understanding of network protocols, exploitation techniques, and cyber attack methodologies

  • Experience with graph-based analysis tools and methodologies for intelligence analysis

  • Knowledge of AI/ML applications in cyber operations and intelligence analysis

  • Familiarity with cloud platforms and their security implications for government operations

  • Understanding of IoT protocols, WiFi exploitation, and electromagnetic spectrum operations

  • Experience with data visualization tools and techniques for complex intelligence presentations

Leadership & Communication

  • Proven ability to translate complex technical concepts for diverse audiences including senior government officials

  • Strong leadership experience mentoring analysts and leading operational teams

  • Excellent written and verbal communication skills with ability to produce high-quality intelligence products

  • Experience briefing senior leadership and providing operational recommendations

  • Demonstrated ability to work effectively in cross-functional teams with technical and non-technical stakeholders

Education & Certifications

  • Bachelor's degree in Computer Science, Cybersecurity, Intelligence Studies, or related field, or equivalent operational experience

  • Advanced degrees or relevant certifications preferred

Security Requirements

  • Must possess and be able to maintain a TS/SCI security clearance with appropriate polygraph

  • U.S. citizenship required

  • Willingness to travel occasionally for customer engagements and operational support

Distinguishing Qualifications

  • Previous experience as a technical lead or senior analyst in government cyber operations units

  • Track record of successfully transitioning from operational roles to product development or requirements engineering

  • Experience with government acquisition processes and requirements development

  • Background in training and doctrine development for cyber operations

  • Previous experience working with defense contractors or in public-private partnerships

  • Publications or presentations in cyber operations or intelligence analysis fields

  • Advanced technical certifications in cyber operations or intelligence analysis