JOBSEARCHER

Senior Forward Deployed Analyst

TwentyAugusta, GAApril 12th, 2026
About The CompanyAt Twenty, we're taking on one of the most critical challenges of our time: defending democracies in the digital age. We develop revolutionary technologies that operate at the intersection of the cyber and electromagnetic domains, where the speed of operations exceeds human sensing and complexity transcends conventional boundaries. Our team doesn't just solve problems – we deliver game-changing outcomes that directly impact national security. We're pragmatic optimists who understand that while our mission of protecting America and its allies is challenging, success is possible.Senior Forward Deployed AnalystTwenty is seeking a Senior Forward Deployed Analyst in the Augusta, GA area to serve as the subject matter expert (SME) bridging the gap between our revolutionary cyber technologies and real-world operational requirements. We're looking for someone with 10+ years of experience in cyber operations and intelligence analysis, with deep expertise in Digital Network Exploitation and Analysis (DNEA) and/or Exploitation Analyst (EA) operations within the U.S. Government military or intelligence organizations. In this role, you'll be the technical voice of the operator, working directly with our world-class engineering team to ensure our AI-powered graph database applications meet the complex demands of modern cyber operations. You'll translate operational requirements into technical specifications, validate that our systems enhance rather than hinder operator decision-making, and serve as the critical link between the battlefield of cyberspace and the development teams building tomorrow's cyber capabilities. If you're passionate about leveraging your operational expertise to shape the next generation of cyber tools while making a direct impact on national security, we want to talk to you.Role DetailsCyber Operations & AnalysisPerform Digital Network Exploitation and Analysis (DNEA) analysis or Exploitation Analyst cyber operations as an integrated member of our operational team, conducting real-world cyber intelligence analysis and exploitation activitiesExecute network analysis, persona development, and threat actor attribution using both traditional methods and our AI-enhanced graph database systemsMaintain operational proficiency and credibility through regular engagement in live cyber operations and intelligence productionSubject Matter Expertise & Requirements TranslationServe as the primary SME for cyber operations and intelligence analysis, translating complex operational workflows into technical requirements for engineering teamsValidate that AI-powered graph database applications accurately represent and enhance cyber operations in both defensive and offensive contextsLead requirements gathering sessions with government customers and translate operational needs into actionable development prioritiesOperational Integration & ValidationWork directly with cyber operators to gather feedback on user interface designs and system workflowsCreate training materials and documentation that help operators effectively utilize our AI-enhanced cyber toolsCustomer Engagement & Strategic LeadershipRepresent Twenty in customer engagements, leveraging operational credibility to build trust and understandingLead technical demonstrations that showcase how our AI and graph database technologies enhance operational effectivenessCollaborate with government stakeholders to identify emerging operational requirements and capability gapsQualificationsOperational Experience & Expertise10+ years of professional experience in cyber operations and intelligence analysis within U.S. Government military or intelligence organizationsExpert-level knowledge of Digital Network Exploitation and Analysis (DNEA) and Exploitation Analyst (EA) methodologies and toolsDeep understanding of cyber operations across both defensive and offensive mission setsExtensive experience with multi-domain intelligence analysis correlating cyber, SIGINT, GEOINT, and HUMINTDemonstrated expertise in network analysis, persona development, and threat actor attributionStrong background in operational planning and mission execution in cyber environmentsTechnical Skills & KnowledgeAdvanced understanding of network protocols, exploitation techniques, and cyber attack methodologiesExperience with graph-based analysis tools and methodologies for intelligence analysisKnowledge of AI/ML applications in cyber operations and intelligence analysisFamiliarity with cloud platforms and their security implications for government operationsUnderstanding of IoT protocols, WiFi exploitation, and electromagnetic spectrum operationsExperience with data visualization tools and techniques for complex intelligence presentationsLeadership & CommunicationProven ability to translate complex technical concepts for diverse audiences including senior government officialsStrong leadership experience mentoring analysts and leading operational teamsExcellent written and verbal communication skills with ability to produce high-quality intelligence productsExperience briefing senior leadership and providing operational recommendationsDemonstrated ability to work effectively in cross-functional teams with technical and non-technical stakeholdersEducation & CertificationsBachelor's degree in Computer Science, Cybersecurity, Intelligence Studies, or related field, or equivalent operational experienceAdvanced degrees or relevant certifications preferredSecurity RequirementsMust possess and be able to maintain a TS/SCI security clearance with appropriate polygraphU.S. citizenship requiredWillingness to travel occasionally for customer engagements and operational supportDistinguishing QualificationsPrevious experience as a technical lead or senior analyst in government cyber operations unitsTrack record of successfully transitioning from operational roles to product development or requirements engineeringExperience with government acquisition processes and requirements developmentBackground in training and doctrine development for cyber operationsPrevious experience working with defense contractors or in public-private partnershipsPublications or presentations in cyber operations or intelligence analysis fieldsAdvanced technical certifications in cyber operations or intelligence analysisIf this role sounds like you, apply and share with us your interest.Some positions may require eligibility to obtain a U.S. Government security clearance. Any clearance requirement will be listed in the role description.Twenty is an equal opportunity employer. We consider all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, veteran status, disability, or any other protected status.If you need a reasonable accommodation during the hiring process, let us know and we will work with you.