Twenty · 4 months ago
Associate Security Researcher
Twenty is a company focused on defending democracies in the digital age through innovative technologies. They are seeking an Associate Offensive Cyber Research Engineer to develop and automate attack paths, enhance data processing, and create tools that advance their cyber capabilities.
Cyber SecurityMilitarySoftware
Responsibilities
Design and implement sophisticated attack paths that emulate real-world adversary behaviors and TTPs
Create modular, reusable components for common attack techniques and lateral movement methods
Develop custom tools and scripts to support attack path execution and validation
Research and evaluate diverse data sources for enhancing attack path effectiveness
Implement data enrichment pipelines to augment existing datasets with threat intelligence
Automate common red team tools and techniques for scalable deployment
Develop custom extensions and modules for industry-standard red team frameworks
Create efficient workflows for repetitive security testing procedures
Design and implement parsers for various data formats including logs, network traffic, and threat feeds
Create ETL pipelines for processing security-relevant data at scale
Develop standardized schemas for structured and unstructured security data
Build data validation and cleansing mechanisms
Implement efficient storage and retrieval systems for processed data
Qualification
Required
4+ years of threat research and coding experience
Operational cyber security experience in one or more of the following domains: Digital Network Exploitation Analysis (DNEA) within U.S. Government military or intelligence organizations, Exploitation Analyst (EA) operations conducting network exploitation and intelligence analysis, Penetration Testing/Red Teaming performing offensive security assessments and adversary emulation, Threat Hunting in a Security Operations Center (SOC) identifying and tracking sophisticated threats
Deep understanding of the MITRE ATT&CK framework with practical experience mapping and implementing common adversary TTPs (Tactics, Techniques, and Procedures)
Proven experience operating industry-standard threat emulation platforms and command & control frameworks, including development of custom payloads and modules
Track record of integrating and analyzing threat intelligence data sources to enhance detection and response capabilities
Demonstrated proficiency in implementing and detecting advanced persistence mechanisms, defense evasion techniques, and counter-forensic methods
Strong containerization experience using Docker, including creating secure, production-ready containers and managing multi-container applications with Docker Compose
Advanced programming skills in Python and/or Golang, with emphasis on developing security tools and automation frameworks
Experience writing complex graph queries and traversals for analyzing relationships in large datasets, preferably with Neo4j or similar graph databases
Comprehensive knowledge of cybersecurity principles including network security, application security, and secure coding practices
Practical experience in offensive cyber operations, including payload development, post-exploitation, and lateral movement techniques
Demonstrated expertise in red team methodologies, including campaign planning, OPSEC considerations, and adversary emulation based on real-world threats
Bachelor's degree in Computer Science, Software Engineering, Cybersecurity, or related field, or equivalent practical experience
Must be eligible to obtain a U.S. Government security clearance
Preferred
Previous experience in government cyber operations units or intelligence organizations conducting DNEA or EA operations
Experience with AI/ML integration in operational systems
Background in developing tools for cyber operators or security analysts
Experience with large-scale data processing and analysis
Certifications such as OSCP, OSCE, GPEN, GXPN, or government-recognized offensive security credentials
Experience with multi-domain intelligence analysis correlating cyber, SIGINT, and other intelligence sources
Background in malware analysis, reverse engineering, or exploit development
Experience with Agile development methodologies
System architecture and design experience
Performance optimization and scalability experience
Open-source contributions or personal projects demonstrating relevant skills
Experience with cloud security (AWS, Azure, GCP) and cloud-native attack techniques
Knowledge of wireless security, IoT protocols, and electromagnetic spectrum operations
Familiarity with forensics tools and incident response procedures
Company
Twenty
We apply world-class software engineering to a warfighting domain of persistent conflict.
Funding
Current Stage
Early StageTotal Funding
$38MKey Investors
Caffeinated Capital
2025-11-20Series A· $38M
Company data provided by crunchbase