Company Overview
At Twenty, we’re taking on one of the most critical challenges of our time: defending democracies in the digital age. We develop revolutionary technologies that operate at the intersection of cyber and electromagnetic domains, where the speed of operations exceeds human sensing and the complexity transcends conventional boundaries. Our team doesn’t just solve problems – we deliver outsized outcomes that directly impact national security. We’re pragmatic optimists who understand that while our mission is challenging, we have everything needed to succeed in protecting our nation and allies.
About the job
Twenty is seeking an innovative Associate Cyber Security Research Engineer for an in-office position in its Arlington, VA office with strong research skills, software development, and offensive security expertise to join our mission of defending democracies. In this role, you’ll develop and automate sophisticated attack paths, leverage machine-speed data processing, and create tools that advance our cyber and electromagnetic capabilities. We’re looking for someone who combines practical development skills with a deep understanding of adversarial techniques to help build the next generation of cyber technologies for the United States and its allies.
About the Company
At Twenty, we’re taking on one of the most critical challenges of our time: defending democracies in the digital age. We develop revolutionary technologies that operate at the intersection of cyber and electromagnetic domains, where the speed and complexity of operations exceeds human cognition. Our team doesn’t just solve problems – we deliver game-changing outcomes that directly improve national security. We’re pragmatic optimists who understand that while our mission of defending America and its allies is challenging, we can succeed.
Role Details
Attack Path Development & Implementation
- Design and implement sophisticated attack paths that emulate real-world adversary behaviors and TTPs
- Create modular, reusable components for common attack techniques and lateral movement methods
- Develop custom tools and scripts to support attack path execution and validation
Data Analysis & Enrichment
- Research and evaluate diverse data sources for enhancing attack path effectiveness
- Implement data enrichment pipelines to augment existing datasets with threat intelligence
Automation & Tool Development
- Automate common red team tools and techniques for scalable deployment
- Develop custom extensions and modules for industry-standard red team frameworks
- Create efficient workflows for repetitive security testing procedures
Data Engineering & Processing
- Design and implement parsers for various data formats including logs, network traffic, and threat feeds
- Create ETL pipelines for processing security-relevant data at scale
- Develop standardized schemas for structured and unstructured security data
- Build data validation and cleansing mechanisms
- Implement efficient storage and retrieval systems for processed data
Qualifications
Technical Skills & Experience
- 3+ years of threat research and coding experience
- Deep understanding of the MITRE ATT&CK framework with practical experience mapping and implementing common adversary TTPs (Tactics, Techniques, and Procedures)
- Proven experience operating industry-standard threat emulation platforms and command & control frameworks, including development of custom payloads and modules
- Track record of integrating and analyzing threat intelligence data sources to enhance detection and response capabilities
- Demonstrated proficiency in implementing and detecting advanced persistence mechanisms, defense evasion techniques, and counter-forensic methods
- Strong containerization experience using Docker, including creating secure, production-ready containers and managing multi-container applications with Docker Compose
- Advanced programming skills in Python and/or Golang, with emphasis on developing security tools and automation frameworks
- Experience writing complex graph queries and traversals for analyzing relationships in large datasets, preferably with Neo4j or similar graph databases
- Strong background in API development and integration, including designing, implementing, and consuming RESTful services with proper security controls
- Comprehensive knowledge of cybersecurity principles including network security, application security, and secure coding practices
- Practical experience in offensive cyber operations, including payload development, post-exploitation, and lateral movement techniques
- Demonstrated expertise in red team methodologies, including campaign planning, OPSEC considerations, and adversary emulation based on real-world threats
How to Apply:
APPLY