For job seekers
For companies
Set your preferences and let your AI copilot handle the job search while you sleep.
Twenty is seeking an exceptionally skilled Staff Offensive Cyber Research Engineer for an in-office position in its Arlington, VA office to lead the development of sophisticated offensive cyber capabilities that defend democracies worldwide. We're looking for someone with 6-8 years of deep technical expertise in offensive cyber operations, software development, and research, combined with proven leadership experience mentoring engineers and driving strategic technical initiatives. In this role, you'll architect and lead the development of advanced attack path frameworks, establish engineering best practices for offensive tooling, mentor junior researchers, and serve as a technical authority on adversarial techniques and red team operations. You'll leverage your extensive operational background—ideally from government/military Digital Network Exploitation Analysis (DNEA), Exploitation Analyst (EA) operations, advanced penetration testing, or threat intelligence analysis—to shape the technical direction of our offensive cyber capabilities and build the next generation of cyber technologies for the United States and its allies.
At Twenty, we're taking on one of the most critical challenges of our time: defending democracies in the digital age. We develop revolutionary technologies that operate at the intersection of cyber and electromagnetic domains, where the speed and complexity of operations exceeds human cognition. Our team doesn't just solve problems – we deliver game-changing outcomes that directly improve national security. We're pragmatic optimists who understand that while our mission of defending America and its allies is challenging, we can succeed.
Lead the architecture and design of sophisticated attack path frameworks that emulate advanced persistent threat (APT) behaviors and nation-state TTPs
Establish technical standards and best practices for offensive cyber tool development across the organization
Evaluate and recommend engineering courses of action for new offensive capabilities and system enhancements
Drive technical decision-making for complex offensive cyber integrations and performance optimizations
Architect scalable, modular frameworks for attack technique automation and adversary emulation
Conduct advanced research into emerging adversary techniques, zero-day exploitation strategies, and novel attack vectors
Develop proof-of-concept tools and techniques that push the boundaries of offensive cyber capabilities
Stay current with threat actor innovations and translate emerging TTPs into defensive and offensive capabilities
Publish internal research findings and contribute to the broader cyber security research community
Identify capability gaps and lead initiatives to develop new offensive tools and methodologies
Mentor and provide technical guidance to offensive cyber engineers and researchers, conducting thorough code reviews and knowledge transfer
Lead technical discussions and facilitate strategic planning sessions for offensive capability development
Organize research efforts and coordinate cross-functional collaboration with data engineering, backend, and intelligence analysis teams
Establish and maintain engineering best practices, secure coding standards, and operational security procedures
Guide junior engineers in understanding complex adversary behaviors and translating them into technical implementations
Design and implement advanced attack paths that emulate sophisticated adversary campaigns across multiple domains
Create reusable, production-grade components for complex attack techniques including credential harvesting, lateral movement, and defense evasion
Develop custom tooling and automation frameworks that operate at machine speed for large-scale adversary emulation
Lead the design of ETL pipelines for processing threat intelligence, security logs, and operational data at scale
Architect standardized schemas for cyber operations datasets that support graph-based analysis and AI/ML workflows
Implement advanced data enrichment pipelines that integrate diverse threat intelligence sources
Design efficient storage and retrieval systems for large-scale security-relevant data
Work closely with government customers and operational teams to understand mission requirements and capability gaps
Translate operational feedback into technical requirements and development priorities
Lead technical demonstrations showcasing offensive cyber capabilities to stakeholders
Provide subject matter expertise for customer engagements and strategic planning sessions
6-8 years of threat research, offensive cyber operations, and software development experience
Expert-level operational cyber security experience in one or more of the following domains:
Digital Network Exploitation Analysis (DNEA) within U.S. Government military or intelligence organizations
Exploitation Analyst (EA) operations conducting advanced network exploitation and intelligence analysis
Advanced Penetration Testing/Red Teaming leading sophisticated offensive security assessments
Senior-level Threat Hunting and threat intelligence analysis in high-stakes environments
Demonstrated technical leadership experience mentoring offensive cyber engineers and leading research initiatives
Deep expertise in the MITRE ATT&CK framework with proven track record developing and implementing advanced adversary TTPs across multiple tactics
Expert-level experience operating and extending industry-standard threat emulation platforms (Cobalt Strike, Metasploit, custom C2 frameworks) with proven ability to develop sophisticated custom payloads, modules, and evasion techniques
Extensive experience integrating and analyzing diverse threat intelligence sources including commercial feeds, OSINT, and government intelligence
Advanced proficiency in implementing sophisticated persistence mechanisms, advanced defense evasion techniques, counter-forensics, and anti-analysis methods
Expert containerization and orchestration experience using Docker and Kubernetes for secure, scalable offensive tool deployment
Advanced programming and software architecture skills in Python and Golang, with demonstrated ability to build maintainable, production-grade security tools and automation frameworks
Expert-level experience writing complex graph queries and developing graph-based analytical tools using Neo4j or similar graph databases
Comprehensive knowledge of cybersecurity across network security, application security, secure coding, cryptography, and security architecture
Extensive practical experience in offensive cyber operations including advanced payload development, post-exploitation frameworks, command and control infrastructure, and multi-stage attack chains
Expert knowledge of red team methodologies including campaign planning, operational security (OPSEC), adversary simulation, and realistic threat emulation based on intelligence-driven scenarios
Proven ability to lead technical projects and mentor engineering teams
Strong communication skills with ability to explain complex offensive techniques to diverse audiences including executives and government officials
Experience conducting thorough code reviews and establishing development standards for security tools
Track record of driving technical decision-making and influencing strategic direction
Bachelor's degree in Computer Science, Software Engineering, Cybersecurity, or related field; Master's degree preferred, or equivalent practical experience
Must possess or be eligible to obtain a U.S. Government security clearance (TS/SCI preferred)
Previous technical leadership experience in government cyber operations units or intelligence organizations conducting DNEA or EA operations
Experience leading offensive cyber capability development programs or research initiatives
Track record of developing novel offensive techniques or tools adopted by operational units
Advanced certifications such as OSCP, OSCE, OSEE, GXPN, or government-recognized advanced offensive security credentials
Experience with AI/ML integration in offensive cyber operations and automated threat emulation
Extensive background in malware analysis, reverse engineering, exploit development, or vulnerability research
Experience with multi-domain intelligence analysis correlating cyber, SIGINT, ELINT, and other intelligence sources
Publications or conference presentations on offensive cyber research or techniques
Contributions to open-source offensive security tools or frameworks
Experience with Agile development methodologies and leading agile teams
Advanced system architecture and design experience for large-scale security systems
Performance optimization and scalability experience for high-throughput data processing
Experience with cloud security (AWS, Azure, GCP) and cloud-native attack techniques
Deep knowledge of wireless security, IoT protocols, and electromagnetic spectrum operations
Expertise with forensics tools, incident response procedures, and defensive cyber operations
Understanding of government acquisition processes and requirements development
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!