Cyber Exploitation Analyst
Adaptic
About the role
About
At Adaptic, our Cyber Exploitation Analysts operate at the intersection of cyber, SIGINT, and network analysisturning complex data into actionable intelligence. Supporting the DoD and Intelligence Community, you'll work on mission-critical problems that require deep technical insight and analytical precision.
Whether your background is in target development, network exploitation, system-level analysis, or cyber defense, we're looking for analysts at all levels who are driven to solve complex challenges and contribute to real-world mission outcomes.
Your Impact
You'll support mission operations by analyzing data, identifying patterns, and developing insights across a variety of cyber and SIGINT domains. Day-to-day, that can look like:
- Analyzing collection and open-source data to generate leads, insights, and actionable intelligence
- Building and maintaining target profiles, network maps, and analytic datasets
- Identifying intelligence gaps and shaping collection or analysis strategies to address them
- Applying pattern recognition across communications, network traffic, and digital footprints
- Evaluating target networks and developing exploitation or operational plans
- Analyzing data across multiple layers of the OSI stack, including network protocols and infrastructure
- Understanding how devices, systems, and networks interact within complex environments
- Supporting exploitation efforts across systems, networks, and adversary infrastructure
- Leveraging logs, network data, and system artifacts to identify vulnerabilities or threats
- Developing mitigations and strengthening network defenses against cyber threats
- Collaborating with cross-functional teams to integrate analysis into mission workflows
- Contributing to tradecraft development and mentoring junior analysts (for more senior roles)
Focus Areas
We are hiring across multiple mission areas, including:
- Target Development (TDNA) Target profiling, pattern analysis, and intelligence gap identification
- Digital Network Exploitation (DNEA) Network mapping, SIGINT analysis, and deep understanding of network infrastructure
- Exploitation Analysis (EA) Developing and executing exploitation strategies across systems and adversary environments
- Cyber Network Defense Analysis (CNDA) Threat detection, vulnerability analysis, and network defense
Qualifications
- All positions require an active TS/SCI with polygraph
- Experience in cyber, SIGINT, network analysis, or related mission areas
- Strong understanding of networks, routing, and system interactions
- Experience working with multiple data sources (e.g., network traffic, logs, OSINT, SIGINT)
- Familiarity with analysis tools, scripting, or technical troubleshooting
- Ability to identify patterns, analyze complex data, and solve challenging problems
- A collaborative mindset with the ability to work independently and on a team
Nice to Have
- Experience with packet analysis, intrusion detection systems, or network defense tools
- Familiarity with OSI model, network protocols, and traffic analysis
- Background in cybersecurity, vulnerability analysis, or penetration testing
- Experience with system internals, operating systems, or network architecture
- Military cyber training (e.g., JCAC) or language proficiency (ILR scores)
- Experience supporting mission or operational environments within the IC/DoD
Find the signal. Enable the mission. Apply now to learn more about our extensive benefits and customizable compensation packages
Skills
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free