Analyze the Target. Understand the Network Join us as a Cyber Exploitation Analyst!
At Adaptic, our Cyber Exploitation Analysts operate at the intersection of cyber, SIGINT, and network analysis—turning complex data into actionable intelligence. Supporting the DoD and Intelligence Community, you'll work on mission-critical problems that require deep technical insight and analytical precision.
Whether your background is in target development, network exploitation, system-level analysis, or cyber defense, we're looking for analysts at all levels who are driven to solve complex challenges and contribute to real-world mission outcomes.
_Your Impact _
You'll support mission operations by analyzing data, identifying patterns, and developing insights across a variety of cyber and SIGINT domains. Day-to-day, that can look like:
Analyzing collection and open-source data to generate leads, insights, and actionable intelligence
Building and maintaining target profiles, network maps, and analytic datasets
Identifying intelligence gaps and shaping collection or analysis strategies to address them
Applying pattern recognition across communications, network traffic, and digital footprints
Evaluating target networks and developing exploitation or operational plans
Analyzing data across multiple layers of the OSI stack, including network protocols and infrastructure
Understanding how devices, systems, and networks interact within complex environments
Supporting exploitation efforts across systems, networks, and adversary infrastructure
Leveraging logs, network data, and system artifacts to identify vulnerabilities or threats
Developing mitigations and strengthening network defenses against cyber threats
Collaborating with cross-functional teams to integrate analysis into mission workflows
Contributing to tradecraft development and mentoring junior analysts (for more senior roles)
_Focus Areas _
We are hiring across multiple mission areas, including:
Target Development (TDNA) – Target profiling, pattern analysis, and intelligence gap identification
Digital Network Exploitation (DNEA) – Network mapping, SIGINT analysis, and deep understanding of network infrastructure
Exploitation Analysis (EA) – Developing and executing exploitation strategies across systems and adversary environments
Cyber Network Defense Analysis (CNDA) – Threat detection, vulnerability analysis, and network defense
_Qualifications _
All positions require an active TS/SCI with polygraph
Experience in cyber, SIGINT, network analysis, or related mission areas
Strong understanding of networks, routing, and system interactions
Experience working with multiple data sources (e.g., network traffic, logs, OSINT, SIGINT)
Familiarity with analysis tools, scripting, or technical troubleshooting
Ability to identify patterns, analyze complex data, and solve challenging problems
A collaborative mindset with the ability to work independently and on a team
_Nice to Have _
Experience with packet analysis, intrusion detection systems, or network defense tools
Familiarity with OSI model, network protocols, and traffic analysis
Background in cybersecurity, vulnerability analysis, or penetration testing
Experience with system internals, operating systems, or network architecture
Military cyber training (e.g., JCAC) or language proficiency (ILR scores)
Experience supporting mission or operational environments within the IC/DoD
Find the signal. Enable the mission. Apply now to learn more about our extensive benefits and customizable compensation packages