Analyze the Target. Understand the Network Join us as a Cyber Exploitation Analyst!
At Adaptic, our Cyber Exploitation Analysts operate at the intersection of cyber, SIGINT, and network analysis—turning complex data into actionable intelligence. Supporting the DoD and Intelligence Community, you'll work on mission-critical problems that require deep technical insight and analytical precision.
Whether your background is in target development, network exploitation, system-level analysis, or cyber defense, we're looking for analysts at all levels who are driven to solve complex challenges and contribute to real-world mission outcomes.
Your Impact
You'll support mission operations by analyzing data, identifying patterns, and developing insights across a variety of cyber and SIGINT domains. Day-to-day, that can look like:
Analyzing collection and open-source data to generate leads, insights, and actionable intelligence
Building and maintaining target profiles, network maps, and analytic datasets
Identifying intelligence gaps and shaping collection or analysis strategies to address them
Applying pattern recognition across communications, network traffic, and digital footprints
Evaluating target networks and developing exploitation or operational plans
Analyzing data across multiple layers of the OSI stack, including network protocols and infrastructure
Understanding how devices, systems, and networks interact within complex environments
Supporting exploitation efforts across systems, networks, and adversary infrastructure
Leveraging logs, network data, and system artifacts to identify vulnerabilities or threats
Developing mitigations and strengthening network defenses against cyber threats
Collaborating with cross-functional teams to integrate analysis into mission workflows
Contributing to tradecraft development and mentoring junior analysts (for more senior roles)
Focus Areas
We are hiring across multiple mission areas, including:
Target Development (TDNA) – Target profiling, pattern analysis, and intelligence gap identification
Digital Network Exploitation (DNEA) – Network mapping, SIGINT analysis, and deep understanding of network infrastructure
Exploitation Analysis (EA) – Developing and executing exploitation strategies across systems and adversary environments