About The Position

Platform Threat Intelligence supports the security and trust of College Board systems by assessing relevant adversaries and translating that understanding into defensive outcomes. We focus on adversary objectives and behaviors that matter to our platform and work with engineering and operational partners to strengthen resilience, detection, and decision-making. The team produces high-confidence assessments of adversary behavior patterns and operational trends and communicates findings in ways that drive prioritized action. We collaborate with cross-functional stakeholders, including data and engineering partners, to improve visibility, coverage, and reporting using security-relevant datasets. In this role, you will translate adversary understanding into actionable, measurable improvements that strengthen platform trust. You will partner with Data Science, engineering teams, and operational stakeholders to shape analytics, reporting, and detection enhancements informed by internal signals and investigative evidence. Key aspects of the role include: Intelligence-to-action translation: Convert intelligence and stakeholder questions into clearly defined analytic efforts and decision-ready outputs. Detection and measurement: Identify and monitor meaningful behavioral patterns in security-relevant signals to improve detection quality and operational outcomes. Reporting and decision support: Produce concise deliverables, recurring reporting, and targeted deep dives that inform prioritization and leadership visibility. Cross-functional execution: Work across engineering, data, and operational teams to integrate outputs into workflows and drive follow-through. You will follow established information protection and secure-handling practices for sensitive materials, and ensure work aligns with applicable policies and professional standards. Clear documentation is expected to support defensible decisions and repeatable operations.

Requirements

  • 5–8 years of experience in threat intelligence, security engineering, security research, or a closely related field.
  • Proficiency with Python and at least one additional language for automation or prototyping.
  • Experience performing technical analysis of adversary behaviors and tools using common industry techniques.
  • Strong fundamentals in operating systems, networking, and attacker tradecraft, with the ability to explain technical findings clearly.
  • Experience producing clear written intelligence products for technical and non-technical audiences.
  • Ability to collaborate effectively across engineering and operational stakeholders in ambiguous environments.
  • Commitment to secure handling of sensitive materials and ethical conduct.
  • A passion for expanding educational and career opportunities and mission-driven work
  • Authorization to work in the United States for any employer
  • Curiosity and enthusiasm for emerging technologies, with a willingness to experiment with and adopt new AI-driven solutions and a comfort learning and applying new digital tools independently and proactively.
  • Clear and concise communication skills, written and verbal
  • A learner's mindset and a commitment to growth: welcoming diverse perspectives, giving and receiving timely, respectful feedback, and continuously improving through iterative learning and user input.
  • A drive for impact and excellence: solving complex problems, making data-informed decisions, prioritizing what matters most, and continuously improving through learning, user input, and external benchmarking.
  • A collaborative and empathetic approach: working across differences, fostering trust, and contributing to a culture of shared success.

Nice To Haves

  • An understanding of regional communication norms and online ecosystems relevant to threat research (e.g., local social platforms, forums, and media), with the ability to interpret nuance and context in reporting.
  • Ability to speak Cantonese and read/write Chinese (Traditional and/or Simplified) is strongly preferred; Vietnamese language proficiency is a plus.
  • Willingness to travel periodically in support of operational needs.

Responsibilities

  • Collect, curate, and analyze intelligence relevant to College Board products and adjacent services.
  • Assess adversary behaviors and trends to identify defensive and investigative opportunities and inform stakeholder priorities.
  • Maintain structured tracking of relevant threats and produce written assessments and briefings for technical and non-technical audiences.
  • Partner with engineering teams to translate findings into security requirements and hardening priorities.
  • Support operational stakeholders with analysis that informs investigations and related decision-making.
  • Operate as a cross-functional partner across engineering, data, and operational teams, maintaining strong working relationships.
  • Communicate clearly through written outputs and collaborative discussions to drive aligned action.
  • Contribute to repeatable workflows, documentation standards, and quality improvements that increase consistency and reliability.
  • Uphold safe handling expectations for sensitive information, including compliant storage, access, and sharing practices.
  • Contribute to improving the quality and usefulness of security-relevant signals and analytic outputs that support detection and measurement efforts.
  • When appropriate, support technical validation of hypotheses to reduce ambiguity and accelerate remediation, using policy-aligned approaches.

Benefits

  • Annual bonuses and opportunities for merit-based raises and promotions
  • A mission-driven workplace where your impact matters
  • A team that invests in your development and success

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

1,001-5,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service