Collect, curate, and analyze intelligence relevant to College Board products and adjacent services
Assess adversary behaviors and trends to identify defensive and investigative opportunities and inform stakeholder priorities
Maintain structured tracking of relevant threats and produce written assessments and briefings for technical and non-technical audiences
Partner with engineering teams to translate findings into security requirements and hardening priorities
Support operational stakeholders with analysis that informs investigations and related decision-making
Operate as a cross-functional partner across engineering, data, and operational teams, maintaining strong working relationships
Communicate clearly through written outputs and collaborative discussions to drive aligned action
Contribute to repeatable workflows, documentation standards, and quality improvements that increase consistency and reliability
Uphold safe handling expectations for sensitive information, including compliant storage, access, and sharing practices
Contribute to improving the quality and usefulness of security-relevant signals and analytic outputs that support detection and measurement efforts
When appropriate, support technical validation of hypotheses to reduce ambiguity and accelerate remediation, using policy-aligned approaches.
Requirements
5–8 years of experience in threat intelligence, security engineering, security research, or a closely related field
Proficiency with Python and at least one additional language for automation or prototyping
Experience performing technical analysis of adversary behaviors and tools using common industry techniques
Strong fundamentals in operating systems, networking, and attacker tradecraft, with the ability to explain technical findings clearly
Experience producing clear written intelligence products for technical and non-technical audiences
Ability to collaborate effectively across engineering and operational stakeholders in ambiguous environments
Commitment to secure handling of sensitive materials and ethical conduct
Cultural/operational context: An understanding of regional communication norms and online ecosystems relevant to threat research (e.g., local social platforms, forums, and media), with the ability to interpret nuance and context in reporting
Language skills: Ability to speak Cantonese and read/write Chinese (Traditional and/or Simplified) is strongly preferred; Vietnamese language proficiency is a plus
Willingness to travel periodically in support of operational needs.
Tech Stack
Python
Benefits
Annual bonuses and opportunities for merit-based raises and promotions
A mission-driven workplace where your impact matters
A team that invests in your development and success