Capital One's Cyber Organization is a fast-paced, dynamic environment committed to enabling and securing the business. In this role, you will be responsible for solving hard problems using cutting edge technology in the areas of engineering, alert fidelity/effectiveness, and monitoring.
Proactively access alerts and signatures for effectiveness which can be implemented on cyber defense tools in response to new or observed threats within the network environment or enclave.
Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.
Collaborate with operation teams to build novel detections, establish repeatable processes, and drive automation for containment and remediation activities
Analyze and define data requirements and specifications for log ingestion from various data sources
Conduct time-sensitive analysis during cyber investigations, contextualizing identified impact (exfiltration, operational impact) and informing leadership to actively respond to emerging risk
Demonstrate a deep knowledge of adversary techniques and emerging threats that could adversely impact business activities.
Support day-to-day Countermeasures operations
Maintain Alert Review Life Cycle processes and documentation
Maintain Countermeasures processes, workflows, and tools
Develop, update and maintain ‘playbooks' which provide guidelines to our CSOC detect analyst to effectively and efficiently, detect cyber incidents
Identify and enhance processes where automation has the potential to improve efficiency
Provide a suite of services (Tooling, Content, Training) to the CSOC that enables efficient and effective response to Cyber related issues.
Provide support to operational & cybersecurity strategy development
Utilize industry recognized frameworks such as NIST 800-61 to perform assessments and document work activities
High School Diploma, GED or Equivalent Certification
At least 2 years of experience working in a Security Operations or a Security Engineering role
At least 2 years of experience in device or policy management and creation (Firewall, IDS, IPS or SIEM)
At least 1 years of experience working with Enterprise Network Security and Security Perimeters
At least 1 years of experience with packet capture devices, syslog, netflow or application performance management
At least 1 year of experience in Data Analytics (log search or analysis)
At least 1 of the following industry certifications (CEH, GCIA, GCIH, GISP, Security+, AWS Cloud Practitioner, AWS Solutions Architect, CISSP, CCSP or CISM)
At least 2 years of experience using Security Information and Event Management technologies (Securonix, ArcSight, LogRhythm, ELK, or Splunk)
3+ years of experience working with network and operating system security concepts
1+ years of experience with cyber use case and content development within SIEM systems, including SOAR methodologies
2+ years of experience in Data Analytics (log search or analysis)
Experience working in the financial industry or similarly regulated environment
Experience writing regular expressions
At this time, Capital One Will not sponsor a new applicant for employment authorization for this positionNo agencies please. Capital One is an Equal Opportunity Employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex, race, color, age, national origin, religion, physical and mental disability, genetic information, marital status, sexual orientation, gender identity/assignment, citizenship, pregnancy or maternity, protected veteran status, or any other status prohibited by applicable national, federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at RecruitingAccommodation@capitalone.com. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to Careers@capitalone.com
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
Based on recent jobs postings on Zippia, the average salary in the U.S. for a Cyber Security Analyst is $76,366 per year or $37 per hour. The highest paying Cyber Security Analyst jobs have a salary over $98,000 per year while the lowest paying Cyber Security Analyst jobs pay $59,000 per year
Team leaders are responsible for managing a team for a specific project or work component. They primarily guide the team members and ensure that they are still working towards the set goals. Team leaders create strategies to reach goals, cascade the goals and strategies to team members, assign tasks, conduct periodic check-ups on the roadmap towards the goals, foster an engaging work environment, motivate and coach team members, monitor team performance, evaluate the strategies and come up with mitigating plans as needed. They are also responsible for reporting the team's progress to higher management.
Security engineers are responsible for developing and overseeing data and security software to help prevent data breaches, leaks, and taps related to cybercrime. Other duties and responsibilities include developing new systems to help protect computer networks and assets, configuring firewalls, and conducting penetration testing to pinpoint vulnerabilities. Additionally, security engineers are responsible for investigating attacks and help prevent cybersecurity threat. They are also responsible for creating new processes for authorization, encryption algorithms, and authentication, and analyzing current security policies.
A cyber security engineer specializes in designing and establishing security measures to protect a company's network and data from hackers or cyber attacks. Their responsibilities primarily revolve around planning and implementing cyber security systems, responding to any problems or concerns, handling security breaches and emergencies, and troubleshooting to identify any issues or vulnerabilities. Moreover, a cyber security engineer may perform clerical tasks such as producing progress reports and documentation, creating instructional materials for systems, managing schedules, and coordinating with department managers, all while adhering to the company's policies and regulations.
Project managers oversee a specific project related to the organization's business. They manage the whole project from inception to evaluation. They initiate planning with involved departments, follow-through on the plans, ensure smooth execution of the plans, and evaluate the project for further improvements should these be needed. In line with this, project managers also ensure that the project is cost-efficient and well within the budget. They also manage the different work teams involved in the project and ensure that things are running smoothly on this aspect as well.