המקום בו המומחים והחברות הטובות ביותר נפגשים
What You’ll Do:
Be a product expert in the Cyber Security Endpoint Operations and Policy Service to deliver on day-to-day commitments.
POC new and emerging Cyber Tools and Technologies
Support audit responses and investigations
Track and report key performance indicators and metrics
Identify gaps in controls, processes, systems and recommend solutions
Lead team to apply technical skills to recommend, implement, support, improve, and operate information protection technologies
Communicate deep technical security threat & operations awareness across the Cyber division
Provide project updates in various project meetings
Provide Subject Matter Expertise on Endpoint Security Technologies including the design, configuration, integration and deployment of enterprise security tools.
Enhance and maintain endpoint security platforms and process ie System Monitoring and System Logging, Application Control, Privilege Access Management
Assess overall security posture of the endpoint environment including security event detection, triage and threat analysis
Research and analyze emerging technologies that enhance security capabilities and support current and future business objectives. Contribute to enterprise technology evaluations and roadmap discussions
Assess existing security technologies to establish opportunities for improved endpoint protection controls. Ensure security solutions, policies and procedures are sufficient to meet and respond to threats to our data and endpoint infrastructure. Recommend and provide technical support processes, metrics and SLAs.
Create and Deliver reports pertaining to endpoint security and compliance
Support and document the implementation of approved endpoint security software and infrastructure components. Oversee projects from inception to closure ensuring they are completed according to business requirements and stakeholder standards.
Ensure compliance with corporate Governance, Security-Risk and Audit policies, procedures, and best practices.
Perform continuous mentorship and development of junior staff members. Be a point of contact for escalation and engagement.
Develop technical documentation, policies, and procedures for endpoint security application use and support. Communicate technical standards to Information Technology teams and junior team members.
May be required to participate in on call rotations
Basic Qualifications:
High School Diploma, GED or Equivalent Certification
At least 2 years of experience in Information Security in an enterprise environment focusing on Privilege Access Management or Telemetry
At least 1 year of experience with attack or defend methodologies
At least 1 year of experience in Privilege Access Management end to end
Preferred Qualifications:
Bachelor’s Degree
3+ years of experience with Endpoint Security Technologies and Solutions: Anti-Virus, Anti Malware, Application Control, Endpoint Encryption, Mobile Device Management, SysLog, Privilege Access Management, or Identity and Access Management
2+ years of experience with Security Technologies from Beyond Trust or OSQuery
2+ years of experience in compliance with PCI and SOC2
1+ year experience with cloud computing (AWS, Microsoft Azure or Google Cloud)
1+ year of experience in scripting languages (Python, Shell or JavaScript)
1+ year of experience in Database languages (SQL)
1+ year of experience with governance frameworks: ITIL, NIST or MITRE ATT&CK
will not
. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
משרות נוספות שיכולות לעניין אותך