Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Capital One Manager Cyber Product Owner Detection Mitigation Solutions 
United States, Virginia, Arlington 
408676492

26.06.2024
Center 3 (19075), United States of America, McLean, Virginia Manager, Cyber Product Owner (Detection and Mitigation Solutions)

As a Product Owner supporting the Detection and Mitigation Cyber Service Area, you will be accountable for contributing to and delivering upon the strategic agenda for our core cyber products to drive meaningful progress for our customers and our business. In this capacity, you will drive product vision into our development teams, translate vision into delivery objectives, provide customer-informed guidance to shape products, and work with cross-functional teams to deliver well-managed and sustainable features that bring that vision to life. You will use your deep technical knowledge and subject matter expertise in cybersecurity and systems engineering to drive impactful improvements to our cyber capabilities.

What you’ll do:

  • Communicate the delivery roadmap to our technology teams by inspiring the team through the product vision

  • Clearly articulate and advocate target persona, customer benefit, and value of features across teams

  • Leverage technical knowledge and skills on how systems work and how code is built to effectively support engineering teams in delivering value

  • Utilize strong cybersecurity background and customer research and insights to represent the voice of the customer to the engineering team(s)

  • Incorporate design thinking and analytics to inform product design

  • Actively participate in research or design sessions for new features

  • Contribute to the development of a healthy product backlog, collaborating with the Product Manager, Engineering, and Solution Architects to break down business epics, document user stories (to also include things like addressing technical debt, SRE, etc.), design details and comprehensive acceptance criteria

  • Lead internal backlog refinement sessions to refine cyber and customer intent, prepare business epics and stories for technical breakdown and planning, and ensure requirements are well understood by the engineering teams

  • Prioritize the Product Backlog to maximize business and customer outcomes by balancing technical and non-technical aspects while also incorporating cyber and operational risk reduction outcomes and activities

  • Act as a technical advisor to the product manager, engineering, and other stakeholders

  • Collaborate across multiple cross-functional teams and the Product Owner community and play a key role in key Agile and SAFe ceremonies

  • Support teams through escalation and resolution of impediments

  • Drive performance and innovation with data-driven insights

  • Proactively identify opportunities when key metrics on security, resilience and performance for your product (s) are not performing

  • Maintain technical and risk credibility with your own team(s) and with partners across our technology organization


About you:

  • You believe that a core component of security’s role is to enable the business, not just to secure it, and the solutions you bring to life are aligned to the needs of our developer community, customers, and business partners.

  • You thrive in working in a fast paced, technologically forward leaning environment and are not afraid to push the boundaries of security capabilities.

  • You seek to create enduring value by delivering reusable, extensible and resilient cybersecurity capabilities to address the evolving threat landscape

  • You actively solve for cyber technical challenges in collaboration with engineering.

  • You are naturally curious and stay on top of emerging trends and threats.

  • You have a comprehensive understanding of iterative software delivery to connect effectively and in a meaningful way with software and platform engineers

  • You seek to understand the business and technology landscape and cross-functional dependencies to inform product vision and integration with larger organizational goals

  • You are a clear thinker, thrive in working across teams, and an expert in dealing with ambiguity.

  • You understand and track key metrics on security, resilience and performance for your product (s) and understand levers that drive these metrics

  • You have strong consulting and analytical skills and a risk management mindset

  • You have the ability to foster collaborative, open working relationships with technology partners and other stakeholders

  • You demonstrate balanced judgment in decisions and incorporate risk factors accordingly

  • You have a strong bias for action

Basic Qualifications:

  • High School Diploma, GED or equivalent certification

  • At least 6 years of experience working in cybersecurity or information technology

  • At least 3 years of experience in product management

Preferred Qualifications:

  • Bachelor's Degree in Cybersecurity, Systems Engineering, or Computer Science

  • 3+ years of experience solving cyber technical challenges

  • 4+ years of experience translating business strategy and analysis into products

  • 3+ years of Cyber product owner experience

  • 2+ years of experience in technical writing

  • 2+ years of hands-on JIRA experience

  • Experience in regulated financial services organizations or tech companies

  • 2+ years of experience working with cloud based or on-prem SIEM products (Splunk, Elastic, ArcSight, QRadar, Sentinel, Securonix, LogRhythm)

  • 2 or more professional certifications (SAFe PM/PO, CISSP, GIAC, CISM, CCSP, AWS Cloud Practitioner, AWS Security)

. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.

If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.