Finding the best job has never been easier
Share
What You'll Do:
Lead and communicate the enterprise security logging strategy in partnership with engineering and architecture teams, Cyber Operations teams (ex. Cyber Security Operations Center, Hunt, Insider Threat) , and other stakeholders
Establish technical best practices for security logging (event generation, delivery, storage) and minimum requirements across our infrastructure (cloud, network, databases), host & endpoints (workstations, servers) and applications.
Conduct gap analyses of security logs, help Cyber Operations teams prioritize, and influence engineering teams to close logging gaps.
Maintain close ties with Cyber Operations teams, ensuring the right events are captured and logged
Drive enterprise teams to adhere to logging requirements in terms of standard schemas, design, log transportation deployments, and log validation.
Review and assess security logging as delivered versus requirements and standards. Track compliance and escalate non-compliance of logging standards to executive leadership.
Participate in execution and oversight of critical team processes, ensuring playbooks are adhered to consistently
Note: this is a technical leadership role, not a hands-on engineering function
About You:
You have experience with logging requirements or implementation across infrastructure (cloud, network, databases), host & endpoints (workstations, servers) or applications.
You have strong assessment and analytical skills in the security logging domain
You are able to autonomously solve problems, push projects forward, and drive solutions, escalating when necessary
You are independently able to carve out your own role, aligning with team goals, and grow into it
You have strong judgment skills understanding security policies and Cyber Operations teams requirements
You understand security logging & monitoring needs for a Cyber Operations team at a tactical level and have experience in hands on technical design and implementation of logging
You have experience implementing high-visibility and high-impact enterprise cybersecurity projects with cross-functional teams including planning, development and management of technical requirements, design, validation, and non-compliance escalation
You have the ability to foster collaborative, open, working relationships with technology groups and other stakeholders, sharing customer and engineering benefits for security logging to gain buy-in
You have experience delivering security logging projects and programs across a technology environment, setting logging strategy with architects, developers, and data experts.
You have passion and expertise in one or more of the following areas: security operations, security log analysis, cloud security, network security, application security, and host & endpoint security
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 2 years of experience working in cybersecurity or information technology
At least 2 years of experience working in a Security Operations Center (SOC)
Preferred Qualifications:
Bachelor’s Degree in Information Technology, Cyber Security or Computer Science
2+ years of experience administering or investigating Mac OS or Linux OS
2+ years of experience working with SIEM Security Tools
2+ years of experience working within JIRA
One or more of the following certifications (CISSP, CISM, CCSP, Security+, CEH, SANS, GIAC 503 or 504, AWS Security)
. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
These jobs might be a good fit