Finding the best job has never been easier
Share
What you'll do:
Assist in developing and communicating our minimum logging requirements across our applications, infrastructure (cloud, network, databases), and endpoints (workstations, servers).
Review and assess security logging as delivered by enterprise teams versus requirements and standards. Ensure adherence to standard schemas, log design, log transportation deployments, and log quality.
Intake logging requests from customers such as Cyber Operations teams and oversee programmatic delivery of those requests from enterprise teams.
Track logging compliance from enterprise teams and escalate non-compliance of logging to executive leadership.
Execute logging controls on a regular basis, following playbooks and collecting evidence.
Collect, track, and report logging metrics to leadership.
Identify and document enterprise risks and issues, including dimensioning risk and collecting stakeholder feedback.
Collaborate with stakeholders to automate log compliance tracking and enforcement, including developing dashboards and executive reports.
Maintain close ties to developers across the company ensuring we provide clear logging standards.
About You:
You demonstrate strong assessment and analytical skills in the security logging domain
You are trusted to lead through ambiguity and can work with a leader to identify and focus on highest priority work
You develop and partner with a wide network to deliver end to end high impact work
You consistently deliver excellence autonomously
You look outside of your team to create synergies and open, working relationships with technology groups and other stakeholders, sharing customer and engineering benefits for security logging to gain buy-in
You have strong judgment skills determining adherence to security policies
You have experience with security logging projects and programs across a technology environment, contributing to logging strategy with architects, developers, and data experts
You have experience with program management and influencing matrixed technology teams to deliver requests
You have experience with governance, risk, and controls
You have passion and expertise in one or more of the following areas: security operations, security log analysis, cloud security, network security, application security, network security and exploitation, and host and endpoint security
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 2 years of experience working in cybersecurity or information technology
Preferred Qualifications:
Bachelor’s Degree in Information Technology, Cyber Security or Computer Science
. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
These jobs might be a good fit