The point where experts and best companies meet
Share
PRIMARY RESPONSIBILITIES
Emphasis of this position will be in testing MITRE ATT&CK techniques with a security testing/pentesting methodology
Utilize offensive security concepts to testing known malicious cybersecurity techniques
Strategize and implement best practices to detect malicious activity in a fast-paced, ever-changing technology environment.
Lead the remediation efforts for tested techniques and identify coverage gaps
Understand the business drivers of the enterprise and partner with relevant stakeholders to ensure robust monitoring and expanded coverage across our hosts, networks, and applications.
Collaborate with operation teams to build novel detections, establish repeatable processes, and drive automation for containment and remediation activities.
Coordinate with enterprise-wide cyber defense staff to validate alerts and conduct continuous testing.
Demonstrate a deep knowledge of adversary techniques and emerging threats that could adversely impact business activities
Respond to inquiries from regulatory entities, risk management and audit teams, providing clear and complete documentation of procedures and workflows
Encourage continued innovation and improvement in how we apply the intelligence lifecycle.
SKILLS/EXPERIENCE:
Python programming experience
Familiarity with Breach and Attack Simulation (BAS) tools
Ability to automate infrastructure development with Tensorflow, Ansible, etc.
Experience working in a highly regulated industry with increased oversight
Outstanding customer service and stakeholder management
Experience with data analysis, and security event and incident management platforms
Must be able to apply independent judgment
Experience working in a security operation center
BASIC QUALIFICATIONS:
High School Diploma, GED or equivalent certification
At least 3 years of experience in Information Technology or Cyber Security
At least 3 years of pentesting or offensive security experience
At least 1 year of experience using Security Information and Event Management technologies
PREFERRED QUALIFICATIONS:
Bachelor's Degree
4+ years of experience in offensive security
3+ years of experience researching cybersecurity threats
1+ years of experience in transforming a threat detection capability
1+ years of experience testing MITRE ATT&CK techniques manually
Ability to automate execution of known adversary tactics
Experience working with cyber threat intelligence and the MITRE ATT&CK framework
. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
These jobs might be a good fit