The point where experts and best companies meet
Share
Responsibilities:
Creating mechanisms to combine multiple detection signals, which can automatically highlight cyber threats across fraud and advance threat space
Maintaining expertise of the current cyber threat landscape and attack vectors
Synthesize disparate sets of data from sources such as malware, cyber attack patterns, and closed and open-source intelligence to inform instrumentation and detections
Building productive relationships with internal teams to contextualize and inform across Capital One’s business
Communicating investigative outcomes and conclusions to a variety of audiences
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 3 years of experience working in cybersecurity or information technology performing incident response, threat hunting, threat intelligence, forensics, or offensive security
At least 2 years of experience in conducting investigations into cyber-enabled fraud, cybercrime, or advanced persistent threats
At least 2 years of experience in programming or scripting (Python, SQL, PHP, PowerShell)
Preferred Qualifications:
Bachelor's Degree
2+ years of experience with cyber threat intelligence frameworks (the Lockheed Martin Cyber Kill Chain, Diamond Model, MITRE ATT&CK, Defense, Engage)
2+ years of experience working with data analytics tools, such as Databricks, or Python data analysis libraries
2+ years of experience with public cloud environments (AWS, Azure, GCP)
. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
These jobs might be a good fit