Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
PRINCIPAL ASSOCIATE, CSOC ANALYST (INCIDENT RESPONSE) image - Rise Careers
Job details

PRINCIPAL ASSOCIATE, CSOC ANALYST (INCIDENT RESPONSE)

Center 3 (19075), United States of America, McLean, VirginiaPrincipal Associate, CSOC Analyst (Incident Response)Capital One is looking for talented Cyber Security Analysts with traditional network security and cloud infrastructure monitoring experience to join our Cyber Security Operations Center (CSOC) in McLean, VA. The Principal Associate level CSOC Analyst position will require a deep knowledge of network protocols and infrastructure, log investigation techniques, knowledge/understanding of cloud infrastructures, and incident handling experience. Not only will you need to know about the threats to networks, applications, cloud infrastructure, and theory regarding network protocols, but also the ability to proactively identify signs of misuse and abuse using various log sources.It is your responsibility to find the threat actors attempting to attack the Capital One infrastructure, and identify and stop any malicious actors who make it past our defenses. In addition to the technical skills, you will need to be a leader, someone who enjoys training and mentoring teammates, and a person who can encourage and elevate the team.What You?ll Do:• Support day-to-day cybersecurity threat detection and incident response operations through indicator pivoting, campaign analysis, and tactical intelligence• Identify and enhance processes where automation has the potential to improve efficiencies, provide actionable data, and facilitate collaboration across CSOC• Leverage Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools to identify threat patterns, enrich investigations, and build automation-supported workflows• Deconstruct multi-source reporting into actionable intelligence including Tactics, Techniques, and Procedures TTPs data objects, campaign analysis, and threat patterns.• Regularly analyze malware reports to track adversary behaviors and support the construction of a TTP repository• Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.• Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and Hunt teams.• Conduct time-sensitive analysis during cyber investigations, including active threat hunting, malware analysis, and campaign enrichment• Routinely identify gaps in detection and collaborate with teams across the Cyber organization to mitigate risk, including blocking of malicious indicators, tuning vendor signatures, and instrumenting custom detection rules• Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting• Attend conferences and briefings to stay current on threats against both COF and the Financial Services sector• Mentor other CSOC analysts in project execution and tactical upskilling; conduct brown bag lunches to teach specialized skill setsBasic Qualifications• High School Diploma, GED or Equivalent Certification• At least 4 years of experience conducting Cyber Security investigation and documentation• At least 4 years of experience working with a SIEM• At least 4 years of experience with system, cloud, application and network logs• At least 4 years of experience analyzing and identifying network traffic• At least 4 years of experience with PCAP analysis• At least 4 years of experience analyzing endpoints (server and workstation)Preferred Qualifications• Bachelor?s Degree in Information Technology, Cyber Security or Computer Science• 5+ years of experience conducting Cyber Security investigations into network and application activity• 5+ years of experience working in a Security Operations Center (SOC)• 5+ years of experience working with SIEMs and evaluating SIEM alerts• 5+ years of experience administering or investigating Mac OS, Linux OS• 5+ years of experience leveraging core security, cloud, and infrastructure technologies during investigations• One or more of the following certifications (CISSP, CISM, CCSP, SANS GIAC 503 or 504, AWS Security)At this time, Capital One will not sponsor a new applicant for employment authorization for this position.Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City?s Fair Chance Act; Philadelphia?s Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.For technical support or questions about Capital One's recruiting process, please send an email toCapital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
Capital One Glassdoor Company Review
4.2 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
Capital One DE&I Review
4.2 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
CEO of Capital One
Capital One CEO photo
Richard D. Fairbank
Approve of CEO

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran

585 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
September 3, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
Other jobs
Company
Posted 11 days ago
Company
Posted 2 months ago