McLean 1 (19050), United States of America, McLean, Virginia
At Capital One, we're building a leading information-based technology company. Still founder-led by Chairman and Chief Executive Officer Richard Fairbank, Capital One is on a mission to help our customers succeed by bringing ingenuity, simplicity, and humanity to banking. We measure our efforts by the success our customers enjoy and the advocacy they exhibit. We are succeeding because they are succeeding.
Guided by our shared values, we thrive in an environment where collaboration and openness are valued. We believe that innovation is powered by perspective and that teamwork and respect for each other lead to superior results. We elevate each other and obsess about doing the right thing. Our associates serve with humility and a deep respect for their responsibility in helping our customers achieve their goals and realize their dreams. Together, we are on a quest to change banking for good.
Want more jobs like this?
Get jobs delivered to your inbox every week.
Cyber SOC, Senior Incident Response - Sr. Manager
We are looking for an experienced and senior-level Incident Response Analyst to join our team, going head to head against the highly-motivated adversaries that target and attack Capital One. As a senior member of the Cyber Security Operations Center, the successful candidate will provide technical leadership in security monitoring and incident response. You will analyze event logs, security alerts and perform statistical analysis in order to efficiently respond to Cyber Security incidents, and proactively hunt for active cyber threats to Capital One. You will learn the Capital One cyber security tool stack inside and out. You will be intimately familiar with its strengths, weaknesses, bugs and undocumented features.
You have to be hungry. You have to be creative.
Basic Qualifications
- High School Diploma, GED, equivalent Certification, or Military experience
- At least 8 years of hands-on cyber security experience
- At least 4 years of experience researching the groups behind targeted attacks
- At least 4 years of experience performing host or network incident response or malware analysis or forensics
Preferred Qualifications
- 6 years experience with network forensics and intrusion analysis, including performing independent research and reporting on findings
- At least 5 years of hands-on experience using host and network log sources to solve complex cyber security incident investigations
- At least 5 years working in high pressure situations, including rapidly scoping and investigating incidents
- Security Certificates: SANS GCIA or GNFA
At this time, Capital One will not sponsor a new applicant for employment authorization for this position
No agencies please. Capital One is an Equal Opportunity Employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex, race, color, age, national origin, religion, physical and mental disability, genetic information, marital status, sexual orientation, gender identity/assignment, citizenship, pregnancy or maternity, protected veteran status, or any other status prohibited by applicable national, federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at