Cyber Threat Hunter - Principal Associate

7900 Westpark Drive (12131), United States of America, Tysons, Virginia

At Capital One, we're building a leading information-based technology company. Still founder-led by Chairman and Chief Executive Officer Richard Fairbank, Capital One is on a mission to help our customers succeed by bringing ingenuity, simplicity, and humanity to banking. We measure our efforts by the success our customers enjoy and the advocacy they exhibit. We are succeeding because they are succeeding.

Guided by our shared values, we thrive in an environment where collaboration and openness are valued. We believe that innovation is powered by perspective and that teamwork and respect for each other lead to superior results. We elevate each other and obsess about doing the right thing. Our associates serve with humility and a deep respect for their responsibility in helping our customers achieve their goals and realize their dreams. Together, we are on a quest to change banking for good.

Cyber Threat Hunter - Principal Associate

Cyber Threat Hunter - Capital One

Summary:

The Ops Active Detection team at Capital One is responsible for performing proactive detection of advanced threat actors within our network. Our analysts spend each day hunting for evidence of threat actor activity and working with engineering and security teams to improve our detection capabilities and security controls. As a hunter, you will constantly research new security topics, develop and test your hypotheses, and share your knowledge and findings with your teammates.

General Responsibilities:

  • Participate in threat hunting operations in Capital One's most complex and critical environments. Using knowledge of the current threat landscape, threat actor techniques, and the internal network, analyze log data to detect active threats within the network.
  • Perform advanced threat research to proactively identify potential threat vectors and work with engineering and security teams to improve prevention and detection methods.
  • Analyze and assess security appliance, network, and host based logs to differentiate between malicious and benign activity.
  • Work with multidisciplinary teams across operations, intel, and engineering to iteratively improve security controls and detection capabilities.
  • Analyze malicious code, packet capture files, and artifacts.
  • Identify gaps in logging capabilities and develop and propose strategies to fill gaps.
  • Identify and propose automated alerts for new and previously unknown threats.
  • Work collaboratively with peers and teach and mentor junior hunters.
  • Strong written and verbal communication skills.
  • Demonstrated enthusiasm for learning new things and ability to pick up new ideas quickly.


Basic Qualifications:
  • Bachelor's Degree or military experience
  • At least 1 year of experience with cyber threat landscape.
  • At least 2 years' experience in a technical role focused on networking, endpoint management, cloud, data science or reverse engineering.


Preferred Qualifications:
  • At least 1 year of experience in one scripting language (Python preferred).
  • Familiar with common threat intelligence models, such as Diamond Model, Cyber Kill Chain, Attacker Lifecycle, etc.
  • Familiar with attacker techniques and corresponding approaches to detection in enterprise environments.
  • 5 + years' experience in a technical role focused on any of the following: networking, endpoint management, cloud, data science, or reverse engineering.


At this time, Capital One will not sponsor a new applicant for employment authorization for this position.


Back to top