Center 3 (19075), United States of America, McLean, Virginia
Principal Associate, Cyber Security Operations Center (CSOC) Analyst (Fusion)
The Cyber Security Operation Center Fusion team synthesizes multi-source security alerting, intrusion investigations, cyber intelligence, and business information into actionable analysis. The Fusion team provides this time-sensitive analysis to empower fellow CSOC operators defending the network and to empower leadership to make informed decisions confronting cyber threats. The associate in this role acts as a Cyber Security Operation Center aggregator, collecting and compiling internal information to communicate "So what does this mean to Capital One?" They accomplish this by proactively identifying threats to Capital One, supporting CSOC operations with contextualized tactical intelligence, driving cross-team initiatives to improve detection and security, conducting internal threat landscape analysis, and finding innovative new ways to automate analysis. The associate in this role will also mentor and train associates to execute fusion analysis responsibilities.
General Responsibilities:
Support day-to-day cybersecurity threat detection and incident response operations through indicator pivoting, campaign analysis, and tactical intelligenceIdentify and enhance processes where automation has the potential to improve efficiencies, provide actionable data, and facilitate collaboration across CSOCLeverage Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools to identify threat patterns, enrich investigations, and build automation-supported workflowsDeconstruct multi-source reporting into actionable intelligence including Tactics, Techniques, and Procedures (TTPs) data objects, campaign analysis, and threat patterns.Regularly analyze malware reports to track adversary behaviors and support the construction of a TTP repositoryDevelop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and Hunt teams.Conduct time-sensitive analysis during cyber investigations, including active threat hunting, malware analysis, and campaign enrichmentRoutinely identify gaps in detection and collaborate with teams across the Cyber organization to mitigate risk, including blocking of malicious indicators, tuning vendor signatures, and instrumenting custom detection rulesSupport the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivotingAttend conferences and briefings to stay current on threats against both Capital One and the Financial Services sectorMentor other CSOC analysts in project execution and tactical upskilling; conduct brown bag lunches to teach specialized skill sets
Basic Qualifications:
High School Diploma, GED, or Equivalent CertificationAt least 5 years of experience working in a Security Operations Center (SOC)At least 2 years of experience analyzing and tracking Advanced Persistent Threats (APT) groupsAt least 2 years of experience with cyber threat intelligence analysisAt least 2 years of experience with curating Threat Intelligence Platforms (TIPs) and integration with Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) toolsAt least 2 years of experience utilizing the MITRE ATT&CK framework, Diamond Model, or Cyber Kill ChainAt least 1 year of malware analysis (static or dynamic) and Tactics, Techniques, and Procedures (TTP) analysis
Preferred Qualifications:
Bachelor's Degree in Cybersecurity, Intelligence, Computer Science, Information Systems or Engineering3+ years of experience conducting fusion intelligence analysis3+ years of experience in written and verbal briefings2+ years of experience in cloud environments (Amazon Web Services, Google Cloud Platform or Microsoft Azure)1+ year experience scripting with Python or PowerShellOne or more of the following industry certifications AWS Certified Security, GCFE, GCFA, GNFA, GREMIO, GCIA, GCIH, CISSP, or CEH
At this time, Capital One will not sponsor a new applicant for employment authorization for this position.
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
New York City (Hybrid On-Site): $161,900 - $184,800 for Prin Assoc, Cyber Technical
San Francisco, California (Hybrid On-Site): $171,500 - $195,800 for Prin Assoc, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to [email protected]
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).