Skip Navigation

We are here to help our candidates impacted by the COVID-19 virus situation. Learn more

Fusion, Cyber Security Operations Center

Job ID R96451 Updated date 06/24/2020 Location McLean, Virginia
McLean 1 (19050), United States of America, McLean, Virginia

At Capital One, we’re building a leading information-based technology company. Still founder-led by Chairman and Chief Executive Officer Richard Fairbank, Capital One is on a mission to help our customers succeed by bringing ingenuity, simplicity, and humanity to banking. We measure our efforts by the success our customers enjoy and the advocacy they exhibit. We are succeeding because they are succeeding.                                               

Guided by our shared values, we thrive in an environment where collaboration and openness are valued. We believe that innovation is powered by perspective and that teamwork and respect for each other lead to superior results. We elevate each other and obsess about doing the right thing. Our associates serve with humility and a deep respect for their responsibility in helping our customers achieve their goals and realize their dreams. Together, we are on a quest to change banking for good.

Fusion, Cyber Security Operations Center

With team members in McLean, VA the Cyber Security Operation Center Fusion team synthesizes multi-source security alerting, intrusion investigations, cyber intelligence, and business information into actionable analysis. The Fusion team provides this time-sensitive analysis to empower fellow CSOC operators defending the network and to empower leadership to make informed decisions confronting cyber threats. The associate in this role acts as a Cyber Security Operation Center aggregator, collecting and compiling internal information to communicate “So what does this mean to Capital One?” They accomplish this by understanding realized cyber threats and intrusions, conducting retrospective analysis, contextualizing threat information, and providing written and verbal analysis. The associate in this role will also mentor and train associates to execute fusion analysis responsibilities.

General Responsibilities:

  • Support day-to-day cybersecurity threat detection and incident response operations 

  • Deconstruct multi-source reporting into actionable information to present to CSOC analysts through written reports, verbal technical briefings, and education enhancing the first line of defense

  • Communicate deep technical security threat & operations awareness across the Cyber division, to include the CISO and CIO

  • Maintain two-way relationships with partner teams such as Cyber Intelligence, Red Team, and Hunt team

  • Conduct time-sensitive analysis during cyber investigations, contextualizing identified impact (exfiltration, operational impact) and informing leadership to actively respond to emerging risk

  • Conduct retrospective trend analysis of threat actor activity (IOCs, TTPs) across cyber investigations, understanding the “big picture”  and informing leadership on trends

  • Through time-sensitive and retrospective analysis, identify potentially targeted activity allowing leadership to monitor 

  • Setup processes and capabilities for CSOC to retrieve and utilize sector-wide data (IOC’s, TTP’s, reports, etc)

  • Develop, follow, and maintain standard operating procedures for repeatable analysis

  • Identify and enhance processes where automation has the potential to improve efficiency

  • Coordinate with various Information Security Officer teams to understand line-of-business specific threat and impact information

  • Maintain a repository of analysis

  • Attend conferences and briefings to stay current on threats against both COF and the Financial Services sector

  • Provide support to operational & cybersecurity strategy development

Basic Qualifications:

  • High School Diploma, GED or Equivalent Certification

  • At least 2 years of experience as an analyst conducting log analysis in a Security Operations Center or supporting an Incident Response Team 

  • At least 3 years of experience analyzing and tracking APT groups

  • At least 3 years of experience with cyber threat intelligence analysis, identifying and sharing IOCs and TTPs

  • At least 3 years of experience synthesizing reporting

  • At least 3 years of experience utilizing the MITRE ATT&CK framework or Diamond Model or Cyber Kill Chain 

  • At least 1 of the following industry certifications (CEH, GCIA, GCIH, GISP, Security+, AWS Cloud Practitioner, AWS Solutions Architect)


 

Preferred Qualifications:

  • Bachelor's Degree in fields such as Cybersecurity, Intelligence, Computer Science, Information Systems or Engineering 

  • 2+ years of experience in cloud environments (AWS, Google, Azure)

  • 2+ years of experience conducting fusion intelligence analysis

  • 3+ years of experience communicating in writing and verbally, under pressure in a 24/7 environment

  • 3+ years experience scripting with Python, Powershell, or similar technologies

  • One or more of the following industry certifications; AWS Certified Security, GCFE, GCFA, GNFA, GREM

  • Very strong communication and collaboration skills with the ability to manage responsibilities across multiple areas and  projects

At this time, Capital One will not sponsor a new applicant for employment authorization for this position.

No agencies please. Capital One is an Equal Opportunity Employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex, race, color, age, national origin, religion, physical and mental disability, genetic information, marital status, sexual orientation, gender identity/assignment, citizenship, pregnancy or maternity, protected veteran status, or any other status prohibited by applicable national, federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City’s Fair Chance Act; Philadelphia’s Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.

If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at RecruitingAccommodation@capitalone.com. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.

For technical support or questions about Capital One's recruiting process, please send an email to Careers@capitalone.com

Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.

Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).