Skip Navigation

Senior Manager, Cyber Security Operations Center - Tier 4

Job ID R87068 Updated date 11/13/2019 Location McLean, Virginia
McLean 1 (19050), United States of America, McLean, Virginia

At Capital One, we’re building a leading information-based technology company. Still founder-led by Chairman and Chief Executive Officer Richard Fairbank, Capital One is on a mission to help our customers succeed by bringing ingenuity, simplicity, and humanity to banking. We measure our efforts by the success our customers enjoy and the advocacy they exhibit. We are succeeding because they are succeeding.                                               

Guided by our shared values, we thrive in an environment where collaboration and openness are valued. We believe that innovation is powered by perspective and that teamwork and respect for each other lead to superior results. We elevate each other and obsess about doing the right thing. Our associates serve with humility and a deep respect for their responsibility in helping our customers achieve their goals and realize their dreams. Together, we are on a quest to change banking for good.

Senior Manager, Cyber Security Operations Center - Tier 4

With team members in McLean, VA, and Nottingham, UK, the Cyber Security Operation Center Incident Response team at Capital One provides cyber security response and advanced analysis functions. The associate in this role will respond to cybersecurity incidents which have the potential to impact the confidentiality, integrity, or availability of Capital One information assets. 

General Responsibilities:

  • Support day-to-day cybersecurity threat detection and incident response operations 

  • Understand technology infrastructure and operational processes in order to enable a more effective incident response process

  • Communicate deep technical  security threat & operations  awareness across the Cyber division, to include the CISO and CIO

  • Benchmark IR processes and technology against industry

  • Maintain a catalog detailing Incident Response processes, tools and functions

  • Develop, follow, and maintain ‘playbooks’ which provide a visual depiction of various operational Incident Response workflows

  • Identify and enhance processes where automation has the potential to improve efficiency

  • Support the Cyber Incident Management team in developing key performance indicators to measure success of the Incident Response team

  • Coordinate with various Information Security Officer teams in clarifying security risks, and roles and responsibilities related to ongoing Incident Response cases

  • Provide support to operational & cybersecurity strategy development

  • Provide SME-level guidance and direction on best practices for the protection of information

  • Maintain updated knowledge of best practices in Cybersecurity Operations and Incident Response processes to identify and recommend new technologies and/or processes with the potential to enhance operations

  • Utilize industry recognized frameworks such as NIST 800-61 to perform and document work activities

Basic Qualifications:

  • Bachelor's Degree 

  • At least 5 years of technical experience in a Security Operations Center or supporting an Incident Response Team

  • At least 4 years of experience in Network Management and Monitoring Tools and Utilities 

  • At least 4 years of experience in Network Security and Security Perimeters 

  • At least 4 years of experience with TCP/IP protocol analysis

  • At least 4 years of experience with packet capture devices, syslog, netflow and application performance Management 

  • At least 4 years of experience with cyber threat analysis and mitigations 

  • At least 4 years experience working with COTS security tools (argus, wireshark, tcpdump, snort, helix)

  • At least 4 years experience responding to incidents in cloud environments (AWS, Google, Azure)

  • At least 2 years experience in computer programming, writing program analysis, writing response tools, and automating repetitive processes

  • CEH, GCIA, GCIH, GISP, Security+, AWS Cloud Practitioner, or AWS Solutions Architect certified

Preferred Qualifications:

  • Bachelor's Degree in Computer Science, Information Systems, Engineering or similar fields.

  • Master's Degree in Computer Science, Information Systems, Engineering or similar fields 

  • AWS Certified Security, GCFE, GCFA, GNFA, or GREM

  • Experience using EnCase or FTK Imager

  • Experience using Volatility (or equivalent) for memory analysis

  • Experience performing static malware analysis

  • Strong ability to analyze complex information and data

  • Excellent problem-solving and conceptual thinking abilities, especially with technical troubleshooting

  • Very strong and effective process management skills

  • Very strong communication skills with the ability to manage responsibilities across multiple areas and  projects

  • Very strong collaborative partnership skills for working with various points of contacts internal and external to Capital One

  • Very strong ability to develop and communicate recommendations to non-technical associates in business areas

At this time, Capital One will not sponsor a new applicant for employment authorization for this position.

No agencies please. Capital One is an Equal Opportunity Employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex, race, color, age, national origin, religion, physical and mental disability, genetic information, marital status, sexual orientation, gender identity/assignment, citizenship, pregnancy or maternity, protected veteran status, or any other status prohibited by applicable national, federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City’s Fair Chance Act; Philadelphia’s Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.

If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.

For technical support or questions about Capital One's recruiting process, please send an email to

Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.

Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).