This job board retrieves part of its jobs from: Toronto Jobs | Emplois Montréal | IT Jobs Canada

Find jobs across the United States!

To post a job, login or create an account |  Post a Job

  Jobs JKT  

Bringing the best, highest paying job offers near you

previous arrow
next arrow
Slider

Capital One: Senior Manager, Threat Detection, Operations & Intelligence

Capital One

This is a Full-time position in Chesterfield, MO posted July 8, 2020.

7900 Westpark Drive (12131), United States of America, McLean, VirginiaAt Capital One, we’re building a leading information-based technology company.

Still founder-led by Chairman and Chief Executive Officer Richard Fairbank, Capital One is on a mission to help our customers succeed by bringing ingenuity, simplicity, and humanity to banking.

We measure our efforts by the success our customers enjoy and the advocacy they exhibit.

We are succeeding because they are succeeding.Guided by our shared values, we thrive in an environment where collaboration and openness are valued.

We believe that innovation is powered by perspective and that teamwork and respect for each other lead to superior results.

We elevate each other and obsess about doing the right thing.

Our associates serve with humility and a deep respect for their responsibility in helping our customers achieve their goals and realize their dreams.

Together, we are on a quest to change banking for good.Senior Manager, Threat Detection, Operations & Intelligence Capital One’s Cyber Organization is a fast-paced, dynamic environment committed to enabling and securing the business.

Our Operations & Intelligence division is searching for an experienced Director to lead our Threat Detection team.

In this role, you will be responsible for solving hard problems using cutting edge technology in the areas of engineering, alert development, and monitoring.

PRIMARY RESPONSIBILITIESProvide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.Lead the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.Monitor external data sources (e.G., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.Analyze and report organizational security posture trends.Provide thought leadership to implement best practices to detect malicious activity in a fast-paced, ever-changing technology environmentEngage with internal teams, industry partners, and information sharing centers to leverage intelligence about the threat landscape and prioritize the creation of signaturesUnderstand the business drivers of the enterprise and partner with relevant stakeholders to ensure robust monitoring and expanded coverage across our hosts, networks, and applicationsCollaborate with operation teams to build novel detections, establish repeatable processes, and drive automation for containment and remediation activitiesAnalyze and define data requirements and specifications for log ingestion and new security productsCoordinate and provide expert technical leadership to enterprise-wide cyber defense operators to resolve cyber defense incidents.Coordinate with enterprise-wide cyber defense staff to validate alerts and conduct continuous testing.Demonstrate a deep knowledge of adversary techniques and emerging threats that could adversely impact business activitiesBASIC QUALIFICATIONSBachelor’s Degree in Computer Science, Computer Engineering or equivalent military experience.At least 7 years of experience working with Host and Network-based Intrusion detection and prevention systems like NIDS or NIPS, including signature development and event alert analysis.At least 6 years of experience using Security Information and Event Management technologies like ArcSight, ELK or Splunk.At least 7 years of experience with cyber use case and content development within SIEM systems, including automating cyber analytic tasks and correlation rule development.At least 7 years of experience working with cyber threat intelligence, including identification and categorization of APT actors and integrating threat intel with cyber defense capabilities.PREFERRED QUALIFICATIONS10+ years of experience working with network & operating system security concepts.5+ years of experience performing cyber defense analysis specifically using Splunk or the ELK stack.At this time, Capital One will not sponsor a new applicant for employment authorization for this position.

Please add your adsense or publicity code here (inc/structure/adsfooter.php)