Loading...

@

Fonolive Marketplace App on Google PlaystoreFonolive Marketplace App on App Store - Apple iOS
  • jobs
  • 1 week ago

jobs description

What is Capital One?
Center 3 (19075), United States of America, McLean, Virginia
...
Senior Associate, Cyber Security Log Management

Capital One is looking for a Senior Associate to join our Cyber Security Log Management team. This team is responsible for enabling comprehensive cyber monitoring. We ensure standard log events are generated across Capital One so our threat defenders have the right visibility for investigations and alerts. We achieve our mission by setting security logging strategy & requirements and influencing enterprise technology teams to deliver.

What You'll Do:
• Lead and communicate the enterprise security logging strategy in partnership with engineering and architecture teams, Cyber Operations teams (ex. Cyber Security Operations Center, Hunt, Insider Threat) , and other stakeholders
• Establish technical best practices for security logging (event generation, delivery, storage) and minimum requirements across our infrastructure (cloud, network, databases), host & endpoints (workstations, servers) and applications.
• Conduct gap analyses of security logs, help Cyber Operations teams prioritize, and influence engineering teams to close logging gaps.
• Maintain close ties with Cyber Operations teams, ensuring the right events are captured and logged
• Drive enterprise teams to adhere to logging requirements in terms of standard schemas, design, log transportation deployments, and log validation.
• Review and assess security logging as delivered versus requirements and standards. Track compliance and escalate non-compliance of logging standards to executive leadership.
• Participate in execution and oversight of critical team processes, ensuring playbooks are adhered to consistently
• Note: this is a technical leadership role, not a hands-on engineering function

About You:
• You have experience with logging requirements or implementation across infrastructure (cloud, network, databases), host & endpoints (workstations, servers) or applications.
• You have strong assessment and analytical skills in the security logging domain
• You are able to autonomously solve problems, push projects forward, and drive solutions, escalating when necessary
• You are independently able to carve out your own role, aligning with team goals, and grow into it
• You have strong judgment skills understanding security policies and Cyber Operations teams requirements
• You understand security logging & monitoring needs for a Cyber Operations team at a tactical level and have experience in hands on technical design and implementation of logging
• You have experience implementing high-visibility and high-impact enterprise cybersecurity projects with cross-functional teams including planning, development and management of technical requirements, design, validation, and non-compliance escalation
• You have the ability to foster collaborative, open, working relationships with technology groups and other stakeholders, sharing customer and engineering benefits for security logging to gain buy-in
• You have experience delivering security logging projects and programs across a technology environment, setting logging strategy with architects, developers, and data experts.
• You have passion and expertise in one or more of the following areas: security operations, security log analysis, cloud security, network security, application security, and host & endpoint security

Basic Qualifications:
• High School Diploma, GED or equivalent certification
• At least 2 years of experience working in cybersecurity or information technology
• At least 2 years of experience working in a Security Operations Center (SOC)

Preferred Qualifications:
• Bachelor’s Degree in Information Technology, Cyber Security or Computer Science
• 2+ years of experience administering or investigating Mac OS or Linux OS
• 2+ years of experience working with SIEM Security Tools
• 2+ years of experience working within JIRA
• One or more of the following certifications (CISSP, CISM, CCSP, Security+, CEH, SANS, GIAC 503 or 504, AWS Security)

At this time, Capital One will not sponsor a new applicant for employment authorization for this position.

The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.

New York City (Hybrid On-Site): $138,500 - $158,100 for Sr. Assoc, Cyber Technical

San Francisco, California (Hybrid On-Site): $146,700 - $167,500 for Sr. Assoc, Cyber Technical

Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate’s offer letter.

This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan.

Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.

This role is expected to accept applications for a minimum of 5 business days.

No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City’s Fair Chance Act; Philadelphia’s Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.

If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1-800-304-9102 or via email at RecruitingAccommodation@capitalone.com. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.

For technical support or questions about Capital One's recruiting process, please send an email to Careers@capitalone.com

Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.

Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC
Dunn Loring VA United States

salary-criteria

Apply - Senior Associate, Cyber Security Log Management Dunn Loring