Current Statistics
1,807,564 Total Jobs 361,405 Jobs Today 19,487 Cities 222,713 Job Seekers 146,819 Resumes |
|
|
|
|
|
|
Principal Associate, Cyber Threat Hunter - Philadelphia Pennsylvania
Company: Capital One Location: Philadelphia, Pennsylvania
Posted On: 11/07/2024
Center 3 (19075), United States of America, McLean, VirginiaPrincipal Associate, Cyber Threat HunterThe Cyber Hunt Team at Capital One is responsible for performing proactive detection of advanced threat actors within our network. Our analysts spend each day hunting for evidence of threat actor activity and working with engineering and security teams to improve our detection capabilities and security controls. -As a Threat Hunter, you will be responsible for proactively hunting for threats, providing technical leadership within the Cyber Hunt Team and the broader security organization, and continuously growing your technical skill set. In addition to the technical skills, you will need to be a leader, someone who enjoys training and mentoring teammates, and a person who can encourage and elevate the team. -What You'll Do: - Conduct threat hunting operations in Capital One's most complex and critical environments.
- Analyze log data to detect active threats within the network using knowledge of the current threat landscape, threat actor techniques, and the internal network.
- Perform advanced threat research to proactively identify potential threat vectors and work with engineering and security teams to improve prevention and detection methods. -
- Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer. -
- Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and CSOC.
- Coordinate with multidisciplinary teams across operations, intel, and engineering to iteratively improve security controls and detection capabilities.
- Conduct time-sensitive analysis during cyber investigations, including active threat hunting and malware analysis. -
- Analyze malicious code, packet capture files, and artifacts.
- Identify gaps in logging capabilities and develop and propose strategies to fill gaps.
- Identify and propose automated alerts for new and previously unknown threats. Collaborate with teams across the Cyber organization to mitigate risk by testing, deploying, and developing investigative playbooks. -
- Automate repetitive hunt processes using a wide range of tools and techniques, including, but not limited to writing custom Python scripts.
- Identify and enhance processes where automation has the potential to improve efficiencies, provide actionable data, and facilitate collaboration. -
- Mentor other analysts in project execution and tactical upskilling; conduct brown bag lunches to teach specialized skill sets. - -Basic Qualifications:
- High School Diploma, GED or Equivalent Certification
- At least 4 years of experience in cyber security or information technology
- At least 2 years of experience conducting Cyber Security investigations -
- At least 2 years of experience working with SIEM Security Tools -
- At least 2 years of experience with system, cloud, application or network logs -Preferred Qualifications:
|
|
|
|
|
|
|