Capital Oneposted 4 months ago
$144,200 - $181,000/Yr
Full-time • Principal
Plano, TX
Credit Intermediation and Related Activities

About the position

Capital One is looking for a talented Cyber Security Threat Intelligence Analyst to join our Active Defense team. As a Principal Associate, you will play an integral role in protecting our customers, our associates, and our brand. The team helps identify, track, and collect adversarial tactics, techniques, and procedures (TTPs), and indicators of compromise. You will be an integral member against threats, help mature the program by identifying threats which may include brand impersonations, spoofed domains, and phishing attempts. You would also assist in tactical investigations, operational planning and communicating that information in a meaningful way with partners, stakeholders, and leadership. The position will require technical knowledge of network protocols and infrastructure, understanding of cloud infrastructures, and cyber threats to those networks, and applications. You thrive working cross-functionally and understand how to produce intelligence products to support business requirements, and proactively identify areas for cooperation. We are looking for a candidate with excellent communication skills, to include writing for diverse audiences, formulating intelligence products, and managing or triaging collection workflows. The successful candidate for this position will be part of an exciting and dynamic environment and will have a key role in building detections designed to defend Capital One brand, systems and data.

Responsibilities

  • Produce intelligence products analyzing cyber adversary trends and the impact to Capital One's consumer products and defenses
  • Proactively monitor, collect and leverage intelligence from external data sources gather intelligence from deep and dark web, and other OSINT sources
  • Assist countermeasures development through integration of threat intelligence and operational data.
  • Create and iterate on workflows synthesizing data from sources such as malware infections, cyber attack patterns, and closed and open-source intelligence
  • Connect with stakeholders; understand their priority needs for collaboration.

Requirements

  • High School Diploma, GED or Equivalent Certification
  • At least 3 years of experience producing intelligence products to combat cyber threats or conducting investigations into cybercrime, or advanced persistent threats
  • At least 2 years of experience in evaluating cyber adversaries, technical indicators of compromise (IOCs), and cyber tactics, techniques and procedures (TTPs)

Nice-to-haves

  • 2+ years of experience with vendors and external resources used to collect cyber intelligence in the financial services space
  • 2+ years of experience collecting against intelligence requirements and applying intelligence cycle principles to cyber threat analysis
  • 2+ years of experience with concepts and resources (AWS, Azure, Google Cloud Platform)
  • 2+ years of experience analyzing attack vectors such as account takeovers, synthetic account creation, malware infections, phishing kits, and session or cookie hijacking
  • 2+ years of experience performing OSINT Social Media research
  • Ability to understand computer networking concepts

Benefits

  • Comprehensive health benefits
  • Financial benefits
  • Inclusive set of benefits that support total well-being
  • Performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI)
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service