Capital One - McLean, VA
posted 5 months ago
The Cyber Security Operation Center Fusion team at Capital One plays a critical role in synthesizing multi-source security alerting, intrusion investigations, cyber intelligence, and business information into actionable analysis. This time-sensitive analysis is essential for empowering fellow CSOC operators in defending the network and enabling leadership to make informed decisions in the face of cyber threats. As a Principal Associate, the individual will serve as a technical team leader, proactively identifying threats and collaborating across the SOC CSOC operations with contextualized tactical intelligence. This role involves driving cross-team initiatives aimed at improving detection and security, conducting internal threat landscape analysis, and innovating new methods to automate analysis processes. Additionally, the associate will mentor and train other associates in executing fusion analysis responsibilities. In this position, the associate will support day-to-day cybersecurity threat detection and incident response operations through various methods, including indicator pivoting, campaign analysis, and tactical intelligence. They will identify and enhance processes where automation can improve efficiencies, provide actionable data, and facilitate collaboration across the CSOC. Utilizing Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools, the associate will identify threat patterns, enrich investigations, and build automation-supported workflows. The role also requires deconstructing multi-source reporting into actionable intelligence, including Tactics, Techniques, and Procedures (TTPs) data objects, campaign analysis, and threat patterns. The associate will regularly analyze malware reports to track adversary behaviors and support the construction of a TTP repository. Developing expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics is crucial for effectively communicating the threat landscape to senior executives, including the Chief Information Security Officer and Chief Information Officer. Building and maintaining relationships with partner teams, such as Cyber Intelligence, Red Team, Insider Threat, and Hunt teams, is also a key responsibility. The associate will conduct time-sensitive analysis during cyber investigations, including active threat hunting, malware analysis, and campaign enrichment, while routinely identifying gaps in detection and collaborating with teams across the Cyber organization to mitigate risks. This includes blocking malicious indicators, tuning vendor signatures, and instrumenting custom detection rules. The role supports the tactical intelligence-to-detection pipeline, including malware reverse engineering, TTP analysis, and association mapping in a Threat Intelligence Platform (TIP) for future pivoting. The associate will also attend conferences and briefings to stay current on threats against both Capital One and the Financial Services sector, while mentoring other CSOC analysts in project execution and tactical upskilling through initiatives like brown bag lunches to teach specialized skill sets.