Manager, Cyber Security Threat Intelligence
Capital One
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
Manager, Cyber Security Threat Intelligence
We are seeking a highly motivated and skilled Manager to serve as the team lead for the Capital One Cyber Intelligence Service’s Executive Digital Protection Program. This manager will lead and spearhead a critical program focused on reducing risk from digital exposure for our top executives and their inner circles.
Who you are:
- A Critical Thinker: You have a deep background in OSINT, Cyber Intelligence, or Executive Protection. You understand how an exposed credential on a random forum can lead to account takeovers, fraud, and physical threats.
- Technically Versatile: You are as comfortable evaluating the impact of leaked data breach data on the illicit web as you are explaining the nuances of MFA to a family member.
- Dynamic and invested: You are looking for a role where you can grow alongside the program you are building.
What you bring:
- Proven Experience: Significant time spent in living in the worlds of Cyber Intelligence or Executive Protection.
- Communication Mastery: The ability to pivot your tone from "technical deep-dive" to "executive summary" based on the audience.
- Process Evolution and Iteration: A track record of creating or refining security SOPs and communication paths.
- Discretion: A rock-solid understanding of the privacy needs and sensitivities required when working with UHNWIs and C-suite leadership.
What you’ll do:
Participate in the evolution of novel homegrown capabilities and emerging innovative vendor solutions for third-party digital monitoring and intelligence collection services, ensuring optimal strategic direction and growth.
You’ll be running the show for the program's big objectives: Profiling the Digital Landscape, Illustrating Risks, and Sanitize & Suppressing exposure. As the Team Lead, you'll be building out the program, using Open Source Intelligence (OSINT) alongside our integrated data sets to map out the digital threats against our executives. Once we know what's out there, you'll manage the ongoing process of wiping away this high leverage data set. This means teaming up with external vendors and internal groups to understand the threats, shrink that digital footprint, and issue those takedown requests to data brokers, people-search sites, and public records to keep our executives digital exposure minimal, in collaboration with the brightest minds for threat assessment and reduction. Furthermore, the Team Lead will be integral to Hardening the Digital Terrain and performing Pivot and Link analysis. This includes developing and delivering an education and awareness program to secure the personal digital lives of executives and their human inner circle, and guiding the reduction of high risk attack vectors. The role requires meticulous attention to detail, metrics, and the ability to quantify the “Stalkability Narrative” using the Adversary Cost Rubric, measuring time-to-find, and collecting qualitative data on exposure sentiment and behavioral changes.
Basic Qualifications:
- High School Diploma, GED or Equivalent Certification
- At least 4 years of experience utilizing or producing intelligence products to combat cyber threats or conducting investigations into cybercrime or advanced persistent threats
- At least 3 years of experience in evaluating cyber adversaries, technical indicators of compromise (IOCs), and cyber tactics, techniques and procedures (TTPs)
Preferred Qualifications:
- Bachelor’s Degree
- 1+ years of digital media monitoring of the illicit web or executive digital threat research or protection
- 3+ years of experience with vendors and external resources used to collect cyber intelligence in the financial services space
- 2+ years of experience managing products or programs
- 2+ years of experience analyzing attack vectors such as account takeovers, synthetic account creation, malware infections, phishing kits, and session or cookie hijacking
- 3+ years of experience collecting against intelligence requirements and applying intelligence cycle principles to cyber threat analysis and trends
- Familiarity with the intelligence lifecycle and its role in the security operations ecosystem
Key skills/competency:
- Cyber Security Threat Intelligence
- Executive Protection
- OSINT
- Cyber Intelligence
- Risk Management
- Data Analysis
- Vendor Management
- Program Management
- Threat Assessment
- Security Operations
How to Get Hired at Capital One
- Tailor your resume: Highlight experience in Cyber Intelligence, OSINT, or Executive Protection, emphasizing risk reduction for high-profile individuals.
- Showcase technical skills: Detail your experience with cyber adversaries, IOCs, TTPs, and analyzing attack vectors.
- Demonstrate leadership: Provide examples of program management, process evolution, and communication with diverse audiences.
- Prepare for interviews: Be ready to discuss your approach to threat assessment, discretion, and handling sensitive information.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background