Job description
Visa is a world leader in digital payments, facilitating more than 215 billion payments transactions between consumers, merchants, financial institutions and government entities across more than 200 countries and territories each year. Our mission is to connect the world through the most innovative, convenient, reliable and secure payments network, enabling individuals, businesses and economies to thrive.
When you join Visa, you join a culture of purpose and belonging – where your growth is priority, your identity is embraced, and the work you do matters. We believe that economies that include everyone everywhere, uplift everyone everywhere. Your work will have a direct impact on billions of people around the world – helping unlock financial access to enable the future of money movement.
Join Visa: A Network Working for Everyone.
Overview:
Information security is an integral part of Visa's corporate culture. It is essential to maintaining our position as an industry leader in electronic payments, which is why Visa has made it a priority to create top-tier security operations and incident response teams to defend the company against evolving cyber threats. If you would like to join a company where security is truly valued, where you can work with like-minded peers who are passionate about the art & science of cyber defense, and where you can use state of the art tools for maximum impact, then we have a home for you.
The successful candidate will work with a team of incident responders at Visa's Cyber Fusion Center located in London. The team is part of a larger organization located across multiple geographical sites that are responsible for the comprehensive cyber defense of Visa and its subsidiaries.
Responsibilities:
Monitor Information Security alerts using Security Information and Event Management (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts.
Utilize sensor telemetry data and correlated logs to establish context of an alert and rule out false positives.
Perform analysis of security alerts to evaluate true positive malicious risk to the business, determine containment action, and identify required preventative measures.
Ensure proper documentation of security incidents including attack details within the incident management system.
Interact and contribute to high-severity incident response efforts which involve multiple teams in order to reach containment. Primarily aiding in incident analysis and reporting.
Provide feedback to peer teams within Cybersecurity to enhance security sensors and improve detection capability.
Collaborate with operational support teams to ensure they are actively engaged in addressing potential security threats that can impact business.
Contribute to projects that enhance the security posture of the enterprise.
Operationalize actionable Threat Intelligence reports from internal and external sources.
Identify trends, potential new technologies, and emerging threats which may impact the business.
Respond to incoming reports of security incidents from the organization via calls and emails.
Work Arrangement:
This position is staffed in shifts supporting a 24x7x365 global security operations center. Analysts work a series of 12-hour shifts (followed by days off). Staff assigned to the operations center are considered critical and may need to cover holidays and weekends, if scheduled.
This is a hybrid position. Hybrid employees can alternate time between both remote and office. Employees in hybrid roles are expected to work from the office 2-3 set days a week (determined by leadership/site), with a general guidepost of being in the office 50% of the time based on business needs.
- Experience in Cybersecurity or computer network defense role. Bachelor’s degree in computer science, information systems, or related technical discipline or equivalent professional experience related to Cybersecurity, Incident Response or information security.
- Relevant security-related certifications a plus : CISSP, GCIH, GCIA, GCED, GCFA, CySA+.
- Proven subject matter ability in relevant areas, such as incident response, intrusion analysis, malware analysis, web application security or security engineering.
- Strong knowledge of malware families and network attack vectors.
- Solid understanding of TCP/IP and internetworking technology including packet analysis, routing and network security defenses.
- Strong knowledge of operating systems (Windows & Linux), network services and applications.
- Demonstrated experience in an enterprise-level incident response team or security operations center.
- Direct experience in handling cyber security incidents and associated incident response tools.
- Experience in operating and utilizing Security Information and Event Management tool.
- Strong working knowledge of common security tools such as SIEM, AV, WAF, IDS, Netflow, Packet Analyzer and Endpoint Detection & Response tools.
- Knowledge of web applications security vulnerabilities including cross-site scripting, cross-site request forgery, SQL injection, DoS attacks and API attacks.
- Good understanding of Web Application Security risks.
- Excellent understanding of DDoS techniques and mitigation mechanisms.
- Display great problem-solving skills, with tenacity and resilience to resolve issues.
- Excellent communication and presentation skills with proven skill in presenting analytical data effectively to varied audiences.
- Strong interpersonal and leadership skills to influence and build credibility as a peer.
- Strong understanding of cloud technologies and related security best practices.
Additional Information
Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law.