Information Security Analyst

  • Full-time
  • Job Family Group: Technology and Operations

Company Description

Find your everywhere

Join Visa and discover what a career adventure can really be

Very few companies can offer its employee the global reach that
Visa does. That’s the power of Visa’s “My Everywhere” – a big brand with
limitless possibilities.

At Visa, Information security is an integral part of the corporate
culture. It is essential to maintaining our position as an industry leader in
electronic payments, and it is the responsibility of each and every employee to
safeguard information, protect it from unauthorized access, and ensure
regulatory compliance. Information security has a significant effect on
privacy, consumer confidence, external reputation, and/or the bottom line, and
it is a priority on everyone's agenda.


Our Team

The Identity and Access Management (IAM) Team is responsible for
securing employee access to our core applications in the most efficient,
compliant and user-friendly manner, innovatively using the latest industry standards
and tools. Our goal is to become the gold standard for IAM world-wide.


Job Description

Position: Information Security Analyst – IAM Processes

We are seeking an Info. Security Analyst to join the IAM Processes
team within Information Security. As the operations arm of the IAM Access
Management, the team executes the end-to-end identity and access management
activities for Visa critical platforms and select applications, particularly
those that are subject to regulatory requirements, i.e. SOX, SSAE-18, and PCI
DSS. This position will focus on the JML processes.

Qualifications

Key responsibilities and qualifications

  • Well-verse in all aspects of Identity and Access management life-cycle especially on HR driven processes such as JML (Joiner, Mover, Leaver, Conversion, User Access Revalidation) to IAM compliance issues and role engineering
  • Good working knowledge of the UNIX/Linux/Windows systems and security administration, Active Directory, QUEST Active Roles Server, Roles Based Access Controls, Privileged access management tools (e.g. Unix Privileged Manager, Random Password Manager, etc.)
  • Strong knowledge of and experience with business intelligence and analytics packages (Tableau, etc.), databases (SQL, etc.), scripting (PowerShell, VBScript, JavaScript) and programming (C#, Java, ETL frameworks)
  • Working knowledge of Oracle Identity Management suites (OIM)
  • Identify process automation opportunities on existing access management practices
  • Provide JML related business requirements to insure compliance with industry and company security standards.
  • Complete access request processing as per pre-defined sets of procedure and within agreed Service Level Agreements (SLA), resolve problem tickets and assist other security analysts as needed
  • Document access management procedures for assigned applications and/or platforms; keep the access management procedures up-to-date
  • Proactively identify audit and compliance access related issues to reduce the risk of security exposures on the support systems and applications operational efficiency
    and works with various teams to implement the improvements
  • Provide guidance and direction on access controls and IAM practices to customer.
  • Good working knowledge with Excel spreadsheets, analysis of large volume of data
  • Exercise independent judgment with minimal direction from supervisor
  • Have a global mindset and collaborate effectively within and across different teams.
  • Must be flexible and able to manage multiple tasks and priorities on very tight deadlines
  • Be a self-motivated and results oriented individual with an attention to driving aggressive project timelines and schedules
  • Ability to work independently and in collaboration with others to achieve a high level of success
  • Have an attention to detail and advanced analytical and troubleshooting skills
  • Bachelor degree in computer management, information security or equivalent job experience
  • Up to 8 years computer security experience
  • CISSP and other comparative information security certifications are preferred
  • Microsoft Office suite (Power Point, Word, Excel, MS Outlook or equivalent)

Additional Information

All your information will be kept confidential according to EEO guidelines.

Privacy Policy