Cybersecurity Analyst - SOC

  • Full-time
  • Job Family Group: Technology and Operations

Company Description

Visa is a world leader in digital payments, facilitating more than 215 billion payments transactions between consumers, merchants, financial institutions and government entities across more than 200 countries and territories each year. Our mission is to connect the world through the most innovative, convenient, reliable and secure payments network, enabling individuals, businesses and economies to thrive.

When you join Visa, you join a culture of purpose and belonging – where your growth is priority, your identity is embraced, and the work you do matters. We believe that economies that include everyone everywhere, uplift everyone everywhere. Your work will have a direct impact on billions of people around the world – helping unlock financial access to enable the future of money movement.

Join Visa: A Network Working for Everyone.

Job Description

Information security is an integral part of Visa's corporate culture. It is essential to maintaining our position as an industry leader in electronic payments, which is why Visa has made it a priority to create top-tier security operations and incident response teams to defend the company against evolving cyber threats. If you would like to join a company where security is truly valued, where you can work with like-minded peers who are passionate about the art & science of cyber defense, and where you can use state of the art tools for maximum impact, then we have a home for you.

The successful candidate will work with a team of incident responders at Visa's Cyber Fusion Center located in Ashburn, VA. The team is part of a larger organization located across multiple geographical sites that are responsible for the comprehensive cyber defense of Visa and its subsidiaries.

Essential Functions:

  • Monitor Information Security alerts using Security Information and Event Management (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts.

  • Utilize sensor telemetry data and correlated logs to establish context of an alert and rule out false positives.

  • Perform analysis of security alerts to evaluate true positive malicious risk to the business, determine containment action, and identify required preventative measures.

  • Ensure proper documentation of security incidents including attack details within the incident management system.

  • Interact and contribute to high-severity incident response efforts which involve multiple teams in order to reach containment. Primarily aiding in incident analysis and reporting.

  • Provide feedback to peer teams within Cybersecurity to enhance security sensors and improve detection capability.

  • Collaborate with operational support teams to ensure they are actively engaged in addressing potential security threats that can impact business.

  • Contribute to projects that enhance the security posture of the enterprise.

  • Operationalize actionable Threat Intelligence reports from internal and external sources.

  • Identify trends, potential new technologies, and emerging threats which may impact the business.

  • Respond to incoming reports of security incidents from the organization via calls and emails.

Work Arrangement:

This position is staffed in shifts supporting a 24x7x365 global security operations center. Analysts work a series of 12-hour shifts (followed by days off). Staff assigned to the operations center are considered critical and may need to cover holidays and weekends, if scheduled.

This is a hybrid position. Hybrid employees can alternate time between both remote and office. Employees in hybrid roles are expected to work from the office 2-3 set days a week (determined by leadership/site), with a general guidepost of being in the office 50% or more of the time based on business needs.

Qualifications

Basic Qualifications:

• 2+ years of relevant work experience and a Bachelors degree, OR 5+ years of
relevant work experience

Preferred Qualifications:
• 3 or more years of work experience with a Bachelor’s Degree or more than 2
years of work experience with an Advanced Degree (e.g. Masters, MBA, JD,
MD)
• 3+ years of Security Operations Center (SOC) work experience with a
Bachelor’s degree
• 3+ years of related experience in Cybersecurity or computer network defense
role.
• Bachelor’s degree in computer science, information systems, or related
technical discipline or equivalent professional experience related to
Cybersecurity, Incident Response or information
security.
• Relevant security-related certifications a plus : CISSP, GCIH, GCIA, GCED,
GCFA, CySA+.
• Proven subject matter ability in relevant areas, such as incident response,
intrusion analysis, malware analysis, web application security or security
engineering.
• Strong knowledge of malware families and network attack vectors.
• Solid understanding of TCP/IP and internetworking technology including
packet analysis, routing and network security defenses.
• Strong knowledge of operating systems (Windows & Linux), network services
and applications.
• Demonstrated experience in an enterprise-level incident response team or
security operations center.
• Direct experience in handling cyber security incidents and associated incident
response tools.
• Experience in operating and utilizing Security Information and Event
Management tool.
• Strong working knowledge of common security tools such as SIEM, AV, WAF,
IDS, Netflow, Packet Analyzer and Endpoint Detection & Response tools.
• Knowledge of web applications security vulnerabilities including cross-site
scripting, cross-site request forgery, SQL injection, DoS attacks and API
attacks.
• Good understanding of Web Application Security risks.
• Excellent understanding of DDoS techniques and mitigation mechanisms.
• Display great problem-solving skills, with tenacity and resilience to resolve
issues.
• Excellent communication and presentation skills with proven skill in
presenting analytical data effectively to varied audiences.
• Strong interpersonal and leadership skills to influence and build credibility as a
peer.
• Strong understanding of cloud technologies and related security best
practices.

Additional Information

Work Hours: Varies upon the needs of the department.

Travel Requirements: This position requires travel 5-10% of the time.

Mental/Physical Requirements: This position will be performed in an office setting.  The position will require the incumbent to sit and stand at a desk, communicate in person and by telephone, frequently operate standard office equipment, such as telephones and computers.

Visa is an EEO Employer.  Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.  Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law.

Visa will consider for employment qualified applicants with criminal histories in a manner consistent with applicable local law, including the requirements of Article 49 of the San Francisco Police Code.

U.S. APPLICANTS ONLY: The estimated salary range for a new hire into this position is 100,200.00 to 127,800.00 USD, which may include potential sales incentive payments (if applicable). Salary may vary depending on job-related factors which may include knowledge, skills, experience, and location. In addition, this position may be eligible for bonus and equity. Visa has a comprehensive benefits package for which this position may be eligible that includes Medical, Dental, Vision, 401 (k), FSA/HSA, Life Insurance, Paid Time Off, and Wellness Program.
Privacy Policy