Cybersecurity Analyst

Ashburn, VA, United States

Applications have closed

Company Description

Visa is a world leader in digital payments, facilitating more than 215 billion payments transactions between consumers, merchants, financial institutions and government entities across more than 200 countries and territories each year. Our mission is to connect the world through the most innovative, convenient, reliable and secure payments network, enabling individuals, businesses and economies to thrive.

When you join Visa, you join a culture of purpose and belonging – where your growth is priority, your identity is embraced, and the work you do matters. We believe that economies that include everyone everywhere, uplift everyone everywhere. Your work will have a direct impact on billions of people around the world – helping unlock financial access to enable the future of money movement.

Join Visa: A Network Working for Everyone.

Job Description

  • Monitor Information Security alerts using Security Information and Event Management (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts.

  • Utilize sensor data and correlated logs containing AV, IDS, Windows events, Web Proxy, and similar data to establish context and rule out false positives.

  • Mitigate and contain identified threats using approved incident response methodologies. Initiate escalation procedures and incident response processes as defined in operational plan.

  • Perform analysis of security alerts to evaluate risk, determine containment action and identify required preventative measures.

  • Ensure proper documentation of security incidents including attack details.

  • Interact and aid other investigative teams within Visa on time sensitive, critical investigations.

  • Provide feedback to peer teams to enhance security sensor and improve detection capability.

  • Collaborate with operational support teams to ensure they are actively engaged in addressing potential security threats that can impact business.

  • Contribute to projects that enhance the security posture of the enterprise.

  • Operationalize actionable Threat Intelligence reports from internal and external sources.

  • Identify trends, potential new technologies, and emerging threats which may impact the business.

  • Respond to incoming reports of security incidents from the organization via calls and emails.

  • This position is staffed in shifts supporting a 24x7x365 global security operations center. Analysts work a series of 12-hour shifts (followed by days off). Staff assigned to the operations center are considered critical and may need to cover holidays and weekends, if scheduled.

Essential Functions

  • Monitor Information Security alerts using Security Information and Event Management (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts.

  • Utilize sensor data and correlated logs containing AV, IDS, Windows events, Web Proxy, and similar data to establish context and rule out false positives.

Work Hours

  • This position is staffed in shifts supporting a 24x7x365 global security operations center. Analysts work a series of 12-hour shifts (followed by days off). Staff assigned to the operations center are considered critical and may need to cover holidays and weekends, if scheduled.

  • This is a hybrid position. Hybrid employees can alternate time between both remote and office. Employees in hybrid roles are expected to work from the office two days a week, Tuesdays and Wednesdays with a general guidepost of being in the office 50% of the time based on business needs.

Qualifications

Basic Qualifications

• 2 or more years of work experience with a Bachelor’s Degree or an Advanced Degree (e.g. Master’s,
MBA, JD, MD, or PhD)

Preferred Qualifications

• 3 or more years of work experience with a Bachelor’s Degree or more than 2 years of work
experience with an Advanced Degree (e.g. Masters, MBA, JD, MD)
• 3+ years of Security Operations Center (SOC) work experience with a Bachelor’s degree
• 3+ years of related experience in Cybersecurity or computer network defense role.
• Bachelor’s degree in computer science, information systems, or related technical discipline or
equivalent professional experience related to Cybersecurity, Incident Response or information
security.Relevant security-related certifications a plus : CISSP, GCIH, GCIA, GCED, GCFA, CySA+.
• Proven subject matter ability in relevant areas, such as incident response, intrusion analysis,
malware analysis, web application security or security engineering.
• Strong knowledge of malware families and network attack vectors.
• Solid understanding of TCP/IP and internetworking technology including packet analysis, routing
and network security defenses.
• Strong knowledge of operating systems (Windows & Linux), network services and applications.
• Demonstrated experience in an enterprise-level incident response team or security operations
center. Direct experience in handling cyber security incidents and associated incident response
tools.
• Experience in operating and utilizing Security Information and Event Management tool.
• Strong working knowledge of common security tools such as SIEM, AV, WAF, IDS, Netflow, Packet
Analyzer and Endpoint Detection & Response tools.
• Knowledge of web applications security vulnerabilities including cross-site scripting, cross-site
request forgery, SQL injection, DoS attacks and API attacks.
• Good understanding of Web Application Security risks.
• Excellent understanding of DDoS techniques and mitigation mechanisms.
• Display great problem-solving skills, with tenacity and resilience to resolve issues.
• Excellent communication and presentation skills with proven skill in presenting analytical data
effectively to varied audiences.
• Strong interpersonal and leadership skills to influence and build credibility as a peer.
• Strong understanding of cloud technologies and related security best practices.

Additional Information

Visa has adopted a COVID-19 vaccination policy to safeguard the health and well-being of our employees and visitors. As a condition of employment, all employees based in the U.S. are required to be fully vaccinated for COVID-19, unless a reasonable accommodation is approved or as otherwise required by law.

Work Hours: Varies upon the needs of the department.

Travel Requirements: This position requires travel 5-10% of the time.

Mental/Physical Requirements: This position will be performed in an office setting.  The position will require the incumbent to sit and stand at a desk, communicate in person and by telephone, frequently operate standard office equipment, such as telephones and computers.

Visa is an EEO Employer.  Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.  Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law.

Visa will consider for employment qualified applicants with criminal histories in a manner consistent with applicable local law, including the requirements of Article 49 of the San Francisco Police Code.

* Salary range is an estimate based on our salary survey 💰

Tags: APIs Application security CISSP Cloud Computer Science DDoS GCED GCFA GCIA GCIH IDS Incident response Linux Malware Network security PhD Scripting SIEM SOC SQL SQL injection TCP/IP Threat intelligence Vulnerabilities Windows XSS

Perks/benefits: Team events

Region: North America
Country: United States
Job stats:  23  4  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec/Cybersecurity career opportunities

Find open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Analysis, Cryptography, Digital Forensics and Cyber Security in general, filtered by job title or popular skill, toolset and products used.