Cybersecurity Engineer - Identity and Access Management (Java or Go, AWS , Cloud )

Bengaluru, India

Applications have closed

Visa

Das digitale und mobile Zahlungsnetzwerk von Visa steht an der Spitze der neuen Zahlungstechnologien für die neue Zahlung, elektronische und kontaktlose Zahlung, die die Welt des Geldes bilden

View company page

Company Description

Visa is a world leader in digital payments, facilitating more than 215 billion payments transactions between consumers, merchants, financial institutions and government entities across more than 200 countries and territories each year. Our mission is to connect the world through the most innovative, convenient, reliable and secure payments network, enabling individuals, businesses and economies to thrive.

When you join Visa, you join a culture of purpose and belonging – where your growth is priority, your identity is embraced, and the work you do matters. We believe that economies that include everyone everywhere, uplift everyone everywhere. Your work will have a direct impact on billions of people around the world – helping unlock financial access to enable the future of money movement.

Join Visa: A Network Working for Everyone.

Job Description

Identity and Access Management (IAM) is a key technology pillar at Visa, responsible for providing secure access to misc. payment related applications and services from a variety of users (employees, businesses, and customers across) globally. To stay ahead of the rapidly changing security landscape especially with globalization of Visa's business and newer form factors of access via new devices, IOT etc., has direct impact on IAM Services. IAM team is rapidly growing and has a global presence in Singapore, Beijing, Bangalore, London, Austin, and Foster City.

Are you interested to be part of a dynamic diverse team of industry’s leading IAM/Security professionals?

What is important to us:

  • Security First – Our team focuses on security in everything we do, and we take it seriously with no compromises of any sort. We look forward to working with like-minded folks

  • Curiosity – Be curious. Ask how things work and ask how you can learn new stuff. We believe curiosity fosters creativity

  • Ownership – We have clients and customers who embodies complete trust on us because we show them, we own what we do in every sense. We expect every team member completely own the activity he/she is responsible

  • Agility – Be open for a change and acclimate to them

As a Cybersecurity Engineer, you will:

  • Establish strong engineering best practices

  • Own IAM Projects and implementation tracks from ideation to production operationalization

  • Implement IAM Controls on cloud platforms like AWS, GCP and Azure

  • Design, develop and testing of custom solutions to support IAM governance

  • Work with a global team operating in different time zones

This is a hybrid position. Hybrid employees can alternate time between both remote and office. Employees in hybrid roles are expected to work from the office 2-3 set days a week (determined by leadership/site), with a general guidepost of being in the office 50% or more of the time based on business needs.

Qualifications

Basic Qualifications:
• 2+ years of relevant work experience and a Bachelors degree, OR 5+ years of relevant work experience.

Preferred Qualifications:
• Employer will accept a bachelor’s degree in Computer Science, Computer Engineering, Electronics Engineering, Information Technology, or closely related field and 5+ years of experience in a computer-related occupation.
• At least 4+ years of solid experience in delivering production level engineering solutions supporting Tier 0 and Tier 1 systems preferably in enterprise Identity and Access Management solutions
• 4+ years of Solid hands-on experience as programmer/developer with specialization in Java, Golang
• Has in-depth knowledge of designing, building, operating, maintaining, and delivering continuous change into Cloud environments including Amazon Web Services (AWS),Azure and GCP.
• Unrivalled experience with AWS core services, including best practice implementation of Lambda functions, Serverless implementations, VPCs, EC2, IAM, RDS, Organizations and multi-account operation
• Experience in scripting Infrastructure as Code in Terraform
• Experience in implementing Privilege Access management (PAM) solution for accessing cloud resources
• Good understanding on IAM Access analyzer, ABAC, RBAC and PBAC capabilities offered by AWS.
• Prior experience in Data encryption, hashing algorithms, and HTTPS / TLS protocols
• Experience in working on Linux / Windows Platform and bash/shell scripting
• Hands-on knowledge in Kubernetes and Microservices
• Experience with LDAP, AD, ADFS, Databases.
• Strong inter-personnel, analytical & communication skills
• Strong knowledge of Software Development Life Cycle
• Prior experience on IAM products related to Authentication, provisioning, authorization, SSO, and/or enterprise security protocols like SAML, OpenID and Oauth
• Cloud environment such as Amazon Web Services (AWS), Microsoft Azure or GCP
• Docker, Jenkins, or Kubernetes
• Other Programming languages such as Python

Additional Information

Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: AWS Azure Bash Cloud Computer Science Docker EC2 Encryption GCP Golang Governance Hashing IAM Java Kubernetes Lambda LDAP Linux Microservices OpenID Python SAML Scripting SDLC SSO Terraform TLS Windows

Regions: Asia/Pacific Europe North America
Job stats:  8  1  0

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.