Cybersecurity Analyst - SOC

Singapore, Singapore

Visa

Das digitale und mobile Zahlungsnetzwerk von Visa steht an der Spitze der neuen Zahlungstechnologien für die neue Zahlung, elektronische und kontaktlose Zahlung, die die Welt des Geldes bilden

View company page

Company Description

Visa is a world leader in payments and technology, with over 259 billion payments transactions flowing safely between consumers, merchants, financial institutions, and government entities in more than 200 countries and territories each year. Our mission is to connect the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and economies to thrive while driven by a common purpose – to uplift everyone, everywhere by being the best way to pay and be paid.

Make an impact with a purpose-driven industry leader. Join us today and experience Life at Visa.

Job Description

Information security is an integral part of Visa's corporate culture. It is essential to maintaining our position as an industry leader in electronic payments, which is why Visa has made it a priority to create top-tier security operations and incident response teams to defend the company against evolving cyber threats. If you would like to join a company where security is truly valued, where you can work with like-minded peers who are passionate about the art & science of cyber defense, and where you can use state of the art tools for maximum impact, then we have a home for you.

 

The successful candidate will work with a team of incident responders at one of Visa's Cyber Fusion Centers located in Singapore. The team is part of a larger organization located across multiple geographical sites that are responsible for the comprehensive cyber defense of Visa and its subsidiaries.

 

Responsibilities:

  • Monitor Information Security alerts using Security Information and Event Management (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts.

  • Utilize sensor telemetry data and correlated logs to establish context of an alert and rule out false positives.

  • Perform analysis of security alerts to evaluate true positive malicious risk to the business, determine containment action, and identify required preventative measures.

  • Ensure proper documentation of security incidents including attack details within the incident management system.

  • Interact and contribute to high-severity incident response efforts which involve multiple teams in order to reach containment. Primarily aiding in incident analysis and reporting.

  • Provide feedback to peer teams within Cybersecurity to enhance security sensors and improve detection capability.

  • Collaborate with operational support teams to ensure they are actively engaged in addressing potential security threats that can impact business.

  • Contribute to projects that enhance the security posture of the enterprise.

  • Operationalize actionable Threat Intelligence reports from internal and external sources.

  • Identify trends, potential new technologies, and emerging threats which may impact the business.

  • Respond to incoming reports of security incidents from the organization via calls and emails.

 

Work Arrangement:

This position is staffed in shifts supporting a 24x7x365 global security operations center. Analysts work a series of 12-hour shifts (followed by days off). Staff assigned to the operations center are considered critical and may need to cover holidays and weekends, if scheduled.

 

This is a hybrid position. Hybrid employees can alternate time between both remote and office. Employees in hybrid roles are expected to work from the office 2-3 set days a week (determined by leadership/site), with a general guidepost of being in the office 50% or more of the time based on business needs.

Qualifications

Basic Qualifications:
• 2+ years of relevant work experience and a Bachelor’s degree, OR 5+ years of relevant work experience.

Preferred Qualifications:
• 3 or more years of Security Operations Center (SOC) with a Bachelor’s Degree or more than 2 years of work experience with an Advanced Degree (e.g. Masters, MBA, JD, MD)
• 3+ years of related experience in Cybersecurity or computer network defense role.
• Bachelor’s degree in computer science, information systems, or related technical discipline or
equivalent professional experience related to Cybersecurity, Incident Response or information
security.
• Relevant security-related certifications a plus : CISSP, GCIH, GCIA, GCED, GCFA, CySA+.
• Proven subject matter ability in relevant areas, such as incident response, intrusion analysis,
malware analysis, web application security or security engineering.
• Strong knowledge of malware families and network attack vectors.
• Solid understanding of TCP/IP and internetworking technology including packet analysis, routing
and network security defenses.
• Strong knowledge of operating systems (Windows & Linux), network services and applications.
• Demonstrated experience in an enterprise-level incident response team or security operations
center.
• Direct experience in handling cyber security incidents and associated incident response
tools.
• Experience in operating and utilizing Security Information and Event Management tool.
• Strong working knowledge of common security tools such as SIEM, AV, WAF, IDS, Netflow, Packet Analyzer and Endpoint Detection & Response tools.
• Knowledge of web applications security vulnerabilities including cross-site scripting, cross-site
request forgery, SQL injection, DoS attacks and API attacks.
• Good understanding of Web Application Security risks.
• Excellent understanding of DDoS techniques and mitigation mechanisms.
• Display great problem-solving skills, with tenacity and resilience to resolve issues.
• Excellent communication and presentation skills with proven skill in presenting analytical data
effectively to varied audiences.
• Strong interpersonal and leadership skills to influence and build credibility as a peer.
• Strong understanding of cloud technologies and related security best practices.

Additional Information

Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: APIs Application security CISSP Cloud Computer Science Cyber defense DDoS GCED GCFA GCIA GCIH IDS Incident response Linux Malware Network security Scripting SIEM SOC SQL SQL injection TCP/IP Threat intelligence Vulnerabilities Windows XSS

Region: Asia/Pacific
Country: Singapore
Job stats:  54  6  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.