Cybersecurity Analyst - VSIRT
  • United Kingdom London
  • RemoteWorker UK
1 year before
31.01.2024
Protect and Defend
Cyber Defense Analysis
Job Description

Cybersecurity Analyst - VSIRT Cyber Security Full-time
Job Location: London, UNITED KINGDOM
Job : REF024931W
Job Function: Full-time

Job Description And Responsibilities

Information security is an integral part of Visa's corporate culture. It is essential to maintaining our position as an industry leader in electronic payments, which is why Visa has made it a priority to create top-tier security operations and incident response teams to defend the company against evolving cyber threats. If you would like to join a company where security is truly valued, where you can work with like-minded peers who are passionate about the art & science of cyber defense, and where you can use state of the art tools for maximum impact, then we have a home for you. The successful candidate will work with a team of incident responders at one of Visa's Cyber Fusion Centers located in London, UK. The team is part of a larger organization located across multiple geographical sites that are responsible for the comprehensive cyber defense of Visa and its subsidiaries.

Responsibilities:

Monitor Information Security alerts using Security Information and Event Management (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts.
Utilize sensor telemetry data and correlated logs to establish context of an alert and rule out false positives.
Perform analysis of security alerts to evaluate true positive malicious risk to the business, determine containment action, and identify required preventative measures. Ensure proper documentation of security incidents including attack details within the incident management system.
Interact and contribute to high-severity incident response efforts which involve multiple teams in order to reach containment.
Primarily aiding in incident analysis and reporting.
Provide feedback to peer teams within Cybersecurity to enhance security sensors and improve detection capability.
Collaborate with operational support teams to ensure they are actively engaged in addressing potential security threats that can impact business.
Contribute to projects that enhance the security posture of the enterprise.
Operationalize actionable Threat Intelligence reports from internal and external sources.
Identify trends, potential new technologies, and emerging threats which may impact the business.
Respond to incoming reports of security incidents from the organization via calls and emails.

Work Arrangement:

This position is staffed in shifts supporting a 24x7x365 global security operations center.
Analysts work a series of 12-hour shifts (followed by days off).
Staff assigned to the operations center are considered critical and may need to cover holidays and weekends, if scheduled.
This is a hybrid position. Hybrid employees can alternate time between both remote and office. Employees in hybrid roles are expected to work from the office 2-3 set days a week (determined by leadership/site), with a general guidepost of being in the office 50% or more of the time based on business needs.
Qualifications Security Operations Center (SOC) work experience with a Bachelors degree in computer science, information systems, or related technical discipline or equivalent professional experience related to Cybersecurity, Incident Response or information security.
Experience in Cybersecurity or computer network defense role.

Relevant security-related certifications a plus : CISSP, GCIH, GCIA, GCED, GCFA, CySA.

Proven subject matter ability in relevant areas, such as incident response, intrusion analysis, malware analysis, web application security or security engineering.
Strong knowledge of malware families and network attack vectors.
Solid understanding of TCP/IP and internetworking technology including packet analysis, routing and network security defenses.
Strong knowledge of operating systems (Windows & Linux), network services and applications.
Demonstrated experience in an enterprise-level incident response team or security operations center.
Direct experience in handling cyber security incidents and associated incident response tools.
Experience in operating and utilizing Security Information and Event Management tool.
Strong working knowledge of common security tools such as SIEM, AV, WAF, IDS, Netflow, Packet Analyzer and Endpoint Detection & Response tools.
Knowledge of web applications security vulnerabilities including cross-site scripting, cross-site request forgery, SQL injection, DoS attacks and API attacks.
Good understanding of Web Application Security risks.
Excellent understanding of DDoS techniques and mitigation mechanisms.
Display great problem-solving skills, with tenacity and resilience to resolve issues.
Excellent communication and presentation skills with proven skill in presenting analytical data effectively to varied audiences.
Strong interpersonal and leadership skills to influence and build credibility as a peer.
Strong understanding of cloud technologies and related security best practices. Additional Information Visa is an EEO Employer.
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law. Apply for this position Back to Job Listings


Quick response

Required Knowledge
  • K0001   Knowledge of computer networking concepts and protocols, and network security methodologies.
  • K0004   Knowledge of cybersecurity and privacy principles.
  • K0005   Knowledge of cyber threats an`d vulnerabilities.
  • K0013   Knowledge of cyber defense and vulnerability assessment tools and their capabilities.
  • K0040   Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
  • K0042   Knowledge of incident response and handling methodologies.
  • K0044   Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • K0046   Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • K0070   Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • K0106   Knowledge of what constitutes a network attack and a network attackā€™s relationship to both threats and vulnerabilities.
  • K0324   Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
  • K0624   Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)

Required Skills
  • S0025   Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).
  • S0054   Skill in using incident handling methodologies.
  • S0063   Skill in collecting data from a variety of cyber defense resources.
  • S0169   Skill in conducting trend analysis.
  • S0367   Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Required Abilities
  • A0066  Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
  • A0123  Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • A0128  Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
  • A0159  Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).