Senior Cybersecurity Analyst - Incident Response

Visa
Charing Cross, United Kingdom
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior

Job location

Charing Cross, United Kingdom

Tech stack

Microsoft Windows
API
Cloud Computing
Computer Security
Information Systems
Cross-Site Request Forgery
Linux
Payment Systems
Intrusion Detection Systems
Network Security
NetFlow
Routing
Network Service
Packet Analyzer
Web Application Security
Security Information and Event Management
SQL Injection
TCP/IP
Scripting (Bash/Python/Go/Ruby)
Malware
Information Technology
Cybercrime
Operational Systems
Ddos
Cyber Warfare

Job description

Information security is an integral part of Visa's corporate culture. It is essential to maintain our position as an industry leader in electronic payments, which is why Visa has made it a priority to create top-tier security operations and incident response teams to defend the company against evolving cyber threats. If you would like to join a company where security is truly valued, where you can work with like-minded peers who are passionate about the art & science of cyber defense, and where you can use state of the art tools for maximum impact, then we have a home for you.

The successful candidate will work with a team of incident responders at one of Visa's Cyber Fusion Centers. The team is part of a larger organization located across multiple geographical sites that are responsible for the comprehensive cyber defense of Visa and its subsidiaries.

Essential Functions:

  • Manage and address cybersecurity incidents through all stages, including identification, containment, and eradication.
  • Perform deep-dive analysis on systems, accounts, and networks to identify the root cause and impact of incidents.
  • Act as an engagement point for broader technology teams, including Cyber Defense and Engineering.
  • Perform proactive threat hunting to identify and mitigate potential threats before they can cause harm.
  • Develop and refine detection rules to improve the identification and response to security incidents.
  • Provide detailed reports and documentation of incidents and response actions.
  • Conduct quality control of the work performed by analysts to ensure accuracy and thoroughness.
  • Mentor and train junior analysts in advanced incident response techniques, tactics, and procedures.
  • Develop and maintain incident response playbooks and runbooks to ensure standardized and efficient response processes.
  • Contribute to identifying process improvement opportunities to enhance security incident response processes.
  • Implement process automation to streamline incident response workflows and improve efficiency.
  • Support and manage cybersecurity projects to enhance overall security posture.

This is a hybrid position. Expectation of days in the office will be confirmed by your Hiring Manager.

Requirements

  • Proven subject matter expertise in relevant areas, such as incident response, threat hunting, malware analysis, web application security or security engineering.
  • 3+ years of Security Operations Center (SOC) work experience with a bachelor's degree.
  • Bachelor's degree in computer science, information systems, or related technical discipline or equivalent professional experience related to Cybersecurity, Incident Response or information security.
  • Experience working in an enterprise-level incident response team or security operations center.
  • Relevant security-related certifications a plus: CISSP, GCIH, GCIA, GCED, GCFA, CySA+.
  • Demonstrated expertise in areas like incident response, intrusion and malware analysis, web application security, or security engineering.
  • Expensive understanding of malware types and network attack methods.
  • Strong grasp of TCP/IP, packet analysis, routing, and network security.
  • Extensive expertise in operating systems (Windows and Linux), as well as network services and applications.
  • Direct experience in handling cyber security incidents and associated incident response tools.
  • Strong working knowledge of common security tools such as SIEM, AV, WAF, IDS, Netflow, Packet Analyzer and Endpoint Detection & Response tools.
  • Understanding of web application security vulnerabilities, such as cross-site scripting, cross-site request forgery, SQL injection, denial-of-service attacks, and API attacks.
  • Good understanding of Web Application Security risks.
  • Excellent understanding of DDoS techniques and mitigation mechanisms.
  • Display great problem-solving skills, with tenacity and resilience to resolve issues.
  • Excellent communication and presentation skills with proven skill in presenting analytical data effectively to varied audiences.
  • Strong interpersonal and leadership skills to influence and build credibility as a peer.
  • Strong understanding of cloud technologies and related security best practices.

About the company

Visa is a world leader in payments and technology, with over 259 billion payments transactions flowing safely between consumers, merchants, financial institutions, and government entities in more than 200 countries and territories each year. Our mission is to connect the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and economies to thrive while driven by a common purpose - to uplift everyone, everywhere by being the best way to pay and be paid.

Apply for this position