At a Glance
- Tasks: Monitor and respond to cyber security incidents using advanced tools in a dynamic team environment.
- Company: Join Visa, a leader in electronic payments prioritising top-tier security operations.
- Benefits: Enjoy a hybrid work model, competitive salary, and opportunities for professional growth.
- Other info: Be part of a collaborative culture focused on innovation and security excellence.
- Why this job: Make a real impact in cyber defence while working with cutting-edge technology and passionate peers.
- Qualifications: Experience in SOC roles and familiarity with security tools and frameworks required.
The predicted salary is between 50000 - 70000 € per year.
Information security is an integral part of Visa’s corporate culture. It is essential to maintaining our position as an industry leader in electronic payments, which is why Visa has made it a priority to create top‑tier security operations and incident response teams to defend the company against evolving cyber threats. If you would like to join a company where security is truly valued, where you can work with like‑minded peers who are passionate about the art & science of cyber defense, and where you can use state‑of‑the‑art tools for maximum impact, then we have a home for you.
The successful candidate will work with a team of incident responders at one of Visa's Cyber Fusion Centers. The team is part of a larger organization located across multiple geographical sites that is responsible for the comprehensive cyber defense of Visa and its subsidiaries. This is a hybrid position. The expectation of days in the office will be confirmed by your Hiring Manager.
Essential Functions
- Monitor Information Security alerts using Security Information and Event Management (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts.
- Utilize sensor telemetry data and correlated logs to establish context of an alert and rule out false positives.
- Perform analysis of security alerts to evaluate true positive malicious risk to the business, determine containment action, and identify required preventative measures.
- Ensure proper documentation of security incidents including attack details within the incident management system.
- Collaborate with operational support teams to ensure they are actively engaged in addressing potential security threats that can impact business.
- Respond to incoming reports of security incidents from the organization via calls and emails.
- Quarterly reports for PCI v4.
- Lead Sensitive Data investigations and ensure remediations within a timeframe.
- Tabletop Exercise development, leading and ownership.
- Ensure all processes and controls that fall within your area of responsibility are operating effectively and are correctly evidenced as working.
- Contribute to development of information security policy, standards and guidelines.
- Development of dashboards within SIEM/SOAR.
- Generate reports for both technical and non‑technical staff and stakeholders.
- Keep up to date with the latest security and technology developments.
- Research/evaluate emerging security threats and ways to mitigate them.
Qualifications
- Experience of Security Operations Center (SOC) work experience with a Bachelor’s degree.
- Experience in Cybersecurity or computer network defense role.
- Experience in operating and utilising Security Information and Event Management tool such as Google SecOps (formally Chronicle & Siemplify), ADX, Splunk, Sumo Logic.
- Experience with query languages such as YARA‑L, MDX, SPL.
- Familiarity with MITRE ATT&CK, Cyber Kill Chain, and Incident Response frameworks.
- Relevant security‑related certifications a plus: CISSP, GCIH, GCIA, GCED, GCFA, CySA+.
- Proven subject matter ability in relevant areas, such as incident response, intrusion analysis, malware analysis, web application security or security engineering.
- Strong knowledge of malware families and network attack vectors.
- Solid understanding of TCP/IP and internetworking technology including packet analysis, routing and network security defenses.
- Strong knowledge of operating systems (Windows & Linux), network services and applications.
- Demonstrated experience in an enterprise‑level incident response team or security operations center.
- Direct experience in handling cyber security incidents and associated incident response tools.
- Familiarity with python scripting.
- Strong working knowledge of common security tools such as SIEM, AV, WAF, IDS, NetFlow, Packet Analyzer and Endpoint Detection & Response tools.
- Knowledge of web applications security vulnerabilities including cross‑site scripting, cross‑site request forgery, SQL injection, DoS attacks and API attacks.
- Good understanding of Web Application Security risks.
- Excellent understanding of DDoS techniques and mitigation mechanisms.
- Display great problem‑solving skills, with tenacity and resilience to resolve issues.
- Excellent communication and presentation skills with proven skill in presenting analytical data effectively to varied audiences.
- Familiarity and demonstrated experience with AI and the automation around Security Operations.
- Strong interpersonal and leadership skills to influence and build credibility as a peer.
- Strong understanding of cloud technologies (AWS) and related security best practices.
- Knowledge of OWASP (Open Web Application Security Project) Top Ten Risk Factors.
- Understanding or experience working in an ISO27001/2, PC‑DSS or SOC 2 environment.
- Technical proficiency in at least one programming language, and the ability to successfully complete a coding assessment as part of the selection process.
Cyber Security Operations Specialist employer: Tink
At Visa, we prioritise information security as a core aspect of our corporate culture, making us an exceptional employer for Cyber Security Operations Specialists. Our hybrid work environment fosters collaboration among passionate peers, while our commitment to employee growth is evident through access to state-of-the-art tools and ongoing professional development opportunities. Join us at one of our Cyber Fusion Centers, where you can make a meaningful impact in defending against evolving cyber threats in a supportive and innovative atmosphere.
StudySmarter Expert Advice🤫
We think this is how you could land Cyber Security Operations Specialist
✨Tip Number 1
Network like a pro! Reach out to folks in the cyber security field on LinkedIn or at industry events. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects, especially those related to incident response or security tools. This gives potential employers a taste of what you can do.
✨Tip Number 3
Prepare for interviews by brushing up on common cyber security scenarios and incident response techniques. Practise explaining your thought process clearly, as communication is key in this field.
✨Tip Number 4
Don’t forget to apply through our website! We’ve got loads of opportunities waiting for you, and applying directly can sometimes give you an edge over other candidates.
We think you need these skills to ace Cyber Security Operations Specialist
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the Cyber Security Operations Specialist role. Highlight relevant experience, especially in Security Operations Centers and any specific tools mentioned in the job description, like SIEM or Splunk.
Craft a Compelling Cover Letter:Your cover letter should reflect your passion for cyber security and how you align with Visa's values. Share specific examples of your experience with incident response or threat analysis to show us why you're the perfect fit.
Showcase Your Skills:Don’t forget to mention your technical skills! If you’ve got experience with programming languages or security frameworks like MITRE ATT&CK, make sure to include that. We want to see what makes you stand out!
Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it’s super easy!
How to prepare for a job interview at Tink
✨Know Your Tools
Familiarise yourself with the specific Security Information and Event Management (SIEM) tools mentioned in the job description, like Google SecOps or Splunk. Be ready to discuss how you've used these tools in past roles, as well as any relevant query languages like YARA-L or SPL.
✨Understand Cyber Threats
Brush up on the latest cyber threats and trends. Being able to discuss recent incidents or emerging threats shows your passion for the field and your commitment to staying informed. This will also help you demonstrate your analytical skills during the interview.
✨Showcase Your Incident Response Experience
Prepare examples of your experience in incident response, including specific situations where you successfully mitigated a threat. Use the STAR method (Situation, Task, Action, Result) to structure your answers and highlight your problem-solving skills.
✨Communicate Effectively
Since you'll be presenting analytical data to varied audiences, practice explaining complex security concepts in simple terms. This will not only showcase your communication skills but also your ability to collaborate with non-technical teams.