At a Glance
- Tasks: Join a team defending against cyber threats using state-of-the-art tools and techniques.
- Company: Visa, a leader in electronic payments prioritising security and innovation.
- Benefits: Hybrid work model, competitive salary, and opportunities for professional growth.
- Other info: Dynamic environment with excellent career advancement opportunities.
- Why this job: Make a real impact in cybersecurity while collaborating with passionate peers.
- Qualifications: Experience in SOC roles and knowledge of cybersecurity tools and frameworks.
The predicted salary is between 50000 - 65000 € per year.
Information security is an integral part of Visa’s corporate culture. It is essential to maintaining our position as an industry leader in electronic payments, which is why Visa has made it a priority to create top‑tier security operations and incident response teams to defend the company against evolving cyber threats. If you would like to join a company where security is truly valued, where you can work with like‑minded peers who are passionate about the art & science of cyber defense, and where you can use state‑of‑the‑art tools for maximum impact, then we have a home for you.
The successful candidate will work with a team of incident responders at one of Visa's Cyber Fusion Centers. The team is part of a larger organization located across multiple geographical sites that is responsible for the comprehensive cyber defense of Visa and its subsidiaries. This is a hybrid position. The expectation of days in the office will be confirmed by your Hiring Manager.
Essential Functions
- Monitor Information Security alerts using Security Information and Event Management (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts.
- Utilize sensor telemetry data and correlated logs to establish context of an alert and rule out false positives.
- Perform analysis of security alerts to evaluate true positive malicious risk to the business, determine containment action, and identify required preventative measures.
- Ensure proper documentation of security incidents including attack details within the incident management system.
- Collaborate with operational support teams to ensure they are actively engaged in addressing potential security threats that can impact business.
- Respond to incoming reports of security incidents from the organization via calls and emails.
- Quarterly reports for PCI v4.
- Lead Sensitive Data investigations and ensure remediations within a timeframe.
- Tabletop Exercise development, leading and ownership.
- Ensure all processes and controls that fall within your area of responsibility are operating effectively and are correctly evidenced as working.
- Contribute to development of information security policy, standards and guidelines.
- Development of dashboards within SIEM/SOAR.
- Generate reports for both technical and non‑technical staff and stakeholders.
- Keep up to date with the latest security and technology developments.
- Research/evaluate emerging security threats and ways to mitigate them.
Qualifications
- Experience of Security Operations Center (SOC) work experience with a Bachelor’s degree.
- Experience in Cybersecurity or computer network defense role.
- Experience in operating and utilising Security Information and Event Management tool such as Google SecOps (formally Chronicle & Siemplify), ADX, Splunk, Sumo Logic.
- Experience with query languages such as YARA‑L, MDX, SPL.
- Familiarity with MITRE ATT&CK, Cyber Kill Chain, and Incident Response frameworks.
- Relevant security‑related certifications a plus: CISSP, GCIH, GCIA, GCED, GCFA, CySA+.
- Proven subject matter ability in relevant areas, such as incident response, intrusion analysis, malware analysis, web application security or security engineering.
- Strong knowledge of malware families and network attack vectors.
- Solid understanding of TCP/IP and internetworking technology including packet analysis, routing and network security defenses.
- Strong knowledge of operating systems (Windows & Linux), network services and applications.
- Demonstrated experience in an enterprise‑level incident response team or security operations center.
- Direct experience in handling cyber security incidents and associated incident response tools.
- Familiarity with python scripting.
- Strong working knowledge of common security tools such as SIEM, AV, WAF, IDS, NetFlow, Packet Analyzer and Endpoint Detection & Response tools.
- Knowledge of web applications security vulnerabilities including cross‑site scripting, cross‑site request forgery, SQL injection, DoS attacks and API attacks.
- Good understanding of Web Application Security risks.
- Excellent understanding of DDoS techniques and mitigation mechanisms.
- Display great problem‑solving skills, with tenacity and resilience to resolve issues.
- Excellent communication and presentation skills with proven skill in presenting analytical data effectively to varied audiences.
- Familiarity and demonstrated experience with AI and the automation around Security Operations.
- Strong interpersonal and leadership skills to influence and build credibility as a peer.
- Strong understanding of cloud technologies (AWS) and related security best practices.
- Knowledge of OWASP (Open Web Application Security Project) Top Ten Risk Factors.
- Understanding or experience working in an ISO27001/2, PC‑DSS or SOC 2 environment.
- Technical proficiency in at least one programming language, and the ability to successfully complete a coding assessment as part of the selection process.
Cyber Security Operations Specialist in London employer: Tink
At Visa, we prioritise information security as a core aspect of our corporate culture, making us an exceptional employer for Cyber Security Operations Specialists. Our hybrid work environment fosters collaboration among passionate peers, while our commitment to employee growth is evident through access to state-of-the-art tools and ongoing professional development opportunities. Join us at one of our Cyber Fusion Centers, where you can make a meaningful impact in defending against evolving cyber threats in a supportive and innovative atmosphere.
StudySmarter Expert Advice🤫
We think this is how you could land Cyber Security Operations Specialist in London
✨Tip Number 1
Network like a pro! Reach out to folks in the cyber security field on LinkedIn or at industry events. A friendly chat can open doors that a CV just can't.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects, especially if you've worked with SIEM tools or incident response frameworks. This gives you an edge and proves you're the real deal.
✨Tip Number 3
Prepare for the interview like it’s a mission! Research Visa's security culture and be ready to discuss how you can contribute to their Cyber Fusion Centers. Tailor your answers to show you’re a perfect fit for their team.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who take that extra step!
We think you need these skills to ace Cyber Security Operations Specialist in London
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the Cyber Security Operations Specialist role. Highlight relevant experience, especially in Security Operations Centers and any specific tools mentioned in the job description, like SIEM or Splunk.
Craft a Compelling Cover Letter:Your cover letter should reflect your passion for cyber security and how you align with Visa's values. Share specific examples of your experience with incident response or threat analysis to show us what you can bring to the team.
Showcase Your Skills:Don’t forget to mention any relevant certifications or technical skills, like familiarity with MITRE ATT&CK or programming languages. This is your chance to shine, so let us know what makes you a great fit!
Apply Through Our Website:We encourage you to apply through our website for a smoother application process. It’s the best way for us to receive your application and ensure it gets the attention it deserves!
How to prepare for a job interview at Tink
✨Know Your Tools
Familiarise yourself with the specific Security Information and Event Management (SIEM) tools mentioned in the job description, like Google SecOps or Splunk. Be ready to discuss how you've used these tools in past roles, as well as any relevant query languages like YARA-L or SPL.
✨Understand Cyber Threats
Brush up on the latest cyber threats and trends, especially those related to the financial sector. Being able to discuss recent incidents or emerging threats will show your passion for the field and your proactive approach to staying informed.
✨Demonstrate Incident Response Skills
Prepare to share specific examples of your experience in incident response. Think about a time you successfully handled a security incident, detailing your thought process, actions taken, and the outcome. This will highlight your problem-solving skills and resilience.
✨Communicate Effectively
Practice explaining complex technical concepts in simple terms, as you'll need to communicate with both technical and non-technical stakeholders. Consider preparing a few key points or stories that showcase your communication skills and ability to present analytical data effectively.