Information Security Specialist

  • Full-time
  • Job Family Group: Technology and Operations

Company Description

Common Purpose, Uncommon Opportunity. Everyone at Visa works with one goal in mind – making sure that Visa is the best way to pay and be paid, for everyone everywhere. This is our global vision and the common purpose that unites the entire Visa team. As a global payments technology company, tech is at the heart of what we do: Our VisaNet network processes over 13,000 transactions per second for people and businesses around the world, enabling them to use digital currency instead of cash and checks. We are also global advocates for financial inclusion, working with partners around the world to help those who lack access to financial services join the global economy. Visa’s sponsorships, including the Olympics and FIFA™ World Cup, celebrate teamwork, diversity, and excellence throughout the world. If you have a passion to make a difference in the lives of people around the world, Visa offers an uncommon opportunity to build a strong, thriving career. Visa is fueled by our team of talented employees who continuously raise the bar on delivering the convenience and security of digital currency to people all over the world. Join our team and find out how Visa is everywhere you want to be.

Job Description

POSITION SUMMARY
The objective of Visa’s Ethical Hacking Team is to assess applications and infrastructure for common or exploitable vulnerabilities. Additionally, the team provides comprehensive reports to document the details of the vulnerabilities, the impact that they may have, and the suggested remediation that needs to occur to reduce or mitigate the risk. This team helps provide support to the project team during the engagement and works across multiple functional groups within Information Security to ensure that Visa’s overall security posture is sound.

JOB SCOPE
As a member of Visa’s Ethical Hacking Team, provide technical expertise required to carry out vulnerability assessments of various applications and infrastructure. Coordinate with other departments and teams to evolve information security alignment with company goals and objectives. Provide industry best reports to internal teams to ensure accurate remediation of issues identified during the pentest engagements. This position will oversee pentest efforts for China markets.

RESPONSIBILITIES
• Conduct application focused pentests for Visa internally developed or hosted services
• Conduct infrastructure focused pentests for Visa internally hosted environments
• Perform vulnerability assessments on mobile technologies used by Visa
• Work with other functional groups within Information Security included, Risk, Security Architecture and SSDLC
• Performs remediation testing & reporting through the application of expert ethical hacking and penetration techniques in a fast-paced, highly technical environment
• Provide accurate and timely reporting of findings and proposed remediation and mitigations.
• Provide technical support to Business Leaders
• Perform research of emerging technologies and design frameworks and capabilities required to perform pentest exercises of new technologies adopted by Visa
• Requires comprehensive knowledge and mastery in assigned areas applying skills and competencies in challenging and complex situations.
• May be involved in design phases of projects. May have professional certifications or affiliations.
• Able to work at an intermediate level when executing and improving work processes to ensure achievement of business goals.



Qualifications

• Must be fluent in Mandarin and English
• Bachelor’s degree (or equivalent) in Computer Science, Information Security or a related field
• Five to Ten Years of progressive experience with increasing responsibility in Information Technology, Information Security and Compliance that includes a combination of technical and project leadership responsibilities
• Prior experience or expertise performing application and infrastructure pentests
• Experience in writing proof-of-concept exploits
• Well versed in system exploits (e.g. Buffer Overflows, PTH attacks, windows authentication framework etc.), network exploitation (e.g. VLAN hopping) or web application exploitation
• Well versed with security tools & frameworks like Metasploit, Core, Canvas, AppScan, WebInspect, etc.
• Extensive understanding of cryptographic concepts and applied cryptography
• Proficiency in one or more scripting language. E.g. Perl, Python, Shell Scripting etc.
• Good interpersonal, facilitation, and demonstrated emerging leadership skills
• Able to operate at an advanced level of written and spoken communication; write and speak effectively with impact
• Good understanding of Ethernet, switched LAN and WAN environment and detailed understanding of layer 3 and layer 4 specifications, including IP, TCP, TCP/IP routing protocols and management of ACLs.
• Knowledge of logical / physical access control methods, connections alternatives using private, public and wireless solutions, Network/Host Intrusion Detection Engines, Vulnerability Management Tools, Patch Management Tools, Penetration Testing Tools, Anti-Virus/Anti-Spyware solutions
• Conducts complex analytical functions by performing security assessments and ethical hacks of high risk sensitive applications

Additional Information

All your information will be kept confidential according to EEO guidelines.

Privacy Policy