Intern - Associate Cybersecurity (Bachelor Degree) - Multiple Locations

  • Austin, TX, USA
  • Intern

Company Description

Note: By applying to this position your application is automatically considered for the following locations: Foster City, CA; Ashburn, VA; Austin, TX

As the world’s leader in digital payments technology, Visa’s mission is to connect the world through the most creative, reliable and secure payment network - enabling individuals, businesses, and economies to thrive. Our advanced global processing network, VisaNet, provides secure and reliable payments around the world, and is capable of handling more than 65,000 transaction messages a second. The company’s dedication to innovation drives the rapid growth of connected commerce on any device, and fuels the dream of a cashless future for everyone, everywhere. As the world moves from analog to digital, Visa is applying our brand, products, people, network and scale to reshape the future of commerce.

At Visa, your individuality fits right in. Working here gives you an opportunity to impact the world, invest in your career growth, and be part of an inclusive and diverse workplace. We are a global team of disruptors, trailblazers, innovators and risk-takers who are helping drive economic growth in even the most remote parts of the world, creatively moving the industry forward, and doing meaningful work that brings financial literacy and digital commerce to millions of unbanked and underserved consumers.

You’re an Individual. We’re the team for you. Together, let’s transform the way the world pays.

Job Description

Our summer internship program runs for 12 weeks, May - September. 

Data breaches and identity theft pose an existential threat to our business, and in today’s hyper-connected world, that threat is escalating. The growth of digital, mobile and Internet of Things (IoT) is bringing payments to millions of new connected devices—and millions of new potential entry points for cybercriminals. Today’s criminals are relentless in their attempts to exploit vulnerabilities with increasingly sophisticated malware, social engineering, and brute force attacks. To protect Visa’s assets in this dynamic threat landscape, we’re deploying new cyber-security tools, collaborating across industries, and taking a proactive approach to monitoring the cyberspace beyond the Visa network.

We have matured from a compliance-driven organization to an agile one that can actively defend against threats and proactively manage risk for the enterprise. To maintain our impressive track record of zero breaches to the Visa network, we must stay vigilant in tracking our adversaries and evolving our approach to thwart new and emerging attack vectors.

Teams Actively Hiring within Cybersecurity

Security Architecture and Engineering

Defines and attests security architecture and standards for all Technology solutions, infrastructure, and applications. Also engineers security solutions and services to reduce attack surface in Visa’s products and infrastructure.

Identity and Access Management (IAM)

IAM is the security and business discipline that enables the right user to access the right resources at the right time and for the right reasons. Key IAM functions include access requests, user on-boarding, off-boarding, transfers, user access re-certification; privileged access management, single-sign-on, multi-factor authentication, and role based access control. IAM strives to set the correct balance between convenience/user-experience and compliance/enterprise risk reduction.

Governance Risk and Compliance

Evolve and strengthen our dynamic risk and compliance framework to enable Visa and our partners’ to meet regulatory requirements and achieve business and strategic objectives. Drive achievement of Cybersecurity objectives through management of internal and external security risks, monitoring assurance against required remediation deadlines, support in internal and external compliance reviews internal assessments of cyber security risk posture, operational and executive reports to stakeholders.


Basic Qualifications

  • Pursuing a Bachelor's degree in Cybersecurity, CS, Engineering, Networking, Information Systems, or related technical degree, graduating December 2020 or later.
  • Maintain a 3.0 GPA or higher (4.0 scale)
  • Strong communications skills, specifically, the absence of repeated grammatical or typographical errors, clear and concise written and spoken communications, and communications that demonstrate professional judgment.

Preferred Qualifications
Exposure and hands on experience in one of following areas, but not limited to:

Application Security:

  • Supporting software development / QA specially web services, security tools etc. 
  • Tech skills: Burp Suite, IDA pro, APKTool, Hopper, HP Fortify, CheckMarx (Sast/Dast), Cycript, XPosed, Charles, dex2jar, Kali Linux, Wireshark or any mobile security and/or penetration testing tools or frameworks.


  • SOAP / REST API, Web Services 
  • Development tools such as Maven, Jenkins and Git
  • Different programming and scripting languages, such as Python, JavaScript, C++, Java or others.

Machine Learning - Security Engineering:

  • Software Development, Programming, and debugging using various programming languages and frameworks (object oriented programming, Golang, Python, Java, and C++, JavaScript);
  • Applying Machine Learning/Artificial Intelligence, data science, and statistics concepts including API integration, python, authentication, analysis, modeling, and visualization (python, sci-kit, numpy, matlab, algorithms)

Cybersecurity Analytics:

  • Statistical and machine learning models
  • Exceptional coding skills and experience with high-level programming language like Scala, Python, Java for data analysis.
  • Experience with tools for statistical computing (e.g. tensorflow, NumPy, SciPy).

Identity Access Management (IAM):

  • Identity Management solutions like Oracle Identity Manager, Sailpoint or similar tools
  • IAM products related to Authentication, provisioning, authorization, SSO, and/or enterprise security protocols like SAML, OpenID, OAuth and/or mobile development (iOS/Android)
  • Business intelligence and analytics packages (Tableau, etc.), databases (SQL, etc.), scripting (PowerShell, VBScript, JavaScript) and programming (C#, Java, ETL frameworks)

Data Protection:

  • Security technologies including data encryption, intrusion detection/prevention, event correlation, secure application development, etc.
  • Security controls provided in common platforms and applications in the corporate environment including Unix, Linux, Windows, IBM Mainframe (zTPF, MVS), Oracle, MS SQL Server Microsoft Outlook, J2EE and .NET applications, etc.

Governance Risk and Compliance:

  • Experience in information security governance, policy, and risk management
  • Proficiency using the Microsoft Office suite, especially Microsoft PowerPoint and Excel
    • Pivot tables, Formulas, VLookups
  • Current information security and compliance vendor landscape

Additional Information

Work Hours:

  • This position requires the incumbent to be available during core business hours.

Travel Requirements:

  • This position requires the incumbent to travel for work less than 0% of the time.

Physical Requirements: ​​​​​​

  • This position will be performed in an office setting.  The position will require the incumbent to sit and stand at a desk, communicate in person and by telephone, frequently operate standard office equipment, such as telephones and computers, and reach with hands and arms.

Visa is an EEO Employer.  Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.  Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law.

Videos To Watch

Privacy Policy