Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cybersecurity Analyst - SOC image - Rise Careers
Job details

Cybersecurity Analyst - SOC - job 2 of 2

Company Description

Visa is a world leader in payments and technology, with over 259 billion payments transactions flowing safely between consumers, merchants, financial institutions, and government entities in more than 200 countries and territories each year. Our mission is to connect the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and economies to thrive while driven by a common purpose – to uplift everyone, everywhere by being the best way to pay and be paid.

Make an impact with a purpose-driven industry leader. Join us today and experience Life at Visa.

Job Description

Information security is an integral part of Visa's corporate culture. It is essential to maintaining our position as an industry leader in electronic payments, which is why Visa has made it a priority to create top-tier security operations and incident response teams to defend the company against evolving cyber threats. If you would like to join a company where security is truly valued, where you can work with like-minded peers who are passionate about the art & science of cyber defense, and where you can use state of the art tools for maximum impact, then we have a home for you.

The successful candidate will work with a team of incident responders at one of Visa's Cyber Fusion Centers located in Ashburn, VA. The team is part of a larger organization located across multiple geographical sites that are responsible for the comprehensive cyber defense of Visa and its subsidiaries.

Essential Functions:

  • Monitor Information Security alerts using Security Information and Event Management (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts.

  • Utilize sensor telemetry data and correlated logs to establish context of an alert and rule out false positives.

  • Perform analysis of security alerts to evaluate true positive malicious risk to the business, determine containment action, and identify required preventative measures.

  • Ensure proper documentation of security incidents including attack details within the incident management system.

  • Interact and contribute to high-severity incident response efforts which involve multiple teams in order to reach containment. Primarily aiding in incident analysis and reporting.

  • Provide feedback to peer teams within Cybersecurity to enhance security sensors and improve detection capability.

  • Collaborate with operational support teams to ensure they are actively engaged in addressing potential security threats that can impact business.

  • Contribute to projects that enhance the security posture of the enterprise.

  • Operationalize actionable Threat Intelligence reports from internal and external sources.

  • Identify trends, potential new technologies, and emerging threats which may impact the business.

  • Respond to incoming reports of security incidents from the organization via calls and emails.

Work Arrangement:

This position is staffed in shifts supporting a 24x7x365 global security operations center. Analysts work a series of 12-hour shifts (followed by days off). Staff assigned to the operations center are considered critical and may need to cover holidays and weekends, if scheduled.

This is a hybrid position. Hybrid employees can alternate time between both remote and office. Employees in hybrid roles are expected to work from the office two days a week, Tuesdays and Wednesdays with a general guidepost of being in the office 50% of the time based on business needs.

Qualifications

Basic Qualifications:
• 2+ years of relevant work experience and a Bachelors degree, OR 5+ years of relevant work experience

Preferred Qualifications:
• 3 or more years of work experience with a Bachelor’s Degree or more than 2 years of work experience with an Advanced Degree (e.g. Masters, MBA, JD, MD)
• 3+ years of Security Operations Center (SOC) work experience with a Bachelor’s degree.
• 3+ years of related experience in Cybersecurity or computer network defense role.
• Bachelor’s degree in computer science, information systems, or related technical discipline or
equivalent professional experience related to Cybersecurity, Incident Response or information
security.
• Relevant security-related certifications a plus : CISSP, GCIH, GCIA, GCED, GCFA, CySA+.
• Proven subject matter ability in relevant areas, such as incident response, intrusion analysis,
malware analysis, web application security or security engineering.
• Strong knowledge of malware families and network attack vectors.
• Solid understanding of TCP/IP and internetworking technology including packet analysis, routing and network security defenses.
• Strong knowledge of operating systems (Windows & Linux), network services and applications.
• Demonstrated experience in an enterprise-level incident response team or security operations
center.
• Direct experience in handling cyber security incidents and associated incident response
tools.
• Experience in operating and utilizing Security Information and Event Management tool.
• Strong working knowledge of common security tools such as SIEM, AV, WAF, IDS, Netflow, Packet Analyzer and Endpoint Detection & Response tools.
• Knowledge of web applications security vulnerabilities including cross-site scripting, cross-site request forgery, SQL injection, DoS attacks and API attacks.
• Good understanding of Web Application Security risks.
• Excellent understanding of DDoS techniques and mitigation mechanisms.
• Display great problem-solving skills, with tenacity and resilience to resolve issues.
• Excellent communication and presentation skills with proven skill in presenting analytical data effectively to varied audiences.
• Strong interpersonal and leadership skills to influence and build credibility as a peer.
• Strong understanding of cloud technologies and relate security best practices.

Additional Information

Work Hours: Varies upon the needs of the department.

Travel Requirements: This position requires travel 5-10% of the time.

Mental/Physical Requirements: This position will be performed in an office setting.  The position will require the incumbent to sit and stand at a desk, communicate in person and by telephone, frequently operate standard office equipment, such as telephones and computers.

Visa is an EEO Employer.  Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.  Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law.

Visa will consider for employment qualified applicants with criminal histories in a manner consistent with applicable local law, including the requirements of Article 49 of the San Francisco Police Code.

U.S. APPLICANTS ONLY: The estimated salary range for a new hire into this position is 105,800.00 to 149,550.00 USD per year, which may include potential sales incentive payments (if applicable). Salary may vary depending on job-related factors which may include knowledge, skills, experience, and location. In addition, this position may be eligible for bonus and equity. Visa has a comprehensive benefits package for which this position may be eligible that includes Medical, Dental, Vision, 401 (k), FSA/HSA, Life Insurance, Paid Time Off, and Wellness Program.

Average salary estimate

$127675 / YEARLY (est.)
min
max
$105800K
$149550K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cybersecurity Analyst - SOC, Visa

Are you ready to take your cybersecurity skills to the next level? As a Cybersecurity Analyst in the SOC at Visa in Ashburn, VA, you'll be part of an elite team dedicated to safeguarding the security of one of the industry's leading payment platforms. Here, information security is more than just a task; it's woven into our corporate culture. You'll have the opportunity to leverage state-of-the-art tools to monitor, analyze, and respond to security incidents, ensuring that our defenses against evolving cyber threats remain robust and adaptive. Your day-to-day will involve monitoring security alerts using SIEM, performing thorough analyses to distinguish between threats and false alarms, and collaborating with multiple teams during high-severity incidents. Not only will you document security incidents meticulously, but your insights will also help enhance our security sensors and improve detection capabilities across the organization. Moreover, as market conditions evolve, you’ll identify trends and new technologies that could potentially affect our operational integrity. This hybrid role offers the flexibility of remote work while allowing you to be hands-on at our vibrant office in Ashburn, maintaining a work-life balance that suits you. If you possess a passion for cybersecurity and want to make a meaningful impact in a supportive and forward-thinking environment, Visa might just be your perfect fit! Join us in connecting the world with a secure, innovative payment network.

Frequently Asked Questions (FAQs) for Cybersecurity Analyst - SOC Role at Visa
What are the main responsibilities of a Cybersecurity Analyst at Visa?

As a Cybersecurity Analyst in the SOC at Visa, your primary responsibilities include monitoring Information Security alerts with SIEM, analyzing security incidents, and participating in high-severity incident response activities. You will also document incidents meticulously, engage with multiple teams for containment efforts, and contribute to enhancing security measures across the enterprise.

Join Rise to see the full answer
What qualifications are required for the Cybersecurity Analyst position at Visa?

To qualify for the Cybersecurity Analyst role at Visa, you should have at least 2 years of relevant work experience coupled with a Bachelor's degree, or 5 years of relevant experience. Preferred qualifications include over 3 years of experience in a Security Operations Center, a Bachelor's or an advanced degree, and certifications such as CISSP or CySA+.

Join Rise to see the full answer
What tools will I be using as a Cybersecurity Analyst at Visa?

In the Cybersecurity Analyst role at Visa, you’ll use advanced security tools including SIEM, malware analysis tools, and network security defenses. A solid understanding of operating systems and application vulnerabilities will be crucial, along with experience in incident response tools to effectively monitor and address security threats.

Join Rise to see the full answer
Is the Cybersecurity Analyst position at Visa full-time or shift-based?

The Cybersecurity Analyst position at Visa is predominantly shift-based. You'll be part of a global security operations center that operates 24x7, requiring adherence to a series of 12-hour shifts. This role ensures that security monitoring is continuous to address potential threats effectively.

Join Rise to see the full answer
What kind of career growth opportunities does Visa offer for Cybersecurity Analysts?

At Visa, Cybersecurity Analysts are encouraged to grow within their roles and explore career advancement opportunities. The company supports continuous learning and development, equipping analysts with the skills needed to progress into advanced cybersecurity roles, leadership positions, or specialized areas within the organization.

Join Rise to see the full answer
Common Interview Questions for Cybersecurity Analyst - SOC
What experience do you have with Security Information and Event Management (SIEM) tools?

Discuss specific SIEM tools you have worked with, explaining how you used them to monitor security alerts, analyze incidents, and improve detection capabilities. Emphasizing any automated processes you have implemented would also be beneficial.

Join Rise to see the full answer
Can you describe a high-severity incident you responded to and your role in it?

Outline the context of the incident, your immediate actions, and how you collaborated with other teams. Highlight your problem-solving and communication skills, demonstrating how you contributed to incident containment and resolution.

Join Rise to see the full answer
How do you stay updated with the latest cybersecurity trends and threats?

Mention the resources you utilize, such as cybersecurity blogs, seminars, webinars, and professional networks. Share how you apply new knowledge to improve your practices and contribute to your team's security posture.

Join Rise to see the full answer
What steps would you take to analyze a security alert that you suspect may be a true positive?

Explain your systematic approach to alert analysis – from assessing sensor telemetry and logs to documenting your findings and recommending containment measures. Highlight the importance of teamwork during the process.

Join Rise to see the full answer
Describe a time when you identified a trend or emerging threat and how you reported it.

Talk about the process you used to identify the trend, the tools or data that helped, and how you effectively communicated your findings to stakeholders to prompt action or awareness.

Join Rise to see the full answer
How do you manage stress and the pressure of responding to security incidents?

Discuss your stress management techniques, emphasizing how you maintain clarity and focus. You can refer to any frameworks or methodologies you use to ensure effective decision-making under pressure.

Join Rise to see the full answer
What is your experience with malware analysis?

Share the specific types of malware you have encountered, the tools and techniques you employed for analysis, and how it informed your incident response strategies.

Join Rise to see the full answer
Can you explain how you would differentiate between a false positive and a legitimate threat?

Describe the steps you would take to investigate alerts, including using sensor data, correlations, and context to make a well-informed determination about the threat's legitimacy.

Join Rise to see the full answer
How do you prioritize multiple security alerts that come in?

Explain your criteria for prioritization, considering factors like potential impact, urgency, and business risk, and how you communicate these decisions to your team.

Join Rise to see the full answer
What role does documentation play in incident response for you?

Emphasize the importance of thorough documentation in incident response, including detailing the incident lifecycle and learnings. Explain how this helps improve processes and prevents future incidents.

Join Rise to see the full answer

Visa Inc. operates as a payments technology company worldwide. The company facilitates commerce through the transfer of value and information among consumers, merchants, financial institutions, businesses, strategic partners, and government entiti...

2156 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, hybrid
DATE POSTED
February 7, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
C
Someone from OH, Port Clinton just viewed Data Entry Clerk at Comforce Resource
Photo of the Rise User
9 people applied to Excel Developer at Valcre
Photo of the Rise User
Someone from OH, Mason just viewed HR/Recruiting Assistant at Illumination
Photo of the Rise User
Someone from OH, Strongsville just viewed Used Car Buyer - Concord Toyota at Sonic Automotive
Photo of the Rise User
Someone from OH, Cincinnati just viewed Mid-level Creative (f/m/d) at Landor
P
Someone from OH, Kent just viewed Graphic Designer at ProjectGrowth
Photo of the Rise User
Someone from OH, Waverly just viewed Client Services Manager at Pepperstone
Photo of the Rise User
Someone from OH, Plain City just viewed Aesthetic Telehealth Nurse Practitioner (remote) at Moxie
Photo of the Rise User
Someone from OH, Columbus just viewed EdTech Product/Program Manager at Planner5D
S
Someone from OH, Lorain just viewed Test Engineer- Ninja at SharkNinja
Photo of the Rise User
40 people applied to SOC Analyst I at Epsilon
Photo of the Rise User
Someone from OH, Youngstown just viewed Channel Development Representative at Arrow Electronics
Photo of the Rise User
Someone from OH, Cincinnati just viewed Buyer at Novolex
k
Someone from OH, Columbus just viewed Patient Experience Coordinator at knownwell
Photo of the Rise User
19 people applied to Security Analyst Jr at DEUNA
Photo of the Rise User
Someone from OH, Columbus just viewed Store Manager - New Store Opening at Curaleaf
Photo of the Rise User
Someone from OH, Akron just viewed Finance Intern - Summer 2025 at Spectrum
Photo of the Rise User
Someone from OH, Norwalk just viewed Hybrid Account Manager-Commercial Lines at AssuredPartners
Photo of the Rise User
Someone from OH, Loveland just viewed Animator at Apex Systems Bellevue, WA at Apex Systems
Photo of the Rise User
Someone from OH, Canton just viewed Lead Jr. Toddler Teacher at All Around Children
Photo of the Rise User
Someone from OH, Mentor just viewed Site Merchandising Manager at Lovepop
Photo of the Rise User
Someone from OH, Batavia just viewed Restaurant Busser at Outback Steakhouse
Photo of the Rise User
Someone from OH, New Albany just viewed Customer Success Manager at Quisitive