The Latest in IT Security

Sr. Business Leader, Cyber Threat Monitoring Leader

08
Dec
2011

Sr. Business Leader, Cyber Threat Monitoring Leader

Posted: 7 December 2011
Company name: Visa
Location: Foster City or Ashburn, Virginia.
United States
Travel: occasionally
Poster represents: employer
Terms of employment: Salaried employee
Hours: full time
Onsite: yes

Description:
Visa Inc. is a global payments technology company that connects consumers, businesses, financial institutions and governments in more than 200 countries and territories, enabling them to use digital currency instead of cash and checks.

Join a growing, fast-paced and high-performance Cyber Security team. Information security is an integral part of Visa’s corporate culture. It is essential to maintaining our position as an industry leader in electronic payments, and it is the responsibility of each and every employee to safeguard information, protect it from unauthorized access, and ensure regulatory compliance. Information security has a significant effect on privacy, consumer confidence, external reputation, and/or the bottom line, and it is a priority on everyone’s agenda.

The ideal candidate for this SBL, Cyber Threat Monitoring position will be an experienced professional who will be responsible for generating from security threat monitoring tools authoritative intelligence assessments that define cyber threats to networked global information networks including mobile platforms. This position reports directly to Visa’s Cyber Security Leader and will be based in Foster City, California or Ashburn, Virginia.

Responsibilities:

The candidate will:

. Should have strong technical security skills with hands-on experience. Candidate should have a strong understanding of increasingly sophisticated cyber attacks, hacking techniques and associated defensive techniques

. Be familiar with a multitude of security threat monitoring tools that identifies data breaches and network compromises using externally generated threat intel feeds together with internal data sources (SEIM, netflow, malware analysis, etc.) identify compromised systems within a network.

. Informed and can provide subject matter expertise regarding recent hacks / exploits – especially against web applications, databases and common desktop tools. Maintain, develop, and continually evaluate cyber intelligence sources (technical & non-technical) to increase effectiveness and timeliness of reporting threat information.

. Develop strong collaborative relationships with members of the Intelligence Community and payment card supply chain subject matter experts.

Work closely with internal groups, as well as peer groups with the ability to communicate effectively at all levels of the enterprise in order to successfully execute incident response operations. Ability to effectively identify, evaluate and communicate new and ongoing security threats to senior management

Be responsible for providing strategic leadership to an organization that gathers and assesses cyber threat intelligence, develops applicable cyber threat models, responds to information security incidents and performs forensics investigations

Direct operations toward a more proactive state, thus resulting in advanced warning of cyber attack, enhanced understanding of adversary tactics, techniques and procedures to facilitate proactive threat discovery and mitigation

Heavily influence the global Information Security strategy based on proactive recommendations of cyber threat mitigation initiatives

Contribute in executive leadership briefings on emerging threat models, potential impacts and associated mitigation strategies

Participate in the identification of cyber security risks across the enterprise; develop and implement essential information security management practices where appropriate

Development of investigative plans, gathering and evaluation of facts, conducting interviews and writing of reports

Develop, strengthen and enhance the capabilities of the cyber security organization with a focus on the career development of a progressive and highly specialized team

. Establish credibility throughout the organization by earning the reputation for being a proactive senior leader and change agent

Effectively manage cross-functional internal and external team collaboration, and communications.

Respond to and assist with due diligence and internal / external audit requests

Represent Visa in information security and cyber security communities globally.


Required skills:
Bachelors Degree in Computer Science (or related field) or equivalent work experience

8 to 10 years of experience in Information Security, with at the least 4 or more years directly related to Cybersecurity operations with a concentrated focus on Security Monitoring using SEIM, IDS/IPS, Malware Analysis tools, etc..

Proven ability to address advanced threats targeting large enterprises and the tools, tactics, and procedures used by those threats. Experience conducting risk or vulnerability assessments

Demonstrated ability to establish well-defined procedures and appropriate network mitigations strategies derived from post incident analysis and lessons learned.

Excellent communication and presentation skills with demonstrated skill in presenting analytical data effectively to varied audiences.

Ability to lead a team working non-standard hours, share on-call responsibilities and travel when required.

Strong organization and process management skills; ability to lead and manage high performing teams; ability to manage with influence in a highly matrix environment

Experience and familiarity working across the global cyber security community

Demonstrated expertise and experience with advanced and 0-day threats, intrusions, malware infection, cyber theft, denial of service, forensics

High degree of technical complexity and conversancy; familiarity with complex global information security infrastructures preferred

Certifications in CISSP, CRISC, CISM, CEH highly desirable

Excellent writing and verbal communication skills, interpersonal and presentation skills and the proven ability to influence and communicate effectively.

URL for more information:
http://bit.ly/cyberthreat113882

Contact information:
[email protected]

Leave a reply


Categories

THURSDAY, NOVEMBER 07, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments