Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailVisas Red Team pro-actively identifies weaknesses in Visas security posture and recommends necessary controls and procedures to cost-effectively protect Visa services from intentional or inadvertent modification disclosure or destruction. With this mission in mind Visas internal Red Team experts are engaged in covert operations that simulate adversarial threats and attacks in a timely manner. This is accomplished by performing internal and external ethical hacks of Visa applications and systems. Red members also help with design development and recommendation of security solutions to protect Visa proprietary/confidential data and systems. Assist with compliance objectives provide guidance and direction for the logical protection of information systems assets to other functional units. Prepare reports regarding effectiveness of information security adherence and make recommendations for the adoption of new policies and procedures for Visa services.
As a member of Visas Red team provide technical expertise required to carry out internal and external ethical hacking exercises. Coordinate with other departments and teams to evolve information security alignment with company goals and objectives. Contribute and participate in all stages of a Red Team exercise including planning reconnaissance exploitation post-exploitation clean up and remediation. Champion security research activities and teamwork required to carry out successful Red Team operations. Create and provide presentations to executive management highlighting outcomes of Red Team exercise and recommendations and timelines for remediation.
Essential Functions
Conduct high risk and sensitive ethical hacks of internally and externally hosted applications globally according to scope defined by Red Team.
Co-ordinate and execute system/network level advanced Red Team and ethical hacking exercises.
Work special/off-hours (late nights weekends etc.) as deemed necessary for the successful and covert execution of Red Team exercises (emulating adversaries).
Design and develop scripts frameworks and tools required for facilitating and executing complex undetectable attacks.
Reviews results of network and application ethical hacks to determine severity of findings and to ensure proper remedies are applied.
Performs penetration and remediation testing and reporting through the application of expert ethical hacking and penetration techniques in a fast-paced highly technical environment. Identify network and system vulnerabilities and provide recommended counter measures or mitigating controls to reduce risk to an acceptable and manageable level.
Provide accurate and timely reporting of findings and proposed remediation and mitigations.
Coordinate Red team operational briefings and presentations to non-technical audience and executive management as required.
Provide technical support to Business Leader in identifying and streamlining new/existing protocols and tools used by the Red Team.
Technical support could include but not limited to the following: (1) Audit support & remediation (2) Process Improvement (3) Analysis & Reporting (4) Cross Divisional Functional education training and awareness (5) Function/Methodology/Strategy advancement.
Define and develop agenda for training and educating security professionals on advanced exploits tools and frameworks
Perform research of emerging technologies and design frameworks and capabilities required to perform Red Team exercises of new technologies adopted by Visa.
Requires comprehensive knowledge and mastery in assigned areas applying skills and competencies in challenging and complex situations.
Recognized expert in the company. Only a few positions require such extensive knowledge and skill.
Complete mastery of at least one technology domain and solid working knowledge of at least one other. For example web applications system exploitation network-based attacks payload development reverse engineering Mobile security etc.
May be involved in design phases of projects. May have professional certifications or affiliations.
Able to work at an intermediate level when executing and improving work processes to ensure achievement of business goals.
This is a hybrid position. Expectation of days in office will be confirmed by your hiring manager.
Qualifications :
Basic Qualifications:
-5 years of relevant work experience with a Bachelors Degree or at least 2
years of work experience with an Advanced degree (e.g. Masters MBA JD
MD) or 0 years of work experience with a PhD OR 8 years of relevant work
experience.
Preferred Qualifications:
-6 or more years of work experience with a Bachelors Degree or 4 or more years
of relevant experience with an Advanced Degree (e.g. Masters MBA JD MD)
or up to 3 years of relevant experience with a PhD
-University Recruiting: MBA/ PhD without experience
-Expertise performing advanced exploitation and post-exploitation attacks as
part of ethical hacking exercises.
-Prior experience or expertise performing Red Team exercises.
-Experience in writing proof-of-concept exploits and creating custom payloads
and modules for common ethical hacking frameworks and tools.
-Well versed in system exploits (e.g. Buffer Overflows PTH attacks windows
authentication framework etc.) custom payload development or web
application exploitation.
-Well versed with security tools & frameworks like Metasploit Cobalt Strike
Mythic etc.
-Extensive understanding of cryptographic concepts and applied cryptography.
-Proficiency in one or more scripting language. E.g. Perl Python Shell Scripting
etc.
-Prior experience with exploit development or writing system modules in C &
C a major advantage. Knowledge of high-level programming languages a
bonus.
-Prior experience with reverse engineering malware analysis and forensic tools
will be an added advantage.
-Experience leveraging AI to improve Red Team capabilities during exercises.
-Good interpersonal facilitation and demonstrated emerging leadership skills.
-Able to operate at an advanced level of written and spoken communication.
Write and speak effectively with impact.
-Good understanding of Ethernet switched LAN and WAN environment and
detailed understanding of layer 3 and layer 4 specifications including IP TCP
TCP/IP routing protocols and management of ACLs.
-Knowledge of logical / physical access control methods connections
alternatives using private public and wireless solutions Network/Host
Intrusion Detection Engines Vulnerability Management Tools Patch
Management Tools Penetration Testing Tools Anti-Virus/Anti-Spyware
solutions.
-Conducts complex analytical functions by performing security assessments
and ethical hacks of high-risk sensitive applications.
Additional Information :
Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race color religion sex national origin sexual orientation gender identity disability or protected veteran status. Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law.
Remote Work :
No
Employment Type :
Full-time
Full-time