At Currencycloud, you can work from home, or visit our lush offices in London, Cardiff or Amsterdam. You'll need to be based in either the UK or Netherlands for this role, and have the necessary work permissions.
About the role
Currencycloud was acquired by Visa in December 2021. Our Senior Java Engineers are responsible for implementing an industry-leading API that has already processed over USD50 billion of cross-border transactions for over 5 million end users, and is available to our clients 24x7. But we are not stopping there, and our engineers are at the forefront of taking us forward to meet the demands of even greater scale.
We have moved wholesale to AWS where our system runs as a set of distributed applications. We are currently in the process of migrating those applications over to Kubernetes and Jenkins-X as we further embrace a microservice-led event-driven architecture.
We are also utilising Kafka for our event streaming.
What you will get to do:
As a Senior Java Engineer you will play a key role within your cross functional team, taking responsibility for your services and the technology within them.
These roles fit in to squads who are building out brand new parts to our payments platform, focusing on high availability, cloud native, microservice concepts
You will get to work as the Senior Engineer in your squad, leading on discussions around technical direction and systems design, as well as mentoring more junior members of the team
You'll get:
This is a remote position. A remote position does not require job duties be performed within proximity of a Visa office location. Remote positions may be required to be present at a Visa office with scheduled notice.
Basic Qualifications
Preferred Qualifications
See more jobs at Visa
Overview:
Currencycloud was acquired by Visa in December 2021 and forms part of Visa Cross Border Solutions (VXBS). At Currencycloud, you can work from home, or visit our offices in London, Cardiff or Amsterdam. You'll need to be based in either the UK or Netherlands for this role, and have the necessary work permissions.
Information security is an integral part of Visa's corporate culture. It is essential to maintaining our position as an industry leader in electronic payments, which is why Visa has made it a priority to create top-tier security operations and incident response teams to defend the company against evolving cyber threats. If you would like to join a company where security is truly valued, where you can work with like-minded peers who are passionate about the art & science of cyber defense then we have a home for you.
The successful candidate will be an industry-level Senior SOC Analyst with a continued specialism in Cloud, having worked in a highly regulated environment and experience of analysis with multiple monitoring tools and query languages. The team you will join is part of a larger Security Team and Organization located across multiple geographical sites that are responsible for the comprehensive cyber defense of Visa and its subsidiaries.
Responsibilities:
Monitor Information Security alerts using Security Information and Event Management (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts.
Utilize sensor telemetry data and correlated logs to establish context of an alert and rule out false positives.
Perform analysis of security alerts to evaluate true positive malicious risks to the business, determine containment action, and identify required preventative measures, documenting your findings throughout within the Incident Management System.
Document Tuning and Detection Opportunities, turning them into operational alerting.
Mitigate and contain identified threats using approved incident response methodologies.
Provide subject matter expertise as an escalation point for security incidents to ensure proper assessment, containment and mitigation is taken. Collaborate with operational support teams to ensure they are actively engaged in addressing security threats and impact to the business.
Be a technical lead contributor to high-severity incident response efforts which involve multiple teams to reach prompt containment, primarily aiding in incident analysis and reporting.
Provide peer support to improve the technical capabilities of fellow SOC Analysts.
Perform threat hunting using defined procedures and alert trend analysis to find inconspicuous threats. Identify trends, potential new technologies, and emerging threats which may impact the business.
Operationalize actionable Threat Intelligence reports from internal and external sources.
Assist with the security monitoring enrollment process to ensure adequate coverage and effectiveness of all new and existing cloud and on-premise based applications, services and platforms.
SIEM Operations: comprehensively test and refine SIEM, experience with Sumologic, Datadog and similar tooling
Work in collaboration with teams within Cybersecurity to identify detection and response gaps to improve.
Develop and review Incident Response Playbooks, SOPs and Alert Runbooks, to streamline the incident response efforts.
Work with colleagues in other technology departments as well as the business and product offices to establish effective, productive business relationships.
Participation in an OOH On-Call Rota, 1 week in a team of 4.
Basic Qualifications:
• 2+ years of relevant work experience and a Bachelors degree, OR 5+ years of relevant work experience
Preferred Qualifications
• 3 or more years of work experience with a Bachelor’s Degree or more than 2 years of work experience with an Advanced Degree (e.g. Masters, MBA, JD, MD)
• 7+ years of related experience in Cybersecurity incident response, investigation or computer network defence functions.
• Demonstrated professional competency in Cloud Environments
• Bachelor's degree in computer science, information systems, or a related technical discipline or equivalent professional experience directly related to information security, cybersecurity, or computer network defence
• Relevant Security related certifications a plus: CYSA+, GCIA, GCIH, GCED, OSCP
• Relevant Cloud Certifications a plus: AWS Certified Security - Speciality
• Demonstrated experience in investigating cyber security incidents in enterprise-level security operations centres, fusion centres or Cyber Security team.
• Proven subject matter expertise in incident response and detection engineering.
• Solid understanding of TCP/IP protocol and internetworking technology including packet analysis, routing and switching.
• Strong technical knowledge of Cloud networking, infrastructure services and common applications.
• Strong knowledge of software security including web applications security.
• Strong Scripting skills (Python, Perl).
• Strong working knowledge in malware analysis.
• Strong knowledge in digital and network forensics investigation.
• Working knowledge of multiple security tools such as SIEM, AV, WAF, IDS, Netflow, Packet Analyzer and Endpoint Detection & Response tools.
• Excellent problem-solving skills, with tenacity and resilience to resolve issues.
• Strong interpersonal and leadership skills.
• Excellent communication, both verbal and written, with strong data presentation skills for varied audiences (including executive)
See more jobs at Visa