Job Type
Job Details
Visa's Red Team pro-actively identifies weaknesses in Visa's security posture and recommends necessary controls and procedures to cost-effectively protect Visa services from intentional or inadvertent modification, disclosure or destruction. With this mission in mind, Visa's internal Red Team experts are engaged in covert operations that simulate adversarial threats and attacks in a timely manner. This is accomplished by performing internal and external ethical hacks of Visa applications and systems. Red members also help with design, development, and recommendation of security solutions to protect Visa proprietary/confidential data and systems. Assist with compliance objectives, provide guidance and direction for the logical protection of information systems assets to other functional units. Prepare reports regarding effectiveness of information security adherence and make recommendations for the adoption of new policies and procedures for Visa services.
As a member of Visa's Red team, provide technical expertise required to carry out internal and external ethical hacking exercises. Coordinate with other departments and teams to evolve information security alignment with company goals and objectives. Contribute and participate in all stages of a Red Team exercise including planning, reconnaissance, exploitation, post-exploitation, clean up, and remediation. Champion security research activities and teamwork required to carry out successful Red Team operations. Create and provide presentations to executive management highlighting outcomes of Red Team exercise and recommendations and timelines for remediation.
Essential Functions
Conduct high risk and sensitive ethical hacks of internally and externally hosted applications globally according to scope defined by Red Team.
Co-ordinate and execute system/network level advanced Red Team and ethical hacking exercises.
Work special/off-hours (late nights, weekends etc.) as deemed necessary for the successful and covert execution of Red Team exercises (emulating adversaries).
Design and develop scripts, frameworks, and tools required for facilitating and executing complex undetectable attacks.
Reviews results of network and application ethical hacks to determine severity of findings and to ensure proper remedies are applied.
Performs penetration and remediation testing and reporting through the application of expert ethical hacking and penetration techniques in a fast-paced, highly technical environment. Identify network and system vulnerabilities and provide recommended counter measures or mitigating controls to reduce risk to an acceptable and manageable level.
Provide accurate and timely reporting of findings and proposed remediation and mitigations.
Coordinate Red team operational briefings and presentations to non-technical audience and executive management, as required.
Provide technical support to Business Leader in identifying and streamlining new/existing protocols and tools used by the Red Team.
Technical support could include, but not limited to the following: (1) Audit support & remediation, (2) Process Improvement, (3) Analysis & Reporting, (4) Cross Divisional Functional education, training and awareness, (5) Function/Methodology/Strategy advancement.
Define and develop agenda for training and educating security professionals on advanced exploits, tools, and frameworks
Perform research of emerging technologies and design frameworks and capabilities required to perform Red Team exercises of new technologies adopted by Visa.
Requires comprehensive knowledge and mastery in assigned areas applying skills and competencies in challenging and complex situations.
Recognized expert in the company. Only a few positions require such extensive knowledge and skill.
Complete mastery of at least one technology domain and solid working knowledge of at least one other. For example, web applications, system exploitation, network-based attacks, payload development, reverse engineering, Mobile security, etc.
May be involved in design phases of projects. May have professional certifications or affiliations.
Able to work at an intermediate level when executing and improving work processes to ensure achievement of business goals.
This is a hybrid position. Expectation of days in office will be confirmed by your hiring manager.
Qualifications
Basic Qualifications:
-5+ years of relevant work experience with a Bachelor’s Degree or at least 2
years of work experience with an Advanced degree (e.g. Masters, MBA, JD,
MD) or 0 years of work experience with a PhD, OR 8+ years of relevant work
experience.
Preferred Qualifications:
-6 or more years of work experience with a Bachelor’s Degree or 4 or more years
of relevant experience with an Advanced Degree (e.g. Masters, MBA, JD, MD)
or up to 3 years of relevant experience with a PhD
-University Recruiting: MBA/ PhD without experience
-Expertise performing advanced exploitation and post-exploitation attacks as
part of ethical hacking exercises.
-Prior experience or expertise performing Red Team exercises.
-Experience in writing proof-of-concept exploits and creating custom payloads
and modules for common ethical hacking frameworks and tools.
-Well versed in system exploits (e.g. Buffer Overflows, PTH attacks, windows
authentication framework etc.), custom payload development, or web
application exploitation.
-Well versed with security tools & frameworks like Metasploit, Cobalt Strike,
Mythic, etc.
-Extensive understanding of cryptographic concepts and applied cryptography.
-Proficiency in one or more scripting language. E.g. Perl, Python, Shell Scripting
etc.
-Prior experience with exploit development or writing system modules in C &
C++, a major advantage. Knowledge of high-level programming languages a
bonus.
-Prior experience with reverse engineering, malware analysis, and forensic tools
will be an added advantage.
-Experience leveraging AI to improve Red Team capabilities during exercises.
-Good interpersonal, facilitation, and demonstrated emerging leadership skills.
-Able to operate at an advanced level of written and spoken communication.
Write and speak effectively with impact.
-Good understanding of Ethernet, switched LAN and WAN environment and
detailed understanding of layer 3 and layer 4 specifications, including IP, TCP,
TCP/IP routing protocols and management of ACLs.
-Knowledge of logical / physical access control methods, connections
alternatives using private, public and wireless solutions, Network/Host
Intrusion Detection Engines, Vulnerability Management Tools, Patch
Management Tools, Penetration Testing Tools, Anti-Virus/Anti-Spyware
solutions.
-Conducts complex analytical functions by performing security assessments
and ethical hacks of high-risk sensitive applications.
Additional Information
Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law.