What are the responsibilities and job description for the Associate Cybersecurity Analyst- local candidates only position at Visa?
The Applied Cryptography team supports Visa’s encryption solution across the Visa landscape. The Team is responsible for Data at rest solutions, Internal and external digital certificate and PKI systems management, symmetric key management for Visa services and clients. The team has ownership and management of all Visa Hardware security modules, across global Data Centers and supports various other encryption solutions and requirements of Visa and Visa services.
As a member of the Applied Cryptography security team, an Associate Cyber Security Analyst will assist in planning, documenting, coordinating, and implementing recommended Data Protection, symmetric key management and Public Key Infrastructure (PKI) tasks.
Responsibilities:
- Assist and develop expertise over the acceptable use and issuance of deployed Data Protection Solutions, PKI certificates and key management practices.
- Assist and develop expertise in Key Management fundamentals and apply that knowledge to host security modules and Key Management procedures.
- Working with the team to identify, review and implement any new or required safeguards for deployed Data Protection Solutions, PKI, and banking symmetric key generation systems as specified by Industry requirements and compliance guidelines.
- Support the team to help analyze risk assessments and recommend acceptable use of encryption technology and security measures.
- Support the team to help analyze evaluate the encryption methods and algorithms for data transmissions and data at rest to protect confidential information.
- Candidate must maintain and follow accurate and up-to-date procedure documentation within well-established policies and guidelines.
- Support the team with Data Protection, symmetric key and PKI task, conducted to industry complaint standards.
- Support the team in maintaining enterprise secrets management capabilities to ensure secure storage, access, and proper lifecycle management of sensitive credentials.
- Think out of the box to improve operational efficiency using AI /log analytics/automated failure recover.
This is a hybrid position. Expectation of days in office will be confirmed by your hiring manager.