What you’ll be doing...

The position will be part of the IT Information Security Office (ISO) supporting the Verizon Wireless Business Unit. The Verizon Wireless Security Risk team is focused on improving the security risk posture through engagement in IT and business initiatives impacting the Verizon Wireless IT network, information assets and business operations.

This position will identify information security risks associated with the implementation plans of IT initiatives and provide security consultation, direction and guidance that meet the security policy requirements, security standards and best practices, and government and industry regulations. The team works with IT application leaders, business owners and 3rd Party business partners to ensure the security requirements are fulfilled and risks are reduced. When risk acceptance is requested the team works with Security leadership and business stakeholders to gain risk acceptance on information security risk matters. Additionally the team informs and educates the application, technical and business teams on security policies, risks and threats to the organization.

  • This role will provide focused risk analysis support across theVerizon Wireless Business Unitproviding process guidance and risk assessment.
  • Act as a stakeholder representing Information Security in functional and technical requirements and design sessions via the agile and traditional software development methodologies.
  • Assign a preliminary risk profile by identifying the information security risk factors based on data classification, design, and functional purpose and use.
  • Specific attention to the following control areas is required: authentication, authorization, access controls (network and user), secure transmission and storage, encryption/key management, segmentation and network zoning, data flows, third party access and connectivity and functional purpose.
  • Work with architecture, design, and development teams to understand enterprise solutions and impacts on security controls.
  • Collaborate and build relationships with core business partners in IT for continued security education and awareness.
  • Complete detailed risk assessments and provide risk reduction recommendations and security requirements and guidance to IT and business teams supporting the initiatives.
  • Provide security requirements during planning sessions, functional and technical requirement sessions, user story creation and grooming, and technical design based on identified risks.
  • Determine if any compensating controls are necessary due to inability to comply with the primary control requirements. Facilitate and help design compensating controls when needed.
  • Ensure requirements and design include approved strategic security technologies.
  • Complete and present to Security management and business sponsors a risk assessment evaluation articulating risk and impact analysis when security controls cannot be met by an initiative to ensure transparency and appropriate level of acceptance.
  • Broker meetings as needed between project team members and specialized security experts when additional details are required or circumstances are unique or private (under special NDA).
  • Participate in weekly meetings with management and security team peers to provide project updates and risk overviews.

What we’re looking for...

You'll need to have:

  • Bachelor’s degree or four or more years of work experience.
  • Four or more years of relevant work experience (e.g. Information Security, Software Development/Technical Support)

Even Better if you have:

  • 3-5+ years IT or related experience.
  • Experience in an Information Security, Software Development/Technical Support, or IT Security Risk related position.
  • IT or related experience.
  • One or more of the following professional certifications: CISA (Certified Information Security Auditor), CISM(Certified Information Security Manager), CRISC (Certified in Risk and Information Systems Controls), GSEC (General Security Essentials Certification), or equivalent, or willingness to obtain within 6 months.
  • A thorough understanding of all stages of the SDLC process, from coding and code promotion through all levels of testing as well as management of multiple non-production environments.
  • A solid understanding of networking technologies and portals.
  • A base knowledge of databases and operating systems.
  • Knowledge of data security fundamentals and best practices with prior responsibilities of protecting information assets.
  • A demonstrated ability to coordinate and lead productive working sessions with resources from multiple application and technology teams across the enterprise.
  • Ability to effectively communicate with Legal department attorneys and other supporting business groups such as Compliance and Finance.
  • Excellent written and verbal communication skills. The ability to work effectively with multiple corporate cultures.
  • Familiarity with IT Governance practices and processes, and solid business acumen.
  • Prior experience producing reference documentation for technical or business reference.
  • Excellent documentation and organization skills.

When you join Verizon...

You’ll be doing work that matters alongside other talented people, transforming the way people, businesses and things connect with each other. Beyond powering America’s fastest and most reliable network, we’re leading the way in broadband, cloud and security solutions, Internet of Things and innovating in areas such as, video entertainment. Of course, we will offer you great pay and benefits, but we’re about more than that. Verizon is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Verizon.

Equal Employment Opportunity

We're proud to be an equal opportunity employer- and celebrate our employees' differences,including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. Different makes us better.