What you’ll be doing...

You will be a member of the Information Security team who collaborates with a number of project and IT organizations across the Verizon family. You will partner with Merger & Acquisition (M&A) teams reviewing applications, infrastructure, process, and practices currently in use by the organization being on-boarded. You will also work with existing IT infrastructure and development teams within Verizon to implement sound practices across multiple security domains.

  • Being an integral part of the Verizon M&A team conducting security design reviews on existing applications and technologies in use by on-boarding organizations, and offering plans for remediation, recommendations, and technical compensating controls.
  • Reviewing IaaS, PaaS, and SaaS offerings in use by partner organizations and driving alignment with existing Verizon IT security and privacy policies.
  • Working with internal and external stakeholders to design compensating controls and/or product feature enhancements.
  • Designing, recommending, and implementing information security controls and policies for IT and Cloud environments - CASB management, proxy server management, firewall management, data protection (DLP, encryption), user account management (SSO, SAML), and encryption key management.
  • Guiding project teams with the right encryption standards for Web services, APs, SSO, etc.
  • Providing security best practices for data systems in AWS, Oracle, Azure, and GCP ensuring integrity and confidentiality of sensitive data.
  • Working with enterprise architects and developers to design optimal security practices to incorporate into new functionality.
  • Mitigating security risks associated with projects that have a high technical complexity or involve significant challenges to the business.
  • Communicating technical security concepts to other IT audiences including developers, architects, and leadership.
  • Ensuring new infrastructure and system builds include appropriate security packages, tools, logging, and monitoring applications.
  • Providing detailed risk and remediation guidelines to M&A teams and other IT project stakeholders.
  • Supporting governance, risk management, and compliance activities.

What we’re looking for...

You'll need to have:

  • Bachelor's degree or four or more years of work experience.
  • Six or more years of relevant work experience.
  • Information security certification, such as CISSP, GIAC, CISA, or related.
  • Information security experience.

Even better if you have:

  • BA/BS degree - preferably in Computer Science, Information Systems, Cyber Security, or Information Technology.
  • Six or more years of information security experience.
  • Five or more years of technical, hands-on experience in one of the technologies below:
    • Enterprise network technologies including enterprise level proxy/firewall implementation
    • IAM or directory services technologies
  • Two or more years of experience in one of the areas below:
    • Systems engineering roles supporting public or private clouds
    • AWS, Azure, or GCP deployments or services (IaaS, PaaS, Orchestration, Automation)
  • Familiarity with network architecture and topologies.
  • Demonstrated track record of success in helping enterprise customers deploy important workloads to the cloud in a secure and compliant manner.
  • Familiarity with APIs, web services (RESTful and SOAP), and service oriented architecture (SOA).
  • Exceptional verbal and written communications skills.
  • Desire to work in a highly dynamic, rapidly changing environment.
  • Experience advising customers on architectures meeting industry standards such as PCI DSS, ISO 27001, HIPAA, and NIST/DoD frameworks.
  • Demonstrated effectiveness working across multiple business units to achieve results.
  • Expert understanding of a wide range of IT system components including architecture, authentication, connectivity, system hardware and software components, virtualization, cloud computing, and mobile.
  • Ability to understand and suggest changes to system design choices in light of corporate security policy considerations and industry best security practices.
  • Expert understanding of IT process modeling to determine risk to corporate systems.
  • Ability to suggest appropriate controls based on corporate tolerance for risk.

When you join Verizon...

You’ll be doing work that matters alongside other talented people, transforming the way people, businesses and things connect with each other. Beyond powering America’s fastest and most reliable network, we’re leading the way in broadband, cloud and security solutions, Internet of Things and innovating in areas such as, video entertainment. Of course, we will offer you great pay and benefits, but we’re about more than that. Verizon is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Verizon.

Equal Employment Opportunity

We're proud to be an equal opportunity employer- and celebrate our employees' differences,including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. Different makes us better.