What you’ll be doing...

You will be responsible for the design and implementation of product security end-to-end architectures, systems, configurations, controls, policies, and processes to ensure that Verizon’s products are best protected against sophisticated cyber security threats and meet all internal security policies and governance in order to protect our network and Verizon customers. You will work directly with Verizon’s product development teams, vendors, industry partners, planning, engineering, and peer security teams to ensure that all development, systems, and applications contain and implement the best possible security using the most efficient and effective security attestation processes. Working with Verizon’s teams, you will develop and document requirements that specify the criteria to meet the cyber security standards for each product type or service, system, and/or application. You will also be required to interface externally with our partnering vendors on their security reviews of their products implemented in Verizon. Ensuring we are positioning and designing the security compliance of all our projects at the forefront of current development process.

  • Developing and implementing applicable policy standards for the practical application of cyber security requirements and ensuring they are implemented consistently.
  • Working with Verizon’s teams, you will develop and document requirements that specify the criteria to meet the cyber security standards for each product type or service, system, and/or application.
  • Understanding the best security practices and to bringing that knowledge during the planning, engineering and development stages of our projects.
  • Interpreting and documenting the results of implementing the security standards on an ongoing basis.
  • Designing and developing new process or methodologies to enhance security and streamline new or existing workflows.
  • Participating in security requirement review meetings to analyze areas of security concerns, functioning as lead for the project during security assessment and development.
  • Leading team participation in code reviews, development (CI/CD pipeline), code scans, penetration testing and production releases for verification, support and resolution of any anomalies related to security requirements.
  • Producing documented frameworks or architectures.
  • Developing, create, and drive current and new data collection and reporting methods to ensure that the proper data is being captured and retained by these processes in compliance with corporate standards and in support of both internal and external audits.

What we’re looking for...

You’ll need to have:

  • Bachelor's degree in computer science/engineering or four or more years of work experience.
  • Six or more years of relevant work experience.
  • Four or more years of product development, and/or security in the software development lifecycle.

Even better if you have:

  • Ten or more years of experience and background in security, telecommunications with work history over the last five to seven years in a product development or developer.
  • Strong knowledge of mobile application security standards and their implementation in compliance to corporate security policies.
  • Knowledge of security best practices with prior responsibilities of protecting information assets.
  • Ability to translate security requirements implementation into formal written procedures.
  • Strong knowledge of OSI Layer 7 Model, Network Architecture and Network Topology.
  • Experience working with API’s, SDK and APK’s.
  • Experience with both virtual and containerized computing environments (Docker).
  • Experience with Cloud Security (AWS, GCS, Azure).
  • Experience with Cloud Infrastructure security industry best practices (Cloud Alliance Forum).
  • Experience with Shell, Expect, Perl, Python and JavaScript.
  • Experience in integrating security requirements with identity stores, relational databases, application servers and physical access management systems, encryption, network perimeter – defense in depth.
  • Experience as a project lead, able to drive to completion and maintain schedules.
  • Excellent documentation and organization skills.
  • Ability to multi-task, take direction, prioritize, and manage multiple activities / tasks to achieve objectives.
  • Excellent oral, written, and interpersonal skills. Ability to present and communicate to both superiors and peers.
  • Experience building, updating, and maintaining technical training documentation.
  • Extensive experience analyzing security components of targeted system to identify weaknesses and develop opportunities for improvement (evaluation process).
  • Willingness to Travel.

When you join Verizon...

You’ll have the power to go beyond – doing the work that’s transforming how people, businesses and things connect with each other. Not only do we provide the fastest and most reliable network for our customers, but we were first to 5G - a quantum leap in connectivity. Our connected solutions are making communities stronger and enabling energy efficiency. Here, you’ll have the ability to make an impact and create positive change. Whether you think in code, words, pictures or numbers, join our team of the best and brightest. We offer great pay, amazing benefits and opportunity to learn and grow in every role. Together we’ll go far.

Equal Employment Opportunity

We're proud to be an equal opportunity employer - and celebrate our employees' differences, including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. Different makes us better.