When you join Verizon

Verizon is a leading provider of technology, communications, information and entertainment products, transforming the way we connect across the globe. We’re a diverse network of people driven by our ambition and united in our shared purpose to shape a better future. Here, we have the ability to learn and grow at the speed of technology, and the space to create within every role. Together, we are moving the world forward – and you can too. Dream it. Build it. Do it here.

What you’ll be doing...

The Verizon Corporate Information Security (CIS) organization securely enables the business by protecting assets and information across Verizon networks, infrastructure and applications. CIS integrates cybersecurity governance, policies, technologies and operations across Verizon, and works to incorporate security into the design of technology systems and services.
The cybersecurity Governance, Risk and Compliance (GRC) organization is tasked with improving the security risk posture of information assets through effective contextual risk management, dynamic compliance management and driving improvements through effective end-to-end lifecycle management of policies and standards, as well as automation and effective management of key security controls. Through solid governance and a continuous compliance management capability, Cyber Security GRC helps the business and operational delivery teams drive risk-based, outcome-driven decisions and priorities across their portfolios and delivery solutions. The Audit Lifecycle Management team within Verizon Corporate Information Security (CIS) organization plays a pivotal role in driving and supporting Verizon’s adherence to external regulations & internal controls from a cybersecurity perspective. In addition to this, the team is a focal point in interfacing with internal and external security audit engagements & requests.

  • Help digitally transform various controls (for SOX, PCI, etc.) using automation and analytics strategies as opposed to manual control performance/ evidence gathering techniques.
  • Develop, deploy, document and maintain the above mentioned automation scripts, strategies, RPA etc. to ensure smooth audit support operations.
  • Help drive the creation of an audit evidence repository to manage and build a library of re-usable audit evidence that can potentially be leveraged across audits, risk assessments and other cyber focused use cases.
  • Manage technical and administrative aspects of the selected audit platform (i.e MetricStream) to support the goal of building an audit evidence repository and other audit support needs.
  • Manage and troubleshoot existing technical scripts and processes being used within the Audit Lifecycle Management team for various processes and build new ones to support future transformation and requirements.
  • Develop strong & successful interpersonal relationships with partners and stakeholders within and across the business (i.e. CIS, GTS, SOX PMO, Finance, etc.) to execute digital transformation goals.
  • Take on all tasks and challenges with professionalism, patience, and a “people-first” attitude.

What we’re looking for...

You’ll need to have:

  • Bachelor’s degree in Computer Science, Information Security, Cyber Security, Risk Management, Applied Mathematics, Engineering, Information Technology or other related fields or four or more years of work experience.
  • Four or more years of relevant work experience.
  • Experience in automation, data analysis and scripting.
  • Experience with tools such as UiPath, Google Scripts, SQL, AYS, MetricStream, Python, R, SQL, SailPoint.
  • Willingness to learn and implement new technologies and concepts.

Even better if you have one or more of the following:

  • Strong analytical skills.
  • Ability to wear ‘multiple hats’, deal with ambiguity and have a problem solving mentality.
  • Written, verbal and presentation communication skills and the ability to thrive in a dynamic environment handling multiple priorities.
  • Relationship skills and collaborative style to enable success across multiple partners.
  • Documentation, planning, negotiation, work prioritization and organizational skills.
  • Knowledge of audit, compliance, cyber security risk management concepts, cyber security frameworks, secure coding principles, and security technologies.
  • Willingness to travel as necessary.