When you join Verizon

Verizon is one of the world’s leading providers of technology and communications services, transforming the way we connect across the globe. We’re a diverse network of people driven by our shared ambition to shape a better future. Here, we have the ability to learn and grow at the speed of technology, and the space to create within every role. Together, we are moving the world forward – and you can too. Dream it. Build it. Do it here.

What you’ll be doing...

The Verizon Corporate Information Security (CIS) organization securely enables the business by protecting assets and information across Verizon networks, infrastructure and applications. CIS integrates cybersecurity governance, policies, technologies and operations across Verizon, and works to incorporate security into the design of technology systems and services.

The Threat Management Center - Threat Monitoring Team is the first line in defending Verizon's networks and information systems from misuse and attacks. The TM monitors for (24x7x365), and responds to, automated and user-reported possible cyber incidents that may impact people and information important to Verizon. The TM also has an integral role in driving forward the security intelligence and capabilities of the TMC.

  • Monitor and analyze logs and alerts from a variety of different technologies across multiple platforms in order to identify security incidents affecting the Verizon enterprise.
  • Assess the security impact of security alerts and traffic anomalies to identify malicious actions in order to escalate up to senior members of the team.
  • Leverage fundamental understanding of Operating Systems: Windows, Unix/Linux, and OSX Operating Systems in support of identifying security incidents and to have a proper overview of risk profile.
  • Execute analysis of email based threats to include understanding of email communications, platforms, headers, transactions, and identification of malicious tactics, techniques, and procedures.
  • Utilize and adhere to defined workflow and processes driving the Threat Monitoring and escalation/handoff actions.
  • Analyze potential cyber threats from a variety of intakes taking appropriate response actions to include threat containment and/or escalation.
  • Follow escalation and handoff procedures to team members and leadership based on defined threat and priority determination.
  • Utilize a variety of security tools and technologies to analyze potential threats to determine impact, scope, and recovery.
  • Leverage network security tools and capabilities to support Cyber Threat Monitoring activities.
  • Documents results of cyber threat analysis effectively and prepares comprehensive handoff and/or escalation for IR/Intelligence Function teams.
  • Process tactical mitigations based on results of analysis and determination of threat validity.
  • Support in writing technical articles for knowledge sharing within the team, when necessary.

Where you'll be working:

In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager.

What we’re looking for...

You'll need to have:

  • Associate’s degree or two or more years of work experience.
  • Three or more years of relevant work experience.
  • Shift work will be required and shift assignments will be based on business needs

Even better if you have:

  • Three or more years of Professional Security Operations Center (SOC) Work Experience, with focus on Computer Network Defense (CND). This job role is considered experienced, but still a learner with influencing responsibility on junior team members.
  • Previous experience working with SIEM technologies (i.e. Splunk).
  • Fundamentals of Mobile Platforms: Windows Phone, iOS, Android.
  • Foundational Knowledge of Enterprise Anti-Virus, IDS, Full Packet Capture and Host/Network Threat Analysis.
  • Understanding of Networking (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture.
  • Knowledge of Threat Monitoring Procedures.
  • Program and Scripting Experience.
  • Previous experience with Regex.
  • Ability to comply with any regulatory requirements.
  • Demonstrated knowledge and understanding of cyber risks and threats related to cyber attackers.
  • Strong communication and presentation skills along with the ability to work in a highly collaborative environment.
  • Strong relationship skills and collaborative style to enable success across multiple partners.
  • Manage multiple priorities in a high pressure environment.
  • Demonstrated effective organizational and technical skills.
  • Effective verbal and written communication skills.
  • Certifications: Network+, Security+, CEH, CISSP Associate, GSEC, GCED, GCIA, GNFA, or related or willingness to obtain within 12 months of hire.


Equal Employment Opportunity

We're proud to be an equal opportunity employer - and celebrate our employees' differences, including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. At Verizon, we know that diversity makes us stronger. We are committed to a collaborative, inclusive environment that encourages authenticity and fosters a sense of belonging. We strive for everyone to feel valued, connected, and empowered to reach their potential and contribute their best. Check out our diversity and inclusion page to learn more.

COVID-19 Vaccination Requirement

Verizon requires new hires to be fully vaccinated against COVID-19. Verizon provides reasonable accommodations consistent with legal requirements (e.g., for medical or religious reasons).