Incident Response Senior Specialist, Associated Vice President job opportunity at MUFG (Mitsubishi UFJ Financial Group).



DateMore Than 30 Days Ago bot
MUFG (Mitsubishi UFJ Financial Group) Incident Response Senior Specialist, Associated Vice President
Experience: General
Pattern: full-time
apply Apply Now
Salary:
Status:

Associated Vice President

Copy Link Report
degreeAssociate
loacation Jersey City, NJ, United States Of America
loacation Jersey City, N..........United States Of America

Do you want your voice heard and your actions to count? Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world’s leading financial groups. Across the globe, we’re 150,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world. With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career. Join MUFG, where being inspired is expected and making a meaningful impact is rewarded. The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details. Job Summary   In this role you will focus on researching potential cybersecurity threats to various systems, technologies, operations, and programs throughout multiple environments. You will perform analysis based on this research to determine the risk to the organization and take appropriate actions based upon that analysis. Responsibilities include rapidly responding to potential incidents and events to minimize risk exposure and ensure the confidentiality, integrity, and availability of assets and business processes. Additionally, you will proactively monitor internal and external-facing environments, seek opportunities to strengthen and automate detection and remediation capabilities, reduce response times for incidents, and produce analyses of cybersecurity events that include perspectives on the behavior of adversaries.     Major Responsibilities  Conduct analysis of artifacts to determine methods of intrusion and best course of resolution while driving security improvement  Strong Incident Response knowledge and experience Theoretical and practical knowledge with Mac OS, Linux, Windows operating systems and clouds Experience with security data collection, analysis and correlation  Well-developed analytic, qualitative, and quantitative reasoning skills   Demonstrated creative problem-solving abilities  Security event monitoring, investigation, and overall incident response process  Investigate potential cybersecurity events across multiple environments using various tools and techniques  Development of information security policies, standards, and procedures  Strong time management skills to balance multiple activities and lead junior analysts as needed  Understanding of offensive security to include common attack methods  Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event   A diverse skill base in both product security and information security including organizational structure and administration practices, system development and maintenance procedures, system software and hardware security controls, access controls, computer operations, physical and environmental controls, and backup and recovery procedures.  Detailed knowledge and experience in security and regulatory frameworks (ISO 27001, NIST 800 series, FFIEC, SOC2, FedRAMP, STAR, etc.)  Support inquiries from compliance teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes are in compliance with information security policies  Create reports analyzing activities or trends both within and outside of the organization  Support the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats  Reviews internal logs and alerts to identify potential cybersecurity events. Triage cases based on output from automated alerts, and determine when to escalate to other teams  Monitors external service provider activity to detect potential cybersecurity events  Analyzes security data from all systems in real time to spot and thwart potential threats, attacks, and other violations  Analyzes compromised systems and remediates to a clean state  Performs breach indicator assessments to investigate network traffic for malicious activity  Assists with internal or third-party employee investigations  Assists in the production of various reports which identify and analyze relevant upcoming and ongoing threats to the enterprise  Research evolving threats, techniques, tools, and vulnerabilities in support of information security efforts  Stays current with information security program developments, industry frameworks, changes in the company, industry trends, and current security practices     Qualifications  Bachelor’s degree in Information Technology, Cyber Security, Computer Science, or related discipline   5 + years of experience working in the Cybersecurity Operations or Information Security  Relevant technical and industry certifications, such as CISSP, ISSMP, SANS, GIAC, GCIA, CISM, CEH, GCFA, GCFE, GCIH, or GSEC are preferred  Experience in one or more security domains including Incident Response and Forensics, Security Governance and Oversight, Security Risk Management, Network Security, or Threat and Vulnerability Management preferred  Experience with information security risk management, including information security audits, reviews, and risk assessments  Desired Skills  Understanding of enterprise detection and response technologies and processes (advanced threat detection tools, intrusion detection/prevention systems, network packet analysis, endpoint detection and response, firewalls, Anti malware/anti-virus, Security Information and Event Management tools, etc.)  Experienced with CrowdStrike, Tanium, Proofpoint, WAF, O365 security, AWS Security, Wireshark, tcpdump, and open-source incident response and forensic tools  Ability to perform risk analysis utilizing logs and other information compiled from various sources  Understanding of network protocols, operating systems (Windows, Unix, Linux, databases), and mobile device security  Knowledge in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics  Knowledge of cloud security, networks, databases, and applications  Knowledge of the various types of cyber-attacks and their implementations  A fundamental understanding of enterprise cybersecurity frameworks such as MITRE ATT&CK and Cyber Kill Chain  Ability to document and explain technical details in a concise, understandable manner  Experience in operational processes such as security monitoring, data correlation, troubleshooting, security operations, etc.  The typical base pay range for this role is between $104K - $131K depending on job-related knowledge, skills, experience and location. This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, and paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below. MUFG Benefits Summary We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws (including (i) the San Francisco Fair Chance Ordinance, (ii) the City of Los Angeles’ Fair Chance Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair Chance Ordinance, and (iv) the California Fair Chance Act) to the extent that (a) an applicant is not subject to a statutory disqualification pursuant to Section 3(a)(39) of the Securities and Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity Exchange Act, and (b) they do not conflict with the background screening requirements of the Financial Industry Regulatory Authority (FINRA) and the National Futures Association (NFA). The major responsibilities listed above are the material job duties of this role for which the Company reasonably believes that criminal history may have a direct, adverse and negative relationship potentially resulting in the withdrawal of conditional offer of employment, if any. The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified. We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.  

Other Ai Matches

Site Reliability Engineer - Web Applications, AVP Applicants are expected to have a solid experience in handling AVP related tasks
Director, Regional HRBP APAC - GCIB and Transaction Banking Applicants are expected to have a solid experience in handling Regional HRBP APAC - GCIB and Transaction Banking related tasks
Vice President - GCBDA Credit Management Applicants are expected to have a solid experience in handling Job related tasks
Associate, Solutions, GCIB Asia Applicants are expected to have a solid experience in handling Solutions, GCIB Asia related tasks
Data Quality & Issues Management Lead, Assistant Vice President Applicants are expected to have a solid experience in handling Assistant Vice President related tasks
Business Analyst, Assistant Vice President Applicants are expected to have a solid experience in handling Assistant Vice President related tasks
Markets & Trading Operational Risk, Vice President Applicants are expected to have a solid experience in handling Vice President related tasks
Associate, Business Management and Change Applicants are expected to have a solid experience in handling Business Management and Change related tasks
Finance Transformation Analyst Applicants are expected to have a solid experience in handling Job related tasks
AVP, Regulatory Compliance Applicants are expected to have a solid experience in handling Regulatory Compliance related tasks
Vice President - Product Manager, FX and Local Markets Applicants are expected to have a solid experience in handling FX and Local Markets related tasks
Compliance, Control Room - Vice President Applicants are expected to have a solid experience in handling Control Room - Vice President related tasks
Vice President, Human Resources Business Partner Lead Applicants are expected to have a solid experience in handling Human Resources Business Partner Lead related tasks
Digital Marketing Manager, Vice President Applicants are expected to have a solid experience in handling Vice President related tasks
Assistant Vice President for Transaction Monitoring Design, Tuning, and Optimization Applicants are expected to have a solid experience in handling Tuning, and Optimization related tasks
Analyst, Business Transformation Applicants are expected to have a solid experience in handling Business Transformation related tasks
KYC Quality Checker Applicants are expected to have a solid experience in handling Job related tasks
Analyst (Credit Officer) - Japanese Corporate Banking Division Applicants are expected to have a solid experience in handling Job related tasks
Vice President, AWS Cloud Technical Lead Applicants are expected to have a solid experience in handling AWS Cloud Technical Lead related tasks
Bilingual Credit Risk Associate for Japanese Corporate Banking in Los Angeles, CA Applicants are expected to have a solid experience in handling CA related tasks
Vice President, Network and Voice Operations Team Lead Applicants are expected to have a solid experience in handling Network and Voice Operations Team Lead related tasks
Associate, Transaction Banking Sales Applicants are expected to have a solid experience in handling Transaction Banking Sales related tasks
2027 Corporate, Investment Banking and Markets (CIBM) Summer Intern Program - GCIB | San Francisco & Los Angeles, CA Applicants are expected to have a solid experience in handling Investment Banking and Markets (CIBM) Summer Intern Program - GCIB | San Francisco & Los Angeles, CA related tasks