**Do you want your voice heard and your actions to count?**
Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), the 5th largest financial group in the world. Across the globe, we’re 180,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
This is a remote position. A member of our recruitment team will discuss location preferences with you in more detail.
This role can be remote in any of these States: Arizona, Texas, North Carolina, Washington, Oregon, California, Illinois, Kentucky, Georgia, New York, Connecticut, Massachusetts, New Jersey, District of Columbia, Utah, Nebraska, Minnesota, Missouri, Arkansas, Indiana, Ohio, Tennessee, Alabama, Florida, South Carolina, Virginia.
This role will respond to events according to documented procedures and industry best practices. Candidates should be experienced in the areas of networking, client/server technologies, and analyzing log files with the ability to identify false positive and true positive events.
+ Gain knowledge of existing policies, standards, procedures, and guidelines to prevent the unauthorized use, release, modification, or destruction of data. Gain an understanding of security risks and controls.
+ Execute monitoring systems used to detect and report security violations.
+ Provide initial investigation of security incidents Provide communication and escalation throughout the incident per the operating guidelines
+ Communicate directly with data asset owners Perform analysis of log files Hunting for suspicious anomalous activity based on data alerts or data outputs from various tool sets
+ Escalating issues when necessary Maintain knowledge of industry trends and current security practices.
+ Certifications in a related security domain such as CISSP (Certified Information Systems Security Professional), GCIA (GIAC Certified Intrusion Analyst) or GSEC ( GIAC Security Essentials Certification) a plus, cyber security Bachelor’s degree preferred
+ Work experience in the areas of information security, IS auditing, data processing operations, systems development and/or computer programming.
+ Must have a minimum 2+ years of information security operations experience and 2 years’ experience working in a large complex, matrix, and global organization.
+ Detailed knowledge of at least two operating systems such as Windows Server and Linux and corresponding security systems.
+ Good oral and written communications skills.
+ Knowledge of basic banking concepts and theories.
+ The candidate should be able to exercise command scripts and execute programs to obtain the desired results.
+ An understanding of software productivity packages like MS Office, MS Access, and terminal emulation software.
+ The analyst will learn the skills required to evaluate business process and application software, which effect the integrity, functionality, and reliability of the bank’s network and systems.
+ The position should work toward gaining detailed knowledge of at least one operating system and corresponding security system.
+ Knowledge and understanding of security tools and hacking techniques is a plus.
+ The responsibilities extend to leading multiple security incident investigations at once. The Analyst must report all possible security incidents, potential breaches, attacks, threats, and evidence of compromise to management.
+ Experience in investigations and analyzing cyber security items
+ To effectively apply information security theories and concepts to specific circumstances. Escalate incidents, potential compromises, external threats, and attacks.
+ Based on experience, the analyst in this position may be on-call 24 hours per day to respond to information security related problems.
The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.
We are proud to be an Equal Opportunity/Affirmative Action Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.