Sr. SIEM & SOAR Engineer, Vice President
Tampa - 4050 West Boy Scout Blvd., United States
Full Time Senior-level / Expert USD 137K - 176K
Do you want your voice heard and your actions to count?
Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world’s leading financial groups. Across the globe, we’re 120,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.Job Overview:
MUFG is seeking a highly motivated Sr. SIEM and SOAR Engineer as part of the Engineering team to design and implement cutting-edge technology to improve security posture. This role is a senior role who drives the engineering standards and implementation across the global deployment.
Responsibilities:
- Manage the SIEM and SOAR technical roadmap by working with the engineering team and other stakeholders.
- Able to conduct the Proof of Concept (POC) of product features and develop the solution as per business requirements.
- Design and implement various engineering solutions by working with other stakeholders.
- Leverage industry trends and market research to adopt the best practices to enhance the SIEM and SOAR platforms.
- Experience with building and managing Security Data Lake and Data Warehouse.
- Define SIEM and SOAR platform standards including data schema, modelling, normalization, monitoring and alerting.
- Define standard patterns to integrate different systems into SIEM platforms
- Ability to develop different scripts and products RegEx for configuring policy to detect security alerts as per threat, anomaly, etc.
- Ability to conduct fraud analysis and threat detection.
- Generate different types of reports using SIEM & SOAR data
- Identify opportunities to enhance the current baseline processes and configuration
- Produce engineering, integration and process related documentation.
- Manage vendor relationships to drive roadmap, solution design, implementation and troubleshooting
- Work with key stakeholders of the services to ensure the expectations are meeting the requirements
- Knowledge of various applications and systems that include Servers, security platforms, middleware, Clouds (SaaS, PaaS and IaaS), Containers, etc. to come up with the right approach of SIEM integration
- Ability to understand security risks and controls, to analyze various methods of controlling information security problems, determine the strengths and weaknesses of each method and implement the best cost-justified solution
- Ability to provide technical directions to other peer staff members, and to train new staff on the security team
Qualifications:
- 7+ years of experience in technology with emphasis on cyber security.
- 5+ years of experience in SIEM and SOAR products such as Splunk, Elastic, Datadog, Cribl
- 3+ years of experience in Data Lake and data warehouse using products such as AWS S3, Snowflake, Databricks
- Subject matter expertise in SIEM and SOAR products such as Splunk, Elastic, Datadog, Phantom, Torq
- Experience with scripting is highly preferred like Python, Ansible
- Experience in creating trending, metrics, and management reports
- Experience working in complex and large-scale environments.
- Familiar with industry security regulations and frameworks (MITRE Attack Framework, CIS, etc.)
- Working knowledge in RegEx, Splunk search language
- Knowledge and experience operating in hybrid-cloud environment.
- Knowledge of networking fundamentals (TCP/IP) and strong troubleshooting skills.
- Knowledge of modern security principles and their practical applications.
- Knowledge and experience in AWS or Azure
- Knowledge and experience with programming language to automate tasks (Python or PowerShell)
Education:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field, or relevant industry certifications. Equivalent work experience is equally preferable.
Preferred Certifications:
- Certified Information Systems Security Professional (CISSP)
- Certified Information Systems Manager (CISM)
- Certified Information System Auditor (CISA)
- Certified Ethical Hacker (CEH)
The typical base pay range for this role is between $137K - $176K depending on job-related knowledge, skills, experience, and location. This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, and paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below.
We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws (including (i) the San Francisco Fair Chance Ordinance, (ii) the City of Los Angeles’ Fair Chance Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair Chance Ordinance, and (iv) the California Fair Chance Act) to the extent that (a) an applicant is not subject to a statutory disqualification pursuant to Section 3(a)(39) of the Securities and Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity Exchange Act, and (b) they do not conflict with the background screening requirements of the Financial Industry Regulatory Authority (FINRA) and the National Futures Association (NFA). The major responsibilities listed above are the material job duties of this role for which the Company reasonably believes that criminal history may have a direct, adverse and negative relationship potentially resulting in the withdrawal of conditional offer of employment, if any.The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.
Tags: Ansible AWS Azure CEH CISA CISM CISSP Cloud Computer Science Databricks IaaS Monitoring PaaS PowerShell Python S3 SaaS Scripting SIEM Snowflake SOAR Splunk TCP/IP Threat detection
Perks/benefits: Competitive pay Health care Medical leave Parental leave Salary bonus Wellness
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.