Technical Business Analyst, Assistant Vice President
Tampa - 4050 West Boy Scout Blvd., United States
Full Time Executive-level / Director USD 110K - 135K
Do you want your voice heard and your actions to count?
Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world’s leading financial groups. Across the globe, we’re 120,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.Job Summary:
This position is responsible for the management oversight including the identification and mitigation of Vulnerability compliance operational issues and will also assist in the maintenance of operational and key control procedures.
Provides specialized expertise, advice, monitoring and oversight regarding the Vulnerability Management processes.
Responsibilities:
Support technology vulnerability management – assessment, remediation, mitigation, monitoring, and reporting by developing, operating, and continuously improving vulnerability management guidelines, practice, and governance
Ensure vulnerability management is effective operationally and risk management-wise and addresses the enterprise goals and objectives including internal and external regulatory requirements and risk assessment
Function as the business analyst and subject matter expert for vulnerability management tool sets and processes (e.g., ServiceNow, Microsoft Power BI) – requirements development, design, testing, training, implementation, ongoing support, continuous improvement
Assist stakeholders (e.g., vulnerability remediation owners, vulnerability discovery teams) in identifying, initiating, and tracking corrective actions to address blockers and anomalies
Analyze vulnerability data/information including assessment of the efficiency, relevance, and integrity of collected data, to facilitate disposition and support remediation of vulnerabilities
Cross-functional collaboration to effectively communicate and continue to improve vulnerability processes (e.g., Technology Infrastructure & Operations, Application Development, Enterprise Information Security, Enterprise Architecture, Line of Defense)
Prepare, facilitate, and document routine or ad-hoc cross-functional meetings and effectively communicate with stakeholders, including recapping discussions involving key decisions and following up on action items
Serve as conduit of escalation – Address or escalate risks and blockers / issues with supporting data and recommendation(s) for resolution
Qualifications:
Bachelor's degree in computer science or a closely related discipline, or an equivalent combination of formal education and experience
Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP, or other security certifications preferred
Certified Information Systems Auditor (CISA) or Certified in Risk and Information Systems Control (CRISC), Professional in Project Management (PMP), Six Sigma Black Belt or Green Belt professional certifications preferred
Technology and managing Cybersecurity analysis, especially technology vulnerabilities, providing guidance to business stakeholders, and interpreting and applying policies and standards
Risk assessment and information security practices
Technology vulnerability management
End-to-end process design, implementation, and operation
Experience with large complex financial institutions or another highly-regulated industry
Experience and proficient working knowledge with the multiple of the following control areas:
o Vulnerability Management
o Configuration Management
Demonstrate in-depth knowledge of concepts, best practices, and controls in a breadth of Cybersecurity areas/domains, such as risk management, compliance, and application & operations security
Strong technical and/or IT audit background and practical knowledge of a wide variety of technologies which include server infrastructure & operating systems, network & web infrastructures, database architecture, and software/application
Familiarity with standards / frameworks (e.g., COBIT 5, ITIL, ISO, NIST guidance)
Working knowledge with technology business applications and tools, such as Qualys, Tanium, ServiceNow, Microsoft Office suits, dashboard tools (e.g., Power BI)
Strong Microsoft Excel skills
Demonstrates leadership
Communicates effectively
Identifies multiple paths to success using analytical and critical thinking as well as decision-making skills
Operates strategically to support a culture of continuous improvement and systems thinking
Makes sound business decisions in a complex work environment
Collaborates with other business functions and divisions to advance business objectives
Exhibits and fosters optimism, resilience, flexibility, and openness to others' ideas
Inspires innovation and values learning as a lifelong professional objective
Leads by example, engaging inclusively and with intent
Always acts with integrity
Iterative problem-solving
Drive for results
Serving as a trusted advisor
The typical base pay range for this role is between $110K - $135K depending on job-related knowledge, skills, experience, and location. This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, and paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below.
We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws (including (i) the San Francisco Fair Chance Ordinance, (ii) the City of Los Angeles’ Fair Chance Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair Chance Ordinance, and (iv) the California Fair Chance Act) to the extent that (a) an applicant is not subject to a statutory disqualification pursuant to Section 3(a)(39) of the Securities and Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity Exchange Act, and (b) they do not conflict with the background screening requirements of the Financial Industry Regulatory Authority (FINRA) and the National Futures Association (NFA). The major responsibilities listed above are the material job duties of this role for which the Company reasonably believes that criminal history may have a direct, adverse and negative relationship potentially resulting in the withdrawal of conditional offer of employment, if any.The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.Tags: Audits Business Intelligence CISA CISM CISSP COBIT Compliance Computer Science CRISC Governance ITIL Monitoring NIST Qualys Risk assessment Risk management Vulnerabilities Vulnerability management
Perks/benefits: Career development Competitive pay Health care Medical leave Parental leave Salary bonus Wellness
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.