CyberSecurity Threat Detection & Response Engineer, Associate Vice President

Watermark - 410 North Scottsdale Road, United States

MUFG

三菱UFJ銀行のホームページ。住宅ローン、外貨預金、投資信託、個人年金などの商品案内。インターネットバンキング、口座開設もできます。

View all jobs at MUFG

Apply now Apply later

Do you want your voice heard and your actions to count?

Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world’s leading financial groups. Across the globe, we’re 120,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.

With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.

Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.

The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.

Job Summary

As a Threat Detection and Response Engineer you will occupy a crucial position in our Security Operations center, with your primary focus centered on conceiving, refining and implementing use cases and strategies that intricately align with the global security frameworks. Your expertise with this framework and the cyber security kill chain will form the foundation where our defensive capabilities are fortified, ensuring the ability to not only identify and respond, but also impede cyber threats in a proactive manner.

Major Responsibilities

  • Collaboration and Innovation: Work closely with cross-functional teams, including Threat Intelligence, Incident Response, Forensics and Security Operations to collaboratively craft custom security use cases founded on the principles of global security frameworks. Harnessing the collective intelligence to device strategies that yield valuable results.
  • Draw upon your comprehensive understanding of the cyber landscape to design and execute advanced detection and response strategies, employing an array of sophisticated security tools and technologies. Your solutions will serve as the first line of defense, minimizing potential risks and vulnerabilities.
  • Apply your extensive knowledge of attack patterns, tactics and techniques to conduct in-depth analysis of cyber threats. Unearth the subtle nuances that set apart malicious activities from innocuous ones, thus empowering the firm with a heightened security posture.
  • In the ever-changing landscape of cyber threats, stat at the forefront of industry trends and emerging attack vectors. This ensures that the strategies you develop remain resilient and effective in the face of new challenges.
  • Participate in red teaming and penetration testing exercises to subject the developed use cases to real-world simulation. By doing so, ensuring their robustness and effectiveness in diverse scenarios.
  • Produce and report valuable metrics to leadership and cross functional teams to quantify the value and effectiveness of use cases in an ever-changing threat landscape.

Qualifications

  • Bachelor’s degree in Information Technology, Cyber Security, Computer Science, or related discipline or equivalent work experience
  • Preferred Certifications:  CISSP, ISSMP, SANS, GSEC, GCFA, GNFA, GIAC and/or GCIH
  • 5-8 years in Information Security or other Information Technology fields
  • Experience working within the Financial Services Industry preferred
  • Experience with use case and automation related to UEBA, SIEM, SOAR, DLP, EDR and other open-source security tools
  • Knowledge of models/frameworks such as Cyber Kill Chain, MITRE and CRI (Cyber Risk Institute)
  • Well-developed analytic, qualitative, and quantitative reasoning skills
  • Demonstrated creative problem-solving abilities
  • Security event monitoring, investigation, and overall incident response process
  • Strong time management skills to balance multiple activities and lead junior analysts as needed
  • Understanding of offensive security to include common attack methods
  • Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event
  • A diverse skill base in both product security and information security including organizational structure and administration practices, system development and maintenance procedures, system software and hardware security controls, access controls, computer operations, physical and environmental controls, and backup and recovery procedures.
  • In-depth knowledge in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, and Incident Response and Forensics
  • Experience creating trending, metrics, and management reports
  • Experience across the following technical concentrations:
    • Network-Based Security Controls (Firewall, IPS, WAF, MDS, Proxy, VPN)
    • Anomaly Detection and Investigation
    • Host and Network Forensics
    • Operating Systems
    • Web Applications and Traffic
  • Experience with cloud computing security, network, operating system, database, application, and mobile device security.
  • Experience with information security risk management, including conducting information security audits, reviews, and risk assessments.

The typical base pay range for this role is between $110K - $135K depending on job-related knowledge, skills, experience and location. This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, and paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below.

MUFG Benefits Summary

We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws (including (i) the San Francisco Fair Chance Ordinance, (ii) the City of Los Angeles’ Fair Chance Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair Chance Ordinance, and (iv) the California Fair Chance Act) to the extent that (a) an applicant is not subject to a statutory disqualification pursuant to Section 3(a)(39) of the Securities and Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity Exchange Act, and (b) they do not conflict with the background screening requirements of the Financial Industry Regulatory Authority (FINRA) and the National Futures Association (NFA). The major responsibilities listed above are the material job duties of this role for which the Company reasonably believes that criminal history may have a direct, adverse and negative relationship potentially resulting in the withdrawal of conditional offer of employment, if any.

The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.

We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.

 

Apply now Apply later
Job stats:  2  0  0

Tags: Audits Automation CISSP Cloud Computer Science Cyber Kill Chain EDR Firewalls Forensics GCFA GCIH GIAC GNFA Governance GSEC Incident response IPS Monitoring Network security Offensive security Pentesting Product security Red team Risk assessment Risk management SANS SIEM SOAR SOC Threat detection Threat intelligence VPN Vulnerabilities Vulnerability management

Perks/benefits: Career development Competitive pay Health care Medical leave Parental leave Salary bonus Team events Wellness

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.