Incident Response Senior Specialist, Associated Vice President jobs in United States
cer-icon
Apply on Employer Site
company-logo

MUFG · 23 hours ago

Incident Response Senior Specialist, Associated Vice President

Mitsubishi UFJ Financial Group (MUFG) is one of the world’s leading financial groups, striving to make a difference for every client, organization, and community they serve. The selected colleague will focus on researching potential cybersecurity threats, performing analysis to determine risks, and responding to incidents to minimize exposure and ensure the security of assets and processes.

Financial Services

Responsibilities

Conduct analysis of artifacts to determine methods of intrusion and best course of resolution while driving security improvement
Strong Incident Response knowledge and experience
Theoretical and practical knowledge with Mac OS, Linux, Windows operating systems and clouds
Experience with security data collection, analysis and correlation
Well-developed analytic, qualitative, and quantitative reasoning skills
Demonstrated creative problem-solving abilities
Security event monitoring, investigation, and overall incident response process
Investigate potential cybersecurity events across multiple environments using various tools and techniques
Development of information security policies, standards, and procedures
Strong time management skills to balance multiple activities and lead junior analysts as needed
Understanding of offensive security to include common attack methods
Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event
A diverse skill base in both product security and information security including organizational structure and administration practices, system development and maintenance procedures, system software and hardware security controls, access controls, computer operations, physical and environmental controls, and backup and recovery procedures
Detailed knowledge and experience in security and regulatory frameworks (ISO 27001, NIST 800 series, FFIEC, SOC2, FedRAMP, STAR, etc.)
Support inquiries from compliance teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes are in compliance with information security policies
Create reports analyzing activities or trends both within and outside of the organization
Support the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats
Reviews internal logs and alerts to identify potential cybersecurity events. Triage cases based on output from automated alerts, and determine when to escalate to other teams
Monitors external service provider activity to detect potential cybersecurity events
Analyzes security data from all systems in real time to spot and thwart potential threats, attacks, and other violations
Analyzes compromised systems and remediates to a clean state
Performs breach indicator assessments to investigate network traffic for malicious activity
Assists with internal or third-party employee investigations
Assists in the production of various reports which identify and analyze relevant upcoming and ongoing threats to the enterprise
Research evolving threats, techniques, tools, and vulnerabilities in support of information security efforts
Stays current with information security program developments, industry frameworks, changes in the company, industry trends, and current security practices

Qualification

Incident ResponseCybersecurity OperationsSecurity FrameworksSecurity Data AnalysisTechnical CertificationsOperating SystemsRisk ManagementAnalytical SkillsProblem-SolvingTime Management

Required

Bachelor's degree in Information Technology, Cyber Security, Computer Science, or related discipline
5 + years of experience working in the Cybersecurity Operations or Information Security
Strong Incident Response knowledge and experience
Theoretical and practical knowledge with Mac OS, Linux, Windows operating systems and clouds
Experience with security data collection, analysis and correlation
Well-developed analytic, qualitative, and quantitative reasoning skills
Demonstrated creative problem-solving abilities
Security event monitoring, investigation, and overall incident response process
Investigate potential cybersecurity events across multiple environments using various tools and techniques
Development of information security policies, standards, and procedures
Strong time management skills to balance multiple activities and lead junior analysts as needed
Understanding of offensive security to include common attack methods
Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event
A diverse skill base in both product security and information security including organizational structure and administration practices, system development and maintenance procedures, system software and hardware security controls, access controls, computer operations, physical and environmental controls, and backup and recovery procedures
Detailed knowledge and experience in security and regulatory frameworks (ISO 27001, NIST 800 series, FFIEC, SOC2, FedRAMP, STAR, etc.)
Support inquiries from compliance teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes are in compliance with information security policies
Create reports analyzing activities or trends both within and outside of the organization
Support the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats
Reviews internal logs and alerts to identify potential cybersecurity events. Triage cases based on output from automated alerts, and determine when to escalate to other teams
Monitors external service provider activity to detect potential cybersecurity events
Analyzes security data from all systems in real time to spot and thwart potential threats, attacks, and other violations
Analyzes compromised systems and remediates to a clean state
Performs breach indicator assessments to investigate network traffic for malicious activity
Assists with internal or third-party employee investigations
Assists in the production of various reports which identify and analyze relevant upcoming and ongoing threats to the enterprise
Research evolving threats, techniques, tools, and vulnerabilities in support of information security efforts
Stays current with information security program developments, industry frameworks, changes in the company, industry trends, and current security practices

Preferred

Relevant technical and industry certifications, such as CISSP, ISSMP, SANS, GIAC, GCIA, CISM, CEH, GCFA, GCFE, GCIH, or GSEC are preferred
Experience in one or more security domains including Incident Response and Forensics, Security Governance and Oversight, Security Risk Management, Network Security, or Threat and Vulnerability Management preferred
Experience with information security risk management, including information security audits, reviews, and risk assessments
Understanding of enterprise detection and response technologies and processes (advanced threat detection tools, intrusion detection/prevention systems, network packet analysis, endpoint detection and response, firewalls, Anti malware/anti-virus, Security Information and Event Management tools, etc.)
Experienced with CrowdStrike, Tanium, Proofpoint, WAF, O365 security, AWS Security, Wireshark, tcpdump, and open-source incident response and forensic tools
Ability to perform risk analysis utilizing logs and other information compiled from various sources
Understanding of network protocols, operating systems (Windows, Unix, Linux, databases), and mobile device security
Knowledge in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics
Knowledge of cloud security, networks, databases, and applications
Knowledge of the various types of cyber-attacks and their implementations
A fundamental understanding of enterprise cybersecurity frameworks such as MITRE ATT&CK and Cyber Kill Chain
Ability to document and explain technical details in a concise, understandable manner
Experience in operational processes such as security monitoring, data correlation, troubleshooting, security operations, etc

Benefits

Comprehensive health and wellness benefits
Retirement plans
Educational assistance and training programs
Income replacement for qualified employees with disabilities
Paid maternity and parental bonding leave
Paid vacation
Sick days
Holidays

Company

MUFG (Mitsubishi UFJ Financial Group) is one of the world's leading financial groups.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Greidy Puig
Vice President Finance- Business Unit CFO
linkedin
leader-logo
Mark Fernandez
Vice President, Global Markets CFO Office
linkedin
Company data provided by crunchbase