MUFG · 21 hours ago
Threat Detection & Response, Associate / Assistant Vice President
Mitsubishi UFJ Financial Group (MUFG) is one of the world’s leading financial groups, committed to making a difference for every client and community. The Assistant Vice President (AVP) role involves performing digital forensic collection, analysis, and e-Discovery in support of various investigations, working closely with the Incident Response Team.
Financial Services
Responsibilities
Extensive theoretical and practical knowledge with Mac, Linux and Windows operating systems
Conduct analysis of artifacts to determine methods of intrusion and best course of resolution while driving security improvement
Create technical summary of findings in accordance with industry reporting procedures
Knowledge of models/frameworks such as Kill Chain and MITRE ATT&CK
Well-developed analytic, qualitative, and quantitative reasoning skills
Demonstrated creative problem-solving abilities
Understanding of offensive security to include common attack methods
Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event
Knowledge and experience in security and regulatory frameworks (ISO 27001, NIST 800 series, FFIEC, SOC2, FedRAMP, STAR, etc.)
In-depth knowledge in Incident Response and Forensics
Examine computers, related hardware, network traffic, related applications, and operating systems to identify potential threats, anomalous or malicious activities to network resources
Apply forensic methods and techniques to test and validate hardware/software equipment
Conduct memory collection and analysis
Reconstruct damaged computer systems and recover damaged or destroyed data; review forensic images; determine solutions for recovery of potentially relevant information
Assist in the maintenance of forensic and investigative plans and procedures
Understanding of eDiscovery process
Collect and examine endpoint and network-based evidence and artifacts
Produce and communicate executive and detailed level reports of work efforts
Have an understanding to investigate instances of malicious code to determine attack vector and payload
Identify Indicators of Compromise (IOCs) and recommend use cases into sensors and/or SIEMs
Stays current with digital forensics techniques, industry frameworks, changes in the company and best practices
Serve as a first responder for forensics analysis and investigation capabilities
Qualification
Required
Bachelor's degree in information technology or related discipline. Equivalent work experience is equally preferable
Minimum of 3 years' experience in digital forensics
Minimum of 3 years working directly in Cybersecurity Operations
Extensive theoretical and practical knowledge with Mac, Linux and Windows operating systems
Conduct analysis of artifacts to determine methods of intrusion and best course of resolution while driving security improvement
Create technical summary of findings in accordance with industry reporting procedures
Knowledge of models/frameworks such as Kill Chain and MITRE ATT&CK
Well-developed analytic, qualitative, and quantitative reasoning skills
Demonstrated creative problem-solving abilities
Understanding of offensive security to include common attack methods
Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event
Knowledge and experience in security and regulatory frameworks (ISO 27001, NIST 800 series, FFIEC, SOC2, FedRAMP, STAR, etc.)
In-depth knowledge in Incident Response and Forensics
Examine computers, related hardware, network traffic, related applications, and operating systems to identify potential threats, anomalous or malicious activities to network resources
Apply forensic methods and techniques to test and validate hardware/software equipment
Conduct memory collection and analysis
Reconstruct damaged computer systems and recover damaged or destroyed data; review forensic images; determine solutions for recovery of potentially relevant information
Assist in the maintenance of forensic and investigative plans and procedures
Understanding of eDiscovery process
Collect and examine endpoint and network-based evidence and artifacts
Produce and communicate executive and detailed level reports of work efforts
Have an understanding to investigate instances of malicious code to determine attack vector and payload
Identify Indicators of Compromise (IOCs) and recommend use cases into sensors and/or SIEMs
Stays current with digital forensics techniques, industry frameworks, changes in the company and best practices
Serve as a first responder for forensics analysis and investigation capabilities
Preferred
Experience working within the Financial Services Industry preferred
History of working in endpoint and Network Forensics
Experienced with Magnet Axiom, TX1, Atola, FTK Imager, Verakey, Splunk, Crowd Strike, Volatility, and digital forensics open-source forensic tools
Experience responding to cyber events in public cloud environments such as AWS, Azure, Google Cloud, etc
Preferred Certifications: GCFE, GCFA, MCFE or equivalent
Benefits
Comprehensive health and wellness benefits
Retirement plans
Educational assistance and training programs
Income replacement for qualified employees with disabilities
Paid maternity and parental bonding leave
Paid vacation
Sick days
Holidays
Company
MUFG
MUFG (Mitsubishi UFJ Financial Group) is one of the world's leading financial groups.
Funding
Current Stage
Late StageLeadership Team
Recent News
2024-04-29
Company data provided by crunchbase