Do you want your voice heard and your actions to count?
Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world’s 10 largest financial institutions according to S&P Global. Across the globe, we’re 120,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.Job Overview:
MUFG is seeking a highly motivated Sr. Security Engineer Subject Matter Expert (SME) to improve the security framework and direct the delivery of services, oversee day to day operations and control any issues for teams in a multi-Cloud environment.
Responsibilities:
Lead pro-active System Security Specific reviews and self-assessments of the policies, procedures and systems, including but not limited to distributed computer systems, Internet, Intranet, and Extranet networks.
Ability to understand security risks and controls, to analyze various methods of controlling information security problems, determine the strengths and weaknesses of each method and implement the best cost-justified solution
Working knowledge of operating systems and their versions and security systems in use at the Bank (Linux, Windows, Mac)
Demonstrates the ability to convey technical findings in simple language
Ability to provide technical direction to other peer staff members, and to train new staff on the security team
Maintain the current customer managed Splunk infrastructure
Support log onboarding and alert monitoring setup in Splunk Cloud
Establish the logging standards
Identify opportunities to enhance the current baseline processes and configuration
Monitor the health of the customer managed asset and vendor managed Splunk infrastructure configuration
Work with key stakeholders of the services to ensure the expectations are meeting the requirements
Maintain the documented baseline configuration and executing the standard operating procedures to maintain the configuration
Research and look for opportunities to adopt the best practices and industry standards to enhance the SIEM and SOAR platforms
Provide guidance to junior team members
Follow the enterprise processes to maintain the platform documentation in standard templates
Be able to engage with vendor contacts to keep up with latest features released by vendor to assess the applicability in our environment and implement the enhancements
Demonstrated ability to effectively apply information security theories and concepts to specific circumstances
Ability to gain the cooperation from users to create a level of security awareness throughout the Bank for accountability and responsibility
Qualifications:
At least 10 years of experience in technology with emphasis on cyber security.
At least 7 years of experience in Security tool administration
Familiar with industry security regulations and frameworks (MITRE Attack Framework, CIS, etc.)
Experience in creating trending, metrics, and management reports
Subject matter expertise in administration of SIEM Splunk Cloud, Splunk Enterprise, Splunk Phantom (SOAR) & Splunk Enterprise Security
Experience with scripting is highly preferred like Python, Ansible etc.
Experience in creating trending, metrics, and management reports
Experience working in complex and large-scale environments.
Familiar with industry security regulations and frameworks (MITRE Attack Framework, CIS, etc.)
Experience in creating trending, metrics, and management reports
Subject matter expertise in administration of SIEM Splunk Cloud, Splunk Enterprise, Splunk Phantom (SOAR) & Splunk Enterprise Security
Knowledge of Splunk search language is required
Knowledge of Common Information Model mapping is required
Working knowledge in RegEx
Experience working in the financial services (Top 10 banks preferred) with knowledge of regulations such as FFIEC, SOX, or other highly regulated industries such as healthcare, utilities, or aerospace.
Knowledge and experience operating in hybrid-cloud environment.
Knowledge and experience with SIEM/SOAR management solutions.
Knowledge of networking fundamentals (e.g. TCP/IP) and strong troubleshooting skills.
Knowledge of modern security principles and their practical applications.
Knowledge and experience in AWS or Azure
Knowledge and experience with programming language to automate tasks (e.g. Python or PowerShell)
Education:
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field, or relevant industry certifications. Equivalent work experience equally preferable.
Preferred Certifications:
Certified Information Systems Security Professional (CISSP)
Certified Information Systems Manager (CISM)
Certified Information System Auditor (CISA)
Certified Ethical Hacker (CEH)
Other Qualifications:
As per MUFG’s Return to Office policy, must work onsite for 4 days and 1 day remotely out of either Tempe, AZ OR Tampa, FL office.
The typical base pay range for this role is between $145K - $176K depending on job-related knowledge, skills, experience and location. This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, and paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below.
We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws (including (i) the San Francisco Fair Chance Ordinance, (ii) the City of Los Angeles’ Fair Chance Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair Chance Ordinance, and (iv) the California Fair Chance Act) to the extent that (a) an applicant is not subject to a statutory disqualification pursuant to Section 3(a)(39) of the Securities and Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity Exchange Act, and (b) they do not conflict with the background screening requirements of the Financial Industry Regulatory Authority (FINRA) and the National Futures Association (NFA). The major responsibilities listed above are the material job duties of this role for which the Company reasonably believes that criminal history may have a direct, adverse and negative relationship potentially resulting in the withdrawal of conditional offer of employment, if any. The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified. We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.