Do you want your voice heard and your actions to count?
Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), the 5th largest financial group in the world. Across the globe, we re 180,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world s most trusted financial group, it s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
This is a remote position. A member of our recruitment team will discuss location preferences with you in more detail.
In this role you will focus on the tools, processes, and methods needed to design, implement, and test complete systems and to adapt existing systems as the environment evolves. Your responsibilities will include preventing and protecting against unauthorized access; maintaining the integrity and confidentiality of critical data against internal and external threats; ensuring enterprise-level endpoint protection and encryption; and simplifying the security toolset by implementing superior products that cover many security vectors without impeding system performance or diminishing user experience.
Perform management activities such as design, implementation, monitoring, capacity planning, scalability testing, fail-over testing, backup/recovery planning, disaster recovery, and performance and security baselines
Implement tasks/projects critical to the organization s data protection technologies
Deploy and support data protection monitoring and prevention tools (e.g.: Cloud Access Security Broker (CASB), Data Leakage Protection (DLP), Database Monitoring, tokenization, and encryption)
Create procedures to support the analysis of events/incidents for remediation suggestions to relevant areas
Research and document security best practices to proactively identify security gaps including vendor review, technology evaluations, demos, and proof of concept trials
Identify, isolate, and document solution defects and work with the owner/vendor to bring issues to resolution
Create and regularly evaluate process, quality control, and configuration management documentation
6-8 years overall technical experience in either reverse engineering/malware analysis, threat intelligence, incident response, security operations, or related information security field
6-8 years experience in application design/engineering, including but not limited to programming/scripting, Windows/Linux system administration, relational database management system (RDBMS)/NoSQL database administration, etc.
Experience in the banking or finance industries preferred
4+ years' experience engineering Identity Governance Administration solutions via tools such as Omada, Aveksa, and/or SailPoint; and/or understanding related concepts (Access Request, Provisioning, Certification, Least Privilege, etc.)
4+ years' experience of scripting to automate processes and engineering tasks (PowerShell, Python), including using Regular Expressions
2+ years' experience of writing complex SQL queries
2+ years' experience managing Office 365 (SharePoint Online, OneDrive, Teams)
Experience preferred with managing unstructured data via tools such as StealthBits, and/or Varonis
Background in network traffic analysis; knowledge of networking protocols: Transmission Control Protocol/Internet Protocol (TCP/IP), CIFS/SMB, Network File Sharing (NFS), Hyper Text Transfer Protocol/Secure (HTTP/HTTPs), Secure File Transfer Protocol (SFTP), etc.
Certified Information Systems Security Professional (CISSP) and other security related certifications are desired, but not required
Able to work well both independently and as part of a team
Excellent communication skills and ability to adapt to the audience
The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.
We are proud to be an Equal Opportunity/Affirmative Action Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual s associates or relatives that is protected under applicable federal, state, or local law.