Do you want your voice heard and your actions to count?
Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), the 5th largest financial group in the world. Across the globe, we re 180,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world s most trusted financial group, it s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
This is a remote position. A member of our recruitment team will discuss location preferences with you in more detail.
This role can be remote in any of these States: Arizona, Texas , North Carolina, Washington, Oregon, California, Illinois, Kentucky, Georgia, New York, Connecticut, Massachusetts, New Jersey, District of Columbia, Utah, Nebraska, Minnesota, Missouri, Arkansas, Indiana, Ohio, Tennessee, Alabama, Florida, South Carolina, Virginia.
In this role you will focus on the tools, processes, and methods needed to design, implement, and test complete systems and to adapt existing systems as the environment evolves. Your responsibilities will include preventing and protecting against unauthorized access; maintaining the integrity and confidentiality of critical data against internal and external threats; ensuring enterprise-level endpoint protection and encryption; and simplifying the security toolset by implementing superior products that cover many security vectors without impeding system performance or diminishing user experience.
Perform management activities such as design, implementation, monitoring, capacity planning, scalability testing, fail-over testing, backup/recovery planning, disaster recovery and performance and security baselines
Implement tasks/projects critical to the organization s data protection technologies
Deploy and support data protection monitoring and prevention tools (e.g.: Cloud Access Security Broker (CASB), Data Leakage Protection (DLP), Database Monitoring, Tokenization, and Encryption)
Create procedures to support the analysis of events/incidents for remediation suggestions to relevant areas
Research and document security best practices to proactively identify security gaps including vendor review, technology evaluations, demos, and proof of concept trials
Identify, isolate, and document solution defects and work with the owner/vendor to bring issues to resolution
Create and regularly evaluate process, quality control, and configuration management documentation
10+ years overall technical experience in either reverse engineering/malware analysis, threat intelligence, incident response, security operations, or related information security field
10+ years' experience in application design/engineering, including but not limited to programming/scripting, Windows/Linux system administration, relational database management system (RDBMS)/NoSQL database administration, etc.
Experience in the banking or finance industries preferred
5+ years experience in information technology with emphasis on Information Security.
Intermediate to advanced systems engineering skills with Windows and/or Unix/Linux
Strong knowledge of command line syntax, and the ability to write, edit, and troubleshoot complex scripts
Understanding, or experience with setup, support, troubleshooting of TLS (Transport Layer Security) connections.
Experience with encryption security products such
Experience with certificate management tools
Experience with install, config, support of databases
Experience with install, config, support of certificate authority services.
Experience working with centralized logging tools
Knowledge or experience with cloud encryption solutions
Automation through scripting and/or programming.
Background in network traffic analysis; knowledge of networking protocols: Transmission Control Protocol/Internet Protocol (TCP/IP), Hyper Text Transfer Protocol/Secure (HTTP/HTTPs), File Transfer Protocol (FTP), Internet Relay Chat (IRC), etc.
Experience with Cloud Security.
Certifications desired: CISSP, GSEC, MCSE
Experience creating and delivering Security and IT metrics
Strong direct experience of analyzing malware, must have a solid understanding of dynamic/static analysis of malware
Experience in encryption/obfuscation and how to reverse it is desired, but not required
The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.
We are proud to be an Equal Opportunity/Affirmative Action Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual s associates or relatives that is protected under applicable federal, state, or local law.