Threat Detection & Response, Analyst
Tampa - 4050 West Boy Scout Blvd.
Full Time Entry-level / Junior USD 83K - 109K
Do you want your voice heard and your actions to count?
Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), the 7th largest financial group in the world. Across the globe, we’re 120,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.Job Summary
In this role you will focus on researching potential cybersecurity threats to various systems, technologies, operations, and programs throughout multiple environments. You will perform analysis based on this research to determine the risk to the organization and take appropriate actions based upon that analysis. Responsibilities include rapidly responding to potential incidents and events to minimize risk exposure and ensure the confidentiality, integrity, and availability of assets and business processes. Additionally, you will proactively monitor internal and external-facing environments, seek opportunities to strengthen and automate detection and remediation capabilities, reduce response times for incidents, and produce analyses of cybersecurity events that include perspectives on the behavior of adversaries.
Major Responsibilities:
- Perform cybersecurity threat detection, assessment, and mitigation efforts as part of a 24/7 global team
- Investigate potential cybersecurity events across multiple environments using various tools and techniques
- Support inquiries from compliance teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes are in compliance with information security policies
- Create reports analyzing activities or trends both within and outside of the organization
- Perform threat hunting across the environment to attempt to detect any adversary activity
- Support the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats
- •Reviews internal logs and alerts to identify potential cybersecurity events. Triage cases based on output from automated alerts, and determine when to escalate to other teams
- Monitors external service provider activity to detect potential cybersecurity events
- Analyzes security data from all systems in real time to spot and thwart potential threats, attacks, and other violations
- Analyzes compromised systems and remediates to a clean state
- •Performs breach indicator assessments to investigate network traffic for malicious activity
- Assists with internal or third-party employee investigations
- Assists in the production of various reports which identify and analyze relevant upcoming and ongoing threats to the enterprise
- Researches evolving threats, techniques, tools, and vulnerabilities in support of information security efforts
- Stays current with information security program developments, industry frameworks, changes in the company, industry trends, and current security practices
Qualifications
- Relevant technical and industry certifications, such as those provided by GIAC, EC-Council, ISC2, and CompTIA are preferred
- Equivalent work experience or Bachelor’s degree in Information Technology, Cyber Security, Computer Science, or related discipline
- New grad, 1+ years of experience working in the cybersecurity field, or 2+ years working in the information technology field
- Experience in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics preferred
- Experience with information security risk management, including information security audits, reviews, and risk assessments
Desired Skills
- Understanding of enterprise detection and response technologies and processes (advanced threat detection tools, intrusion detection/prevention systems, network packet analysis, endpoint detection and response, firewalls, Anti malware/anti-virus, Security Information and Event Management tools, etc.)
- Ability to perform risk analysis utilizing logs and other information compiled from various sources
- Understanding of network protocols, operating systems (Windows, Unix, Linux, databases), and mobile device security
- Knowledge in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics
- Knowledge of cloud security, networks, databases, and applications
- Knowledge of the various types of cyber-attacks and their implementations
- A fundamental understanding of enterprise cybersecurity frameworks such as MITRE ATT&CK and Cyber Kill Chain
- Ability to document and explain technical details in a concise, understandable manner
- Experience in operational processes such as security monitoring, data correlation, troubleshooting, security operations, etc.
- With your developing functional expertise and understanding, you have what it takes to succeed in this role in this role. An analytical thinker and iterative problem solver, you will continue to hone your skills through assignments of increasing complexity, contributing to analyses, projects, business relationships, and issue resolution. In the process, you will have exciting opportunities to develop your skills, expand your network, and build your career.
The typical base pay range for this role is between $83K - $109K depending on job-related knowledge, skills, experience and location. This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, and paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below.
The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.Tags: Audits Cloud Compliance CompTIA Computer Science Cyber Kill Chain EDR Firewalls Forensics GIAC Governance Incident response Intrusion detection Linux Malware MITRE ATT&CK Monitoring Network security Risk analysis Risk assessment Risk management Threat detection UNIX Vulnerabilities Vulnerability management Windows
Perks/benefits: Career development Competitive pay Health care Medical leave Parental leave Salary bonus Team events Wellness
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Cyber Security Architect jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cybersecurity Analyst jobs
- Open Staff Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Senior Penetration Tester jobs
- Open IT Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Security Operations Analyst jobs
- Open Cybersecurity Specialist jobs
- Open IT Security Engineer jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open SaaS-related jobs
- Open Security assessment-related jobs
- Open APIs-related jobs
- Open Malware-related jobs
- Open Java-related jobs
- Open Forensics-related jobs
- Open Security Clearance-related jobs
- Open DevOps-related jobs
- Open CEH-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs