Incident Response Senior Specialist, Associated Vice President
Company: Mitsubishi UFJ Financial Group
Location: Jersey City
Posted on: April 1, 2026
|
|
|
Job Description:
Do you want your voice heard and your actions to count? Discover
your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of
the world’s leading financial groups. Across the globe, we’re
150,000 colleagues, striving to make a difference for every client,
organization, and community we serve. We stand for our values,
building long-term relationships, serving society, and fostering
shared and sustainable growth for a better world. With a vision to
be the world’s most trusted financial group, it’s part of our
culture to put people first, listen to new and diverse ideas and
collaborate toward greater innovation, speed and agility. This
means investing in talent, technologies, and tools that empower you
to own your career. Join MUFG, where being inspired is expected and
making a meaningful impact is rewarded. The selected colleague will
work at an MUFG office or client sites four days per week and work
remotely one day. A member of our recruitment team will provide
more details. Job Summary In this role you will focus on
researching potential cybersecurity threats to various systems,
technologies, operations, and programs throughout multiple
environments. You will perform analysis based on this research to
determine the risk to the organization and take appropriate actions
based upon that analysis. Responsibilities include rapidly
responding to potential incidents and events to minimize risk
exposure and ensure the confidentiality, integrity, and
availability of assets and business processes. Additionally, you
will proactively monitor internal and external-facing environments,
seek opportunities to strengthen and automate detection and
remediation capabilities, reduce response times for incidents, and
produce analyses of cybersecurity events that include perspectives
on the behavior of adversaries. Major Responsibilities Conduct
analysis of artifacts to determine methods of intrusion and best
course of resolution while driving security improvement Strong
Incident Response knowledge and experience Theoretical and
practical knowledge with Mac OS, Linux, Windows operating systems
and clouds Experience with security data collection, analysis and
correlation Well-developed analytic, qualitative, and quantitative
reasoning skills Demonstrated creative problem-solving abilities
Security event monitoring, investigation, and overall incident
response process Investigate potential cybersecurity events across
multiple environments using various tools and techniques
Development of information security policies, standards, and
procedures Strong time management skills to balance multiple
activities and lead junior analysts as needed Understanding of
offensive security to include common attack methods Understanding
of how to pivot across multiple datasets to correlate artifacts for
a single security event A diverse skill base in both product
security and information security including organizational
structure and administration practices, system development and
maintenance procedures, system software and hardware security
controls, access controls, computer operations, physical and
environmental controls, and backup and recovery procedures.
Detailed knowledge and experience in security and regulatory
frameworks (ISO 27001, NIST 800 series, FFIEC, SOC2, FedRAMP, STAR,
etc.) Support inquiries from compliance teams such as IT risk
management and internal and external auditors to ensure
documentation is complete and processes are in compliance with
information security policies Create reports analyzing activities
or trends both within and outside of the organization Support the
development of security operations detections, playbooks, and
automations to ensure threat detection, monitoring, response, and
forensics activities align with best practices, minimize gaps in
detection and response, and provide comprehensive mitigation of
threats Reviews internal logs and alerts to identify potential
cybersecurity events. Triage cases based on output from automated
alerts, and determine when to escalate to other teams Monitors
external service provider activity to detect potential
cybersecurity events Analyzes security data from all systems in
real time to spot and thwart potential threats, attacks, and other
violations Analyzes compromised systems and remediates to a clean
state Performs breach indicator assessments to investigate network
traffic for malicious activity Assists with internal or third-party
employee investigations Assists in the production of various
reports which identify and analyze relevant upcoming and ongoing
threats to the enterprise Research evolving threats, techniques,
tools, and vulnerabilities in support of information security
efforts Stays current with information security program
developments, industry frameworks, changes in the company, industry
trends, and current security practices Qualifications Bachelor’s
degree in Information Technology, Cyber Security, Computer Science,
or related discipline 5 years of experience working in the
Cybersecurity Operations or Information Security Relevant technical
and industry certifications, such as CISSP, ISSMP, SANS, GIAC,
GCIA, CISM, CEH, GCFA, GCFE, GCIH, or GSEC are preferred Experience
in one or more security domains including Incident Response and
Forensics, Security Governance and Oversight, Security Risk
Management, Network Security, or Threat and Vulnerability
Management preferred Experience with information security risk
management, including information security audits, reviews, and
risk assessments Desired Skills Understanding of enterprise
detection and response technologies and processes (advanced threat
detection tools, intrusion detection/prevention systems, network
packet analysis, endpoint detection and response, firewalls, Anti
malware/anti-virus, Security Information and Event Management
tools, etc.) Experienced with CrowdStrike, Tanium, Proofpoint, WAF,
O365 security, AWS Security, Wireshark, tcpdump, and open-source
incident response and forensic tools Ability to perform risk
analysis utilizing logs and other information compiled from various
sources Understanding of network protocols, operating systems
(Windows, Unix, Linux, databases), and mobile device security
Knowledge in one or more security domains including Security
Governance and Oversight, Security Risk Management, Network
Security, Threat and Vulnerability Management, or Incident Response
and Forensics Knowledge of cloud security, networks, databases, and
applications Knowledge of the various types of cyber-attacks and
their implementations A fundamental understanding of enterprise
cybersecurity frameworks such as MITRE ATT&CK and Cyber Kill
Chain Ability to document and explain technical details in a
concise, understandable manner Experience in operational processes
such as security monitoring, data correlation, troubleshooting,
security operations, etc. The typical base pay range for this role
is between $104K - $131K depending on job-related knowledge,
skills, experience and location. This role may also be eligible for
certain discretionary performance-based bonus and/or incentive
compensation. Additionally, our Total Rewards program provides
colleagues with a competitive benefits package (in accordance with
the eligibility requirements and respective terms of each) that
includes comprehensive health and wellness benefits, retirement
plans, educational assistance and training programs, income
replacement for qualified employees with disabilities, paid
maternity and parental bonding leave, and paid vacation, sick days,
and holidays. For more information on our Total Rewards package,
please click the link below. MUFG Benefits Summary We will consider
for employment all qualified applicants, including those with
criminal histories, in a manner consistent with the requirements of
applicable state and local laws (including (i) the San Francisco
Fair Chance Ordinance, (ii) the City of Los Angeles’ Fair Chance
Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair
Chance Ordinance, and (iv) the California Fair Chance Act) to the
extent that (a) an applicant is not subject to a statutory
disqualification pursuant to Section 3(a)(39) of the Securities and
Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity
Exchange Act, and (b) they do not conflict with the background
screening requirements of the Financial Industry Regulatory
Authority (FINRA) and the National Futures Association (NFA). The
major responsibilities listed above are the material job duties of
this role for which the Company reasonably believes that criminal
history may have a direct, adverse and negative relationship
potentially resulting in the withdrawal of conditional offer of
employment, if any. The above statements are intended to describe
the general nature and level of work being performed. They are not
intended to be construed as an exhaustive list of all
responsibilities duties and skills required of personnel so
classified. We are proud to be an Equal Opportunity Employer and
committed to leveraging the diverse backgrounds, perspectives and
experience of our workforce to create opportunities for our
colleagues and our business. We do not discriminate on the basis of
race, color, national origin, religion, gender expression, gender
identity, sex, age, ancestry, marital status, protected veteran and
military status, disability, medical condition, sexual orientation,
genetic information, or any other status of an individual or that
individual’s associates or relatives that is protected under
applicable federal, state, or local law.
Keywords: Mitsubishi UFJ Financial Group, Brick , Incident Response Senior Specialist, Associated Vice President, IT / Software / Systems , Jersey City, New Jersey