MUFG (DBA) - Tampa, FL

posted 5 days ago

Full-time - Entry Level
Tampa, FL
Securities, Commodity Contracts, and Other Financial Investments and Related Activities

About the position

In this role you will focus on researching potential cybersecurity threats to various systems, technologies, operations, and programs throughout multiple environments. You will perform analysis based on this research to determine the risk to the organization and take appropriate actions based upon that analysis. Responsibilities include rapidly responding to potential incidents and events to minimize risk exposure and ensure the confidentiality, integrity, and availability of assets and business processes. Additionally, you will proactively monitor internal and external-facing environments, seek opportunities to strengthen and automate detection and remediation capabilities, reduce response times for incidents, and produce analyses of cybersecurity events that include perspectives on the behavior of adversaries.

Responsibilities

  • Conduct analysis of artifacts to determine methods of intrusion and best course of resolution while driving security improvement
  • Theoretical and practical knowledge with Mac OS, Linux and Windows operating systems
  • Experience with security data collection, analysis and correlation
  • Well-developed analytic, qualitative, and quantitative reasoning skills
  • Demonstrated creative problem-solving abilities
  • Security event monitoring, investigation, and overall incident response process
  • Investigate potential cybersecurity events across multiple environments using various tools and techniques
  • Support inquiries from compliance teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes are in compliance with information security policies
  • Create reports analyzing activities or trends both within and outside of the organization
  • Support the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats
  • Reviews internal logs and alerts to identify potential cybersecurity events. Triage cases based on output from automated alerts, and determine when to escalate to other teams
  • Monitors external service provider activity to detect potential cybersecurity events
  • Analyzes security data from all systems in real time to spot and thwart potential threats, attacks, and other violations
  • Analyzes compromised systems and remediates to a clean state
  • Performs breach indicator assessments to investigate network traffic for malicious activity
  • Assists with internal or third-party employee investigations
  • Assists in the production of various reports which identify and analyze relevant upcoming and ongoing threats to the enterprise
  • Research evolving threats, techniques, tools, and vulnerabilities in support of information security efforts
  • Stays current with information security program developments, industry frameworks, changes in the company, industry trends, and current security practices

Requirements

  • Bachelor's degree in Information Technology, Cyber Security, Computer Science, or related discipline
  • 1 + years of experience working in the Cybersecurity Operations or Information Security
  • Relevant technical and industry certifications, such as SANS, GIAC, GCIA, CEH, GCFA, GCFE, GCIH, or GSEC are preferred
  • Experience in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics preferred
  • Experience with information security risk management, including information security audits, reviews, and risk assessments

Nice-to-haves

  • Understanding of enterprise detection and response technologies and processes (advanced threat detection tools, intrusion detection/prevention systems, network packet analysis, endpoint detection and response, firewalls, Anti malware/anti-virus, Security Information and Event Management tools, etc.)
  • Experienced with CrowdStrike, Tanium, Proofpoint, WAF, O365 security, AWS Security, Wireshark, tcpdump, and open-source incident response and forensic tools
  • Ability to perform risk analysis utilizing logs and other information compiled from various sources
  • Understanding of network protocols, operating systems (Windows, Unix, Linux, databases), and mobile device security
  • Knowledge in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics
  • Knowledge of cloud security, networks, databases, and applications
  • Knowledge of the various types of cyber-attacks and their implementations
  • A fundamental understanding of enterprise cybersecurity frameworks such as MITRE ATT&CK and Cyber Kill Chain
  • Ability to document and explain technical details in a concise, understandable manner
  • Experience in operational processes such as security monitoring, data correlation, troubleshooting, security operations, etc.

Benefits

  • Comprehensive health and wellness benefits
  • Retirement plans
  • Educational assistance and training programs
  • Income replacement for qualified employees with disabilities
  • Paid maternity and parental bonding leave
  • Paid vacation, sick days, and holidays
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service