Logo
Mitsubishi UFJ Financial Group

SIEM & Data Engineer – Assistant Vice President

Mitsubishi UFJ Financial Group, Tampa, Florida, us, 33646

Save Job

Do you want your voice heard and your actions to count

Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world's leading financial groups. Across the globe, 150,000 colleagues strive to make a difference for every client organization and community we serve. We stand for our values – building long‑term relationships, serving society, and fostering shared and sustainable growth for a better world.

With a vision to be the world's most trusted financial group, it is part of our culture to put people first, listen to new and diverse ideas, and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies and tools that empower you to own your career.

Join MUFG where being inspired is expected and making a meaningful impact is rewarded.

The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.

Job Overview MUFG is seeking a highly motivated SIEM Engineer as part of the Engineering team to design and implement cutting‑edge technology to improve security posture. This person will work with other engineering team members to drive the engineering standards and implementation across the global deployment.

Responsibilities

Be a technical expert on SIEM products (Splunk, Cribl) and technology.

Research and look for opportunities to adopt the best practices and industry standards to enhance the SIEM platforms.

Engineer and implement various solutions on SIEM platforms as per business requirements.

Define SIEM platform standards including data schema modelling, normalization, monitoring and alerting.

Have experience in dashboard and reporting as per requirements.

Have experience in AI and ML to build a modern SIEM and data monitoring solution.

Configure SIEM products with different policies, rules and configurations.

Customize SIEM products if out‑of‑the‑box solutions are not available.

Define standard patterns to integrate different systems into SIEM platforms.

Generate different types of reports using SIEM data.

Identify opportunities to enhance the current baseline processes and configuration.

Produce engineering integration and process‑related documentation.

Manage vendor relationships to drive roadmap, solution design, implementation and troubleshooting.

Work with key stakeholders of the services to ensure expectations are met.

Conduct POC of new features to develop new solutions.

Know various applications and systems (servers, middleware, clouds – SaaS, PaaS and IaaS, containers) to determine the right approach for SIEM integration.

Lead proactive system security reviews and self‑assessments of the policies, procedures and systems including distributed computer systems, Internet, intranet and extranet networks.

Understand security risks and controls, analyze methods of controlling information security problems, determine strengths and weaknesses of each method and implement the best cost‑justified solution.

Provide technical directions to peer staff members and train new staff on the security team.

Qualifications

At least 3 years of experience in Splunk.

At least 3 years with SIEM products such as Cribl, Elastic, Datadog, AWS CloudTrail, CloudWatch, Azure Event Hub, AWS S3, etc.

At least 5 years of experience in technology with an emphasis on cyber security.

At least 1 year of experience in data lake and data warehouse using products such as AWS S3, Snowflake, Databricks, etc.

Experience with scripting (Python, Ansible, etc.) preferred.

Experience in creating trending metrics and management reports.

Experience working in complex and large‑scale environments.

Familiar with industry security regulations and frameworks (MITRE ATT&CK, CIS, etc.).

Knowledge of Common Information Model mapping is required.

Working knowledge in RegEx, Splunk search language, etc. is required.

Experience working in the financial services (Top 10 banks preferred) with knowledge of regulations such as FFIEC, SOX or other highly regulated industries.

Knowledge and experience operating in a hybrid‑cloud environment.

Knowledge of networking fundamentals (TCP/IP) and strong troubleshooting skills.

Knowledge of modern security principles and their practical applications.

Knowledge and experience in AWS or Azure.

Education

Bachelor’s degree in Cybersecurity, Computer Science, Information Technology or a related field, or relevant industry certifications. Equivalent work experience is equally preferable.

Preferred Certifications

Splunk Certification in Architecture or Administration

Certified Information Systems Security Professional (CISSP)

Certified Information Systems Manager (CISM)

Certified Information System Auditor (CISA)

Certified Ethical Hacker (CEH)

Other Qualifications

As per MUFG’s Return to Office policy a candidate must work onsite for 4 days and 1 day remotely, out of either Jersey City (NJ), Tampa (FL) or Tempe (AZ) office.

The typical base pay range for this role is between $113 K – $146 K depending on job‑related knowledge, skills, experience and location. This role may also be eligible for certain discretionary performance‑based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, paid vacation, sick days and holidays.

MUFG Benefits Summary We will consider for employment all qualified applicants, including those with criminal histories in a manner consistent with the requirements of applicable state and local laws (including the San Francisco Fair Chance Ordinance, the City of Los Angeles Fair Chance Initiative for Hiring Ordinance, the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act). The above statements describe the general nature and level of work. They are not an exhaustive list of all responsibilities, duties and skills required of the personnel so classified.

We are proud to be an Equal Opportunity Employer and are committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and for our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information or any other status protected under applicable federal, state or local law.

#J-18808-Ljbffr