Research potential cybersecurity threats to various systems, technologies, operations, and programs throughout multiple environments.
Perform analysis based on research to determine the risk to the organization and take appropriate actions based upon that analysis.
Rapidly respond to potential incidents and events to minimize risk exposure and ensure the confidentiality, integrity, and availability of assets and business processes.
Proactively monitor internal and external-facing environments to strengthen and automate detection and remediation capabilities and reduce incident response times.
Produce analyses of cybersecurity events that include perspectives on the behavior of adversaries.
Conduct analysis of artifacts to determine methods of intrusion and best course of resolution while driving security improvement.
Investigate potential cybersecurity events across multiple environments using various tools and techniques; triage cases and determine when to escalate.
Develop information security policies, standards, and procedures.
Support inquiries from compliance teams and auditors to ensure documentation is complete and processes are in compliance with information security policies.
Support the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices.
Review internal logs and alerts to identify potential cybersecurity events and analyze security data from all systems in real time.
Analyze compromised systems and remediate to a clean state; perform breach indicator assessments to investigate network traffic for malicious activity.
Assist with internal or third-party employee investigations and produce reports identifying and analyzing relevant threats to the enterprise.
Research evolving threats, techniques, tools, and vulnerabilities; stay current with information security program developments and industry frameworks.
Requirements
Bachelor’s degree in Information Technology, Cyber Security, Computer Science, or related discipline.
2+ years of experience working in the Cybersecurity Operations or Information Security.
Relevant technical and industry certifications, such as CISSP, ISSMP, SANS, GIAC, GCIA, CISM, CEH, GCFA, GCFE, GCIH, or GSEC are preferred.
Experience in one or more security domains including Incident Response and Forensics, Security Governance and Oversight, Security Risk Management, Network Security, or Threat and Vulnerability Management preferred.
Experience with information security risk management, including information security audits, reviews, and risk assessments.
Strong Incident Response knowledge and experience.
Theoretical and practical knowledge with Mac OS, Linux, Windows operating systems and clouds.
Experience with security data collection, analysis and correlation.
Understanding of offensive security to include common attack methods.
Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event.
Knowledge and experience in security and regulatory frameworks (ISO 27001, NIST 800 series, FFIEC, SOC2, FedRAMP, STAR, etc.).
Understanding of enterprise detection and response technologies and processes (advanced threat detection tools, intrusion detection/prevention systems, network packet analysis, endpoint detection and response, firewalls, Anti malware/anti-virus, Security Information and Event Management tool) (preferred).
Experienced with CrowdStrike, Tanium, Proofpoint, WAF, O365 security, AWS Security, Wireshark, tcpdump, and open-source incident response and forensic tools (preferred).
Ability to perform risk analysis utilizing logs and other information compiled from various sources.
Understanding of network protocols, operating systems (Windows, Unix, Linux, Databases), and mobile device security.
Knowledge of cloud security, networks, databases, and applications.
Knowledge of the various types of cyber-attacks and their implementations.
A fundamental understanding of enterprise cybersecurity frameworks such as MITRE ATT&CK and Cyber Kill Chain.
Ability to document and explain technical details in a concise, understandable manner.
Experience in operational processes such as security monitoring, data correlation, troubleshooting and security operations.
Well-developed analytic, qualitative, and quantitative reasoning skills.
Demonstrated creative problem-solving abilities.
Ability to support inquiries from compliance teams such as IT risk management and internal and external auditors.
Benefits
The typical base pay range for this role is between $85K - $104K depending on job-related knowledge, skills, experience, and location.
This role may be eligible for certain discretionary performance-based bonus and/or incentive compensation.
Comprehensive health and wellness benefits.
Retirement plans.
Educational assistance and training programs.
Income replacement for qualified employees with disabilities.
Paid maternity and parental bonding leave.
Paid vacation, sick days, and holidays.
Total Rewards program provides colleagues with a competitive benefits package (in accordance with eligibility requirements and respective terms).
Work at an MUFG office or client sites four days per week and work remotely one day (hybrid work arrangement).
Agency and Legislation Analyst at Government of Alberta supporting agency governance and legislative initiatives. Responsible for research, analysis, and compliance in the Mental Health and Addiction ministry.
Project Delivery Analyst III in engineering and professional services firm specializing in architecture, engineering, and automation. Focused on project delivery, continuous improvement, and collaboration in a team environment
Senior System Analyst driving AI - driven transformation in finance processes for a 500+ staff Finance Group. Leading initiatives in business process reengineering, AI application integration, and operational efficiency.
Energy Analyst II responsible for public utility consumption data analysis at ENFRA. Interacts with clients and contractors for reviewing energy efficiency opportunities.
Finance Analyst managing financial projects for research institution. Conducting project management tasks and ensuring compliance with financial regulations.
Customer Support Analyst managing non - solved client demands through final assistance processes at Flash. Engaging proactively with internal departments for improvements while ensuring customer satisfaction.
Sr. Analyst responsible for creating accurate demand forecasts in the IDP Planning department. Collaborating with marketing, sales, and finance teams to optimize inventory and reduce waste.
Senior Analyst performing credit analysis for Retail and Consumer sector at Fitch Ratings. Collaborating with teams on financial modeling and presentations.