Student Veterans of America Jobs

Welcome to SVA’s jobs portal, your one-stop shop for finding the most up to date source of employment opportunities. We have partnered with the National Labor Exchange to provide you this information. You may be looking for part-time employment to supplement your income while you are in school. You might be looking for an internship to add experience to your resume. And you may be completing your training ready to start a new career. This site has all of those types of jobs.

Here are a few things you should know:
  • This site is mobile friendly. You do not need a log-in or password to access information.
  • Jobs on this site are original and unduplicated and come from three sources: the Federal government, state workforce agency job banks, and corporate career websites. All jobs are vetted to ensure there are no scams, training schemes, or phishing.
  • The site is refreshed daily to remove out-of-date content.
  • The newest jobs are listed first, so use the search features to match your interests. You can look for jobs in a specific geographical location, by title or keyword, or you can use the military crosswalk. You may want to do something different from your military career, but you undoubtedly have skills from that occupation that match to a civilian job.

Job Information

MUFG Insider Threat Security Engineer, AVP in Tampa, Florida

Do you want your voice heard and your actions to count?

Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), the 7th largest financial group in the world. Across the globe, we’re 120,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.

With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.

Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.

The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.

MUFG is seeking an Insider Threat Engineer to utilize scientific methodologies using predictive analytics to help identify and convey insider risk and risk management activities to our business operations. Works closely with Data Loss Prevention and Global Security Operations teams and serves as the subject matter expert for the data analytics discipline. Provides recommendations and contributes to the overall strategic direction of the Insider Threat program. Will support the Insider Threat Operations Team and be responsible for maintaining systems to facilitate the analysis of insider threat alerts and events, integrating available data sources from a variety of internal and external sources into the Insider Threat Management workflow, cleaning data as necessary, and developing associated analytical models.

RESPONSIBILITIES

  • Generally Monday through Friday 8:00 am – 5:00 pm, but frequent work outside of normal operating hours is expected

  • Ability to work overnight weekends (Saturday, Sunday) but not limited to shift work (morning, afternoon, and evening)

  • This role requires a highly curious and skilled practitioner to identify and respond to high-risk activity and anamalous behaviors that may be indicative of harmful insider threat activity

  • This includes intellectual property theft, espionage, fraud, sabotage, and unauthorized data disclosure

  • Must possess the ability to document findings including timelines, evidence and artifacts relating to each event

  • Ability to coordinate meetings with device owners, managers, and forensics teams as needed to verify evidence

  • Understand data loss prevention, data classification, SIEM a plus

  • Manages various analytical tools and information systems to identify and follow trends in order to provide actionable intelligence

  • Experience with server administration in both on-premises and cloud environments. Knowledge of contemporary SIEM/UEBA platforms and their application to cyber threat analysis

  • Experience with writing small bash, Splunk scripts, SQL queries and java programs

  • Knowledge of networking protocols, encryption, firewalls, host and network intrusion detection systems, data loss prevention systems, Windows and Linux

  • Understanding of latest security trends, especially those associated with insider threat detection, response, and mitigation

  • Security and IT metrics experience a plus; report creation abilities strongly desired

  • Evaluate / Build SIEM queries, reports, and dashboards to make recommendations on changes of events being monitored

  • Exceptional ability to execute and drive change while never losing site of the basics

  • Produce documentation that will help to educate and socialize program updates to our key stakeholders

  • Zero tolerance for operational, design, and strategy-oriented gaps

QUALIFICATIONS

  • Bachelor's degree in Information Security or a closely related discipline, or equivalent related experience

  • Nice to have: Carnegie Mellon University Certified Insider Threat Program Manager (ITPM), CEH, Security+ or related SANS certification

  • Extensive technical experience in either reverse engineering/malware analysis, insider threat, threat intelligence, incident response, security operations, or related information security field.

  • Ability to demonstrate analytical expertise, attention to detail, excellent critical thinking, logic, and solution orientation to learn and adapt quickly

  • Practical knowledge of recent or emerging cyber threats

  • Comfortable working in a fast-paced environment

  • Experience with investigations within security domain and tools

  • Possess excellent communication and presentation skills

  • Experience with Windows and Linux Operating Systems

  • An ability to act independently, prioritizing and organizing day to day tasks and needs as appropriate

  • Knowledge in DLP and big data technology

  • Background in security event analysis and Network traffic Protocols

  • Able to work well both independently and as part of a team

  • Excellent communication skills and ability to adapt to the audience

  • Generally Monday through Friday 8:00 am – 5:00 pm, but frequent work outside of normal operating hours is expected

  • Ability to work overnight weekends (Saturday, Sunday) but not limited to shift work (morning, afternoon, and evening)

  • This role requires a highly curious and skilled practitioner to identify and respond to high-risk activity and anamalous behaviors that may be indicative of harmful insider threat activity

  • This includes intellectual property theft, espionage, fraud, sabotage, and unauthorized data disclosure

  • Must possess the ability to document findings including timelines, evidence and artifacts relating to each event

  • Ability to coordinate meetings with device owners, managers, and forensics teams as needed to verify evidence

  • Understand data loss prevention, data classification, SIEM a plus

  • Manages various analytical tools and information systems to identify and follow trends in order to provide actionable intelligence

  • Experience with server administration in both on-premises and cloud environments. Knowledge of contemporary SIEM/UEBA platforms and their application to cyber threat analysis

  • Experience with writing small bash, Splunk scripts, SQL queries and java programs

  • Knowledge of networking protocols, encryption, firewalls, host and network intrusion detection systems, data loss prevention systems, Windows and Linux

  • Understanding of latest security trends, especially those associated with insider threat detection, response, and mitigation

  • Security and IT metrics experience a plus; report creation abilities strongly desired

  • Evaluate / Build SIEM queries, reports, and dashboards to make recommendations on changes of events being monitored

  • Exceptional ability to execute and drive change while never losing site of the basics

  • Produce documentation that will help to educate and socialize program updates to our key stakeholders

  • Zero tolerance for operational, design, and strategy-oriented gaps

The typical base pay range for this role is between $121K - $1421K depending on job-related knowledge, skills, experience and location. This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, and paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below.

MUFG Benefits Summary (https://careers.mufgamericas.com/sites/default/files/document/2023-01/mb-live-well-work-well.pdf)

The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.

We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.

At MUFG, our colleagues are our greatest assets. Our Culture Principles provide a roadmap for how each of our colleagues must think and act to become more client-obsessed, inclusive and innovative. They reflect who we are, who we want to be and what we expect from one another. We are excited to see you take the next step in exploring a career with us and encourage you to spend more time reviewing them!

Our Culture Principles

  • Client Centric

  • People Focused

  • Listen Up. Speak Up.

  • Innovate & Simplify

  • Own & Execute

DirectEmployers