Bilingual Global Incident Response (GIR) Analyst
Request Title: Bilingual Global Incident Response (GIR) AnalystDesired Start Date: ASAPDuration: 12 Months, Hrs/Wk:40.00Client: MUFGWork Location: Jersey City, NJ (Hybrid/Onsite, C2H)Description:Work location: 4 days onsite per week in Jersey City, NJDuration: 12 months contract initially with contract to hire option.Note: Please submit bilingual candidates only (Japanese and English). Native Japanese candidates preferred.The Bilingual Global Incident Response (GIR) Analyst will be responsible for the following:Conduct analysis of artifacts to determine methods of intrusion and best course of resolution while driving security improvementStrong Incident Response knowledge and experienceTheoretical and practical knowledge with Mac OS, Linux, Windows operating systems and cloudsExperience with security data collection, analysis and correlationWell-developed analytic, qualitative, and quantitative reasoning skillsDemonstrated creative problem-solving abilitiesSecurity event monitoring, investigation, and overall incident response processInvestigate potential cybersecurity events across multiple environments using various tools and techniquesDevelopment of information security policies, standards, and proceduresStrong time management skills to balance multiple activities and lead junior analysts as neededUnderstanding of offensive security to include common attack methodsUnderstanding of how to pivot across multiple datasets to correlate artifacts for a single security eventA diverse skill base in both product security and information security including organizational structure and administration practices, system development and maintenance procedures, system software and hardware security controls, access controls, computer operations, physical and environmental controls, and backup and recovery procedures.Detailed knowledge and experience in security and regulatory frameworks (CRI, ISO 27001, NIST 800 series, FFIEC, SOC2, STAR, etc.)Support inquiries from compliance teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes are in compliance with information security policiesCreate reports analyzing activities or trends both within and outside of the organizationSupport the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threatsReviews internal logs and alerts to identify potential cybersecurity events. Triage cases based on output from automated alerts, and determine when to escalate to other teamsMonitors external service provider activity to detect potential cybersecurity eventsAnalyzes security data from all systems in real time to spot and thwart potential threats, attacks, and other violationsAnalyzes compromised systems and remediates to a clean statePerforms breach indicator assessments to investigate network traffic for malicious activityAssists with internal or third-party employee investigationsAssists in the production of various reports which identify and analyze relevant upcoming and ongoing threats to the enterpriseResearch evolving threats, techniques, tools, and vulnerabilities in support of information security effortsStays current with information security program developments, industry frameworks, changes in the company, industry trends, and current security practicesQualificationsBoth English and Japanese language skills as well as cultural fluency are strongly required.Bachelor's degree in Information Technology, Cyber Security, Computer Science, or related discipline5 + years of experience working in the Cybersecurity Operations or Information SecurityRelevant technical and industry certifications, such as CISSP, ISSMP, SANS, GIAC, GCIA, CISM, CEH, GCFA, GCFE, GCIH, or GSEC are preferredExperience in one or more security domains including Incident Response and Forensics, Security Governance and Oversight, Security Risk Management, Network Security, or Threat and Vulnerability Management preferred