Do you want your voice heard and your actions to count?
Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world’s leading financial groups. Across the globe, we’re 120,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.
EDUCATION • Degree or equivalent work experience equally preferable. • Bachelor's degree in Computer Science, Technology, or related field or relevant Certifications with job experience CERTIFICATIONS • [Include information as needed.] WORK EXPERIENCE • • Solid experience in Identity & Access Management • • Experience in the financial services or banking industry preferred • • Solid experience developing and supporting security solutions for identity management and access control • • Single Sign On (SSO), Lightweight Directory Access Protocol (LDAP), and federation experience including system architecture, configuration, monitoring, and ongoing compliance • • Proven expedrience supporting application integrations including: SSO architecture, configuration, monitoring, and compliance • • Experience with the following web servers: Internet Information Systems (IIS), Apache, or IBM • • Experience with the following application servers: WebSphere, JBoss, or WebLogic • • Experience integrating commercial off-the-shelf IAM solutions into a banking environment • • Experience engineering, configuring, and deploying enterprise solutions (load balancing, clustering, replication, geographical failover, etc.). • • Highly experienced in stakeholder management and working across groups to effectively deliver IAM programs to stakeholders and customers FUNCTIONAL SKILLS • • Experience across the following security concentrations: • -- Fundamental knowledge of Windows / Unix operating system (OS) configurations • -- Identity access management – provisioning, deprovisioning, recertification controls • • Experience in creating trending, metrics, and management reports • • Excellent structured query language (SQL), Microsoft 365 skills (Excel, PowerPoint, etc.) • • Deep understanding of information security processes, access control methodologies, and ability to apply the knowledge towards multiverse systems • • Excellent Excel skills (for example, macros, formulas, query from backend database) • • Control knowledge around access management and ability to articulate risk and impact • • Knowledge in industry and government security standards (National Institute of Standards and Technology (NIST), Center for Information Security (CIS), etc.) • • Solid understanding of system logical access and audit controls are desirable. • • Programming and scripting abilities; specifically in Pentaho (PDI), JavaScript, Perl, PowerShell • • Experience with presentation applications such as Tableau or QlikView preferred • • Strong database, OS, software engineering skills • • Strong background in use of ASP.Net, JScript, c#, RDBMS, Office Suite, Win2k8, AIX, RHL 5, xml, php, IIS, PowerShell • • Strong SQL background, ability to write complex SQL queries, stored procedures. • • Knowledge of RSA Identity Access life cycle governance is required • • Strong understanding of information security risk analysis, Identity Access Management and access control methodologies with working knowledge of business applications FOUNDATIONAL SKILLS • Demonstrates leadership • Communicates effectively • Identifies multiple paths to success using analytical and critical thinking as well as decision-making skills • Operates strategically to support a culture of continuous improvement and systems thinking • Makes sound business decisions in a complex work environment • Collaborates with other business functions and divisions to advance business objectives • Is flexible, decisive, and able to establish support from leadership • Monitors industry trends and best practices and applies insights to advance the business • Exhibits and fosters optimism, resilience, flexibility, and openness to others' ideas • Inspires innovation and values learning as a lifelong professional objective • Leads by example, engaging inclusively and with intent • Always acts with integrity • Iterative problem-solving • Serving as a trusted advisor • Positive, driven attitude, passion • Reliable time management and organization skills • Ability to convey technical findings in simple language • Proactive mindset and actions • Aptitude to lead complex efforts with minimal supervision • Willingness to collaborate across the organization • Strong customer service skills RESPONSIBILITIES • High Level Responsibilities: • Monitoring the design and implementation of directory services infrastructure to ensure that the access and administration of user identities and security profiles are secure and efficient. Designing, defining, and developing standard processes of organizational Identity and Access Management solutions. Overseeing activities that provide authorized access to information and protect the confidentiality and integrity of information. Cooperating with other technical security risk analysis functions; recommending enterprise security solutions based on directory service solutions. Monitoring the operation of organization access management applications to ensure compliance with organizational access control strategies. Coordinating information security risk assessments and internal audits to build upon the information security infrastructure. Defining directory services requirements and translating customer needs into hardware and software specifications. Directing and overseeing the optimization of access provisioning processes. Preparing information disaster recovery plans. Documenting directory development results, participating in project reviews and configuration management-code control processes. Providing training sessions on user provisioning and authentication. Initiating, facilitating, and directing activities and training that promote information security awareness among organizational personnel, contractors, alliances and other third parties. • Details: • • Oversee the recertification processes, which includes UAR and folder access recertification/SharePoint access recertification, and service account recertification • • Manage the certification campaigns using recertification tools • • Evaluate and revise the criteria for recertification processes • • Provide metrics for management • • Oversee the revocation process • • Revise the process for certification to be compliant with policies • • Manage training/education of business users for the recertification processes • • Architect, implement, integrate, unit test, and support IAM and Privileged Access Management (PAM) services • • Plan and evaluate IAM and PAM platforms, create technical specifications, develop and perform unit and basic integration testing according to specified requirements • • Provide detailed deployment and support documentation around components developed • • Maintain documentation relevant to operations (operation manual, installation guide, etc.) • • Own and resolve application/solution issues though problem analysis, technical investigation, and resolution of support queries and escalations • • Serve as point of contact and subject matter expert for IAM program information across all business lines / business partner areas • • Drive results in the execution and delivery of initiatives and processes • • Work across groups to effectively communicate IAM and PAM risk matters to stakeholders • • Interpret and drive enforcement of information risk policies, standards, and regulatory requirements • • Lead by influence and building alignment • • Work with representatives from the business/business partner areas • • Communicate clearly any business impacts resulting from new identity and access risks, policies, standards, and controls • • Participate in the recruitment and management of a strong, cohesive team • • Participate in the development of team goals and objectives • • Participate in both strategic and tactical planning that helps to enable and drive the business • • Identify initiative business requirements, technical requirements, resource requirements, budgets, and schedules • • Manage workload, project plans, deliverable, and supervises staff and/or project team members • • Develop and drive the implementation of key metrics (key risk indicators (KRIs), key performance indicators (KPIs)) and communicate results to stakeholders
We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws (including (i) the San Francisco Fair Chance Ordinance, (ii) the City of Los Angeles’ Fair Chance Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair Chance Ordinance, and (iv) the California Fair Chance Act) to the extent that (a) an applicant is not subject to a statutory disqualification pursuant to Section 3(a)(39) of the Securities and Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity Exchange Act, and (b) they do not conflict with the background screening requirements of the Financial Industry Regulatory Authority (FINRA) and the National Futures Association (NFA). The major responsibilities listed above are the material job duties of this role for which the Company reasonably believes that criminal history may have a direct, adverse and negative relationship potentially resulting in the withdrawal of conditional offer of employment, if any.
The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.
We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.
Read Full Description