[Close] 

Splunk Engineer, Information Security, AVP

Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), the 5th largest financial group in the world with total assets of over $2.4 trillion (as ranked by SNL Financial, April 2016) and 140,000 colleagues in nearly 50 countries. In the U.S., we?re 13,000 strong, working together to positively impact every customer, organization, and community we serve. We achieve this by delivering on our values, putting people first, fostering long-term relationships built on honesty and mutual understanding, and inspiring the best in each other. This is all part of our inclusive, high-performing culture supported by Total Rewards that include our cash balance pension plan. Join a team that?s working to fulfill its vision to be the world?s most trusted financial group.
Splunk Engineer, Information Security, AVP


Job Summary
Our group operates Splunk, an operational big data intelligence software, as a service for various teams within MUFG. We are seeking a motivated engineer to continue to build up our Splunk implementation, and to help our customers to fully utilize the power of Splunk. As a member of the team, the Splunk engineer will implement various solutions on Splunk, as well as supporting test and production Splunk installations. Successful candidates need to possess expert level hands-on solution building and administrative experience in Splunk. In additon, This level has all the tasks of a Senior Specialist with the added task of integrating information and network security CSOC and APP-SOC-MONITORING solutions. Enforce Splunk security strategies and support existing Splunk systems in accordance with policies, standards, guidelines and procedures. This is an expert level position. The expert will possess a level of knowledge and a skill set that goes beyond that of a Sr. Analyst. The expert will have detailed knowledge of several platforms and security systems.
Responsibilities
Deployment and support of the full lifecycle of Splunk Enterprise
Design, implement, document, and handle all aspects of Linux as it relates to Splunk
Identify repetitive, manual tasks and automate them
Develop effective tooling, alerts, and response to both identify and address reliability risks
Write and maintain moderately complicated scripts in shell scripting (Bash, Python, Ruby, JavaScript, and/or Perl) in helping to automate and scale
Provide technical leadership and mentor junior team members
Build with quality and integrity
Key Qualifications 4-5 year minimum experience with Splunk.
5 years Unix/Linux system administration experience
DevOps experience with Ansible (or Puppet/Chef/Salt), Git and Jenkins
Familiarity with other big data technologies such as Hadoop, Cassandra.
Familiar with one or more languages such as Python, Java, C/C , shell scripting/regular expression, SQL and HTML/Javascript
A strong understanding of high-traffic, large-scale distributed systems and the ability to perform root cause analysis on stability and performance related events in such environments
Familiarity with continuous integration and continuous deployment systems and the ability to describe pros, cons, and pitfalls of the various solutions.
High familiarity with Git and version control systems
Experience with Linux systems; must understand how processes, users, groups, privileges and package managers work
Hands on experience in backup and restore tools.
Experience with automation and configuration management systems such as Puppet, Ansible, Salt, etc.
Expert proficiency in UNIX scripting languages (Bash, Ruby, Python) and some experience with compiled languages (Go, Java, etc)
Experience with configuration and troubleshooting of Linux, Java, Tomcat, and other middleware technologies
Passion for resolving reliability issues and identify strategies to mitigate going forward
Experience with Cloud Computing platforms (particularly AWS) a plus
Strong Linux system-level analysis capabilities
Passion for clear communication, especially prioritizing concerns to align with the team and business goals.
Deep network analysis experience
Thorough understanding of networking
Support large-scale deployments with data feeds from multiple data centers
Develop Splunk correlation searches to identify and address emerging security threats through the use of continuous monitoring, alerting and analytics
Installing, configuring and administering Splunk Enterprise Server and Splunk Universal/heavy forwarders in large distributed environment
Installing and configuring Splunk apps in a clustered environment
Administering Splunk knowledge objects
Creating roles and user authentication
Integrating events from non-traditional log services
Administering Splunk cluster components (search head cluster, indexer cluster and distributed management console) including version upgrades, permissions, and audit compliance
Mentoring other Information Security team members to support and assist in Splunk-related activities
Assists in setting business driven SLAs and owns evolving the environment to meet or exceed those SLAs.
Performs advanced troubleshooting and issue resolution for all supported systems.
Utilize monitoring tools for performance monitoring and capacity management. Plan proactive system changes/upgrades based on performance and capacity data.
Create and maintain documentation for team standards, procedures, common issue resolution for other IT staff and systems users.
Participate in team on-call rotation schedules. On-call provides 24/7 availability during rotation to support issues and assist team with scheduled operational tasks after production hours.
Position requires working after normal business hours to implement changes to supported systems.
Demonstrate good judgment by escalating issues to the manager when appropriate.
History working with or supporting Microsoft C# applications, SQL Server, IIS, AWS and ntiered solutions
Some experience with T-SQL skills, review T-SQL code and procedures
The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.
We are proud to be an Equal Opportunity / Affirmative Action Employer and committed to leveraging the diverse backgrounds, perspectives, and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate in employment decisions on the basis of any protected category.
A conviction is not an absolute bar to employment. Factors such as the age of the offense, evidence of rehabilitation, seriousness of violation, and job relatedness are considered in all employment decisions. Additionally, it's the bank's policy to only inquire into a candidate's criminal history after an offer has been made. Federal law prohibits banks from employing individuals who have been convicted of, or received a pretrial diversion for, certain offenses.
Job: Systems / Technology
Title: Splunk Engineer, Information Security, AVP
Location: CALIFORNIA-Monterey Park
Requisition ID: 10019896-WD


Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Senior Security Engineer - Information Securit...
Los Angeles, CA University of Southern California
Staff Engineer, Information Security - Network...
Pleasanton, CA Ellie Mae, Inc.
Sr. SOC (Security Operations Center) Engineer ...
Santa Clara, CA Palo Alto Networks
Vulnerability Management Software/Data Enginee...
San Francisco, CA Salesforce.com, Inc
Sr. Engineer, Information Security
Pleasanton, CA Ellie Mae, Inc.