MUFG

Analyst - UAM

MUFG Global Service Private Ltd. - Bengaluru (BCIT) Full time

Do you want your voice heard and your actions to count?

Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world’s leading financial groups. Across the globe, we’re 150,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.

With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.

Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.

EDUCATION • Degree or equivalent work experience equally preferable. • Degree in computer science, technology, or related field. CERTIFICATIONS • [Include information as needed.] WORK EXPERIENCE • • Practical experience working directly within an identity and access management (IAM) team • • Scripting skills • • Experience in creating trending, metrics, and management reports • • Experience working with leading IAM tools and services • • Experience with the following web servers: Internet Information Systems (IIS), Apache, or IBM HTTP Server • • Experience with the following application servers: WebSphere, JBoss, or WebLogic • • Experience working in global, complex, matrix-managed organization • • Experience in the banking or finance industries preferred FUNCTIONAL SKILLS • Understanding of identity and access management (IAM) principals, methodology, and solutions, including access control (role-based and discretionary), authentication, authorization, provisioning, approvals, and workflows • Demonstrated knowledge of IAM functions such as identification, provisioning, de-provisioning, account recertification, privilege access management, and entitlement management • Demonstrated ability to independently manage the user authorization request (UAR) queue • Programming/debugging skills: Unix Shell, Perl, Java, JavaScript • Knowledge of relational database management systems (RDBMS) and directory services (Lightweight Directory Access Protocol (LDAP), in particular active directory) including system architecture, configuration, and monitoring • Data analysis skills in Excel (Visual Basic for Applications preferred) • Understanding of security issues, application-level security, encryption, and vulnerabilities • Excellent Excel skills (for example, macros, formulas, query from backend database) • Control knowledge around access management and ability to articulate risk and impact • Knowledge in industry and government security standards (National Institute of Standards and Technology (NIST), Center for Information Security (CIS), etc.) • Solid understanding of system logical access and audit controls are desirable. • Programming and scripting abilities; specifically in Pentaho (PDI), JavaScript, Perl, PowerShell • Experience with presentation applications such as Tableau or QlikView preferred • Strong database, operating system (OS), software engineering skills • Strong background in use of ASP.Net, JScript, c#, RDBMS, Office Suite, Win2k8, AIX, RHL 5, xml, php, IIS, PowerShell • Strong structured query language (SQL) background, ability to write complex SQL queries, stored procedures. • Knowledge of RSA Identity Access life cycle governance is required • Strong understanding of information security risk analysis, Identity Access Management and access control methodologies with working knowledge of business applications • Ability to document and explain technical details in a concise, understandable manner FOUNDATIONAL SKILLS • Communicates effectively • Identifies multiple paths to success through the development of analytical, critical thinking, and decision-making skills • Exercises sound judgement and strives for continuous improvement • Demonstrates optimism, resilience, flexibility, and openness to others' ideas • Learns while doing • Actively listens and asks thoughtful questions • Leverages available technology to achieve efficiency and results • Engages inclusively and with intent • Always acts with integrity • Analytical thinking • Iterative problem-solving • Serving as a trusted advisor • Solid organizational skills with the ability to multi-task various initiatives and activities • Ability to document and explain technical details in a concise, understandable manner RESPONSIBILITIES • High level responsibilities include: • Assist in the configuration and implementation of IAM systems and applications; assist with the installation of security software products for enterprise platforms. • Perform user provisioning, authentication, and access governance adhering to established guidelines; develop and implement access control lists for specific computer resources; conduct regular reviews on user access authorization; provide technical support and troubleshooting when security or access problems occur. • Maintain systems and access control lists and monitor all procedures and audit logs to protect data from unauthorized users; identify, report, and resolve common security violations; develop and implement security monitoring and violation reports that identify attempts to access unauthorized materials; conduct vulnerability assessments to improve security standards and procedures. • Develop guidelines and reports on the usage, control, maintenance and auditing of information and computer resources. • Educate, train, and support end-users and staff members on gaining security practice and procedure knowledge; maintain and distribute documentation and information on security-related practices; publish, monitor, and mandate information and computer security policies. • Provide recommendations on mitigating or removing vulnerabilities within technology systems, while administering firewall components and implementing daily support network; schedule and supervise periodic network security assessments. • Details: • • Process approved UAR forms to provide and/or remove access from various platforms while following pre-established procedures • • Perform certifications • • De-provision access rights when users leave the company or transition into a different role that no longer requires access • • Regularly review role entitlements to confirm no excess access rights are granted • • Log and monitor remote access communications and use strong authentication and encryption to secure communications • • Remove access rights to external applications when a user leaves the company • • Grant remote access, including virtual private network (VPN) or virtual desktop infrastructure (VDI), only if a business need exists • • Control use of remote access through management approvals and regular reviews • • Work with internal and client-side resources to deploy and support Identity Governance in high-availability environments • • Analyze and process the user access recertification campaign as per the bank’s standards to support the core business and infrastructure applications • • Work with the business managers and system owners to update and ensure information is current • • Define and create user access/activity reports, generate reviews for the managers, and collect all the artifacts for documentation purposes in a timely manner • • Run daily reports and ad-hoc reports requested by senior managers • • Administer/manage user access recertification tools to ensure the system is operational • • Research evolving IAM techniques and tools in support of future IAM efforts • • Stay current with information security program developments, industry frameworks, and changes in the bank that may impact the group • Additional responsibilities may include the following: • • Support preventive systems used to stop and/or deter security breaches • • Participate in security assessments and reviews • • Help maintain and facilitate a corporate wide security awareness program • • Maintain familiarity with industry trends and current security practices

Mitsubishi UFJ Financial Group (MUFG) is an equal opportunity employer. We view our employees as our key assets as they are fundamental to our long-term growth and success. MUFG is committed to hiring based on merit and organsational fit, regardless of race, religion or gender.