Perik.ai See who’s hiring. Apply before everyone else.
← Back to all jobs

AI and Automation Analyst

Mufgub
📍 Jersey City, NJ 📅 Posted May 13, 2026
Apply on Mufgub’s website →

About this role

Do you want your voice heard and your actions to count?

Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world’s leading financial groups. Across the globe, we’re 150,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.

With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.

Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.

The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.

Job Summary:

As an AI and Automation Analyst, you will support the development and continuous improvement of threat detection, security monitoring content, and automated response capabilities within the Security Operations Center and Incident Response services. This role is ideal for an early‑career cybersecurity professional with an interest in AI, automation, and detection engineering. You will work alongside senior SCRAT engineers, SOC analysts, and incident responders to help design, tune, and operationalize detections and workflows aligned to frameworks such as MITRE ATT&CK and the cyber kill chain. The role emphasizes hands‑on learning, structured execution, and incremental ownership of automation and AI‑assisted use cases that improve analyst efficiency and security outcomes.

Responsibilities

• Support the development, testing, and tuning of security monitoring use cases and detections aligned to MITRE ATT&CK and identified threat behaviors.
• Assist in building and maintaining automated workflows within SOAR and low‑code platforms to enrich alerts, reduce manual effort, and support consistent response actions.
• Help implement AI‑assisted capabilities such as alert enrichment, case summarization, anomaly flagging, or investigation support under senior guidance and established governance.
• Perform analysis of security events and alert data to validate detection logic and identify false positives, gaps, or automation improvement opportunities.
• Collaborate with SOC, Incident Response, Threat Intelligence, and Forensics teams to ensure detections and automations align with operational needs and response procedures.
• Contribute to documentation, playbooks, and runbooks related to detections, automations, and monitoring workflows.
• Support basic reporting and metrics related to detection coverage, alert quality, and automation effectiveness.
• Stay current on emerging threats, attack techniques, and automation trends relevant to detection engineering and SOC operations.

Qualifications

• Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, Data Analytics, or a related field, or equivalent practical experience.
• Foundational understanding of security monitoring concepts, including SIEM, alerting, and incident handling workflows.
• Familiarity with security frameworks such as MITRE ATT&CK and high‑level stages of the cyber kill chain.
• Interest in or introductory experience with automation, scripting, APIs, or low‑code/no‑code platforms.
• Basic understanding of AI or machine learning concepts (e.g., what LLMs are used for, supervised vs unsupervised learning), with interest in applying them responsibly in security operations.
• Strong analytical and problem‑solving skills, with the ability to break down ambiguous security problems into actionable tasks.
• Ability to document work clearly and follow established processes and operating procedures.
• Exposure to cloud, endpoint, network, or application security concepts is a plus but not required.
• Relevant coursework, labs, internships, or certifications (e.g., Security+, SANS fundamentals) are beneficial but not mandatory.

Education:

•Bachelor's degree in Computer Science or a closely-related discipline, or an equivalent combination of formal education and experience

“Visa sponsorship/support is based on business needs. We do not anticipate providing visa sponsorship/support for this position.”

The typical base pay range for this role is as follows:

• New York / New Jersey: $85k–$123k

depending on job-related knowledge, skills, experience and location. This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, and paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below.

Our hybrid work schedule is four days on-site and work remotely one day per week.

MUFG Benefits Summary

We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws (including (i) the San Francisco Fair Chance Ordinance, (ii) the City of Los Angeles’ Fair Chance Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair Chance Ordinance, and (iv) the California Fair Chance Act) to the extent that (a) an applicant is not subject to a statutory disqualification pursuant to Section 3(a)(39) of the Securities and Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity Exchange Act, and (b) they do not conflict with the background screening requirements of the Financial Industry Regulatory Authority (FINRA) and the National Futures Association (NFA). The major responsibilities listed above are the material job duties of this role for which the Company reasonably believes that criminal history may have a direct, adverse and negative relationship potentially resulting in the withdrawal of conditional offer of employment, if any.

The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.

We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.

This listing was aggregated by Perik.ai from Mufgub’s public job board. Click the button above to view the full job description and apply directly.
Explore more jobs
More from Mufgub Browse all AI & tech jobs

Perik.ai is an AI & tech job board that aggregates the latest openings from top companies — updated daily so you can apply before everyone else.

About FAQ Privacy Policy Terms of Service Contact