CyberSecurity Threat Detection & Response; Splunk, SIEM), Associate Vice President
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, IT Consultant, Information Security
Do you want your voice heard and your actions to count?
Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world’s leading financial groups. Across the globe, we’re 150,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.
Job Summary:As a Threat Detection and Response Engineer you will occupy a crucial position in our Security Operations center, with your primary focus centered on conceiving, refining and implementing use cases and strategies that intricately align with the global security frameworks. Your expertise with this framework and the cyber security kill chain will form the foundation where our defensive capabilities are fortified, ensuring the ability to not only identify and respond, but also impede cyber threats in a proactive manner.
MajorResponsibilities:
Collaboration and Innovation:
Work closely with cross-functional teams, including Threat Intelligence, Incident Response, Forensics and Security Operations to collaboratively craft custom security use cases founded on the principles of global security frameworks. Harnessing the collective intelligence to device strategies that yield valuable results.Draw upon your comprehensive understanding of the cyber landscape to design and execute advanced detection and response strategies, employing an array of sophisticated security tools and technologies. Your solutions will serve as the first line of defense, minimizing potential risks and vulnerabilities.
Apply your extensive knowledge of attack patterns, tactics and techniques to conduct in-depth analysis of cyber threats. Unearth the subtle nuances that set apart malicious activities from innocuous ones, thus empowering the firm with a heightened security posture.
In the ever-changing landscape of cyber threats, stat at the forefront of industry trends and emerging attack vectors. This ensures that the strategies you develop remain resilient and effective in the face of new challenges.
Participate in red teaming and penetration testing exercises to subject the developed use cases to real-world simulation. By doing so, ensuring their robustness and effectiveness in diverse scenarios.
Produce and report valuable metrics to leadership and cross functional teams to quantify the value and effectiveness of use cases in an ever-changing threat landscape.
Bachelor’s degree in Information Technology, Cyber Security, Computer Science, or related discipline or equivalent work experience
Preferred
Certifications:
CISSP, ISSMP, SANS, GSEC, GCFA, GNFA, GIAC and/or GCIH5-8 years in Information Security or other Information Technology fields
Experience working within the Financial Services Industry preferred
Experience with use case and automation related to UEBA, SIEM, SOAR, DLP, EDR and other open-source security tools
Knowledge of models/frameworks such as Cyber Kill Chain, MITRE and CRI (Cyber Risk Institute)
Well-developed analytic, qualitative, and quantitative reasoning skills
Demonstrated creative problem-solving abilities
Security event monitoring, investigation, and overall incident response process
Strong time management skills to balance multiple activities and lead junior analysts as needed
Understanding of offensive security to include common attack methods
Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event
A diverse skill base in both product security and information…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).