Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy, and consent to receive emails from Rise
Jobs / Job page
Threat Detection & Response Tier 2, Associate Vice President image - Rise Careers
Job details

Threat Detection & Response Tier 2, Associate Vice President

Do you want your voice heard and your actions to count?

Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world’s leading financial groups. Across the globe, we’re 120,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.

With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.

Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.

The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.

Job Summary  

In this role you will focus on researching potential cybersecurity threats to various systems, technologies, operations, and programs throughout multiple environments. You will perform analysis based on this research to determine the risk to the organization and take appropriate actions based upon that analysis. Responsibilities include rapidly responding to potential incidents and events to minimize risk exposure and ensure the confidentiality, integrity, and availability of assets and business processes. Additionally, you will proactively monitor internal and external-facing environments, seek opportunities to strengthen and automate detection and remediation capabilities, reduce response times for incidents, and produce analyses of cybersecurity events that include perspectives on the behavior of adversaries. 

  

Major Responsibilities 

  • Conduct analysis of artifacts to determine methods of intrusion and best course of resolution while driving security improvement 
  • Theoretical and practical knowledge with Mac OS, Linux and Windows operating systems 
  • Experience with security data collection, analysis and correlation 
  • Well-developed analytic, qualitative, and quantitative reasoning skills  
  • Demonstrated creative problem-solving abilities 
  • Security event monitoring, investigation, and overall incident response process 
  • Investigate potential cybersecurity events across multiple environments using various tools and techniques 
  • Development of information security policies, standards, and procedures 
  • Strong time management skills to balance multiple activities and lead junior analysts as needed 
  • Understanding of offensive security to include common attack methods 
  • Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event  
  • A diverse skill base in both product security and information security including organizational structure and administration practices, system development and maintenance procedures, system software and hardware security controls, access controls, computer operations, physical and environmental controls, and backup and recovery procedures. 
  • Detailed knowledge and experience in security and regulatory frameworks (ISO 27001, NIST 800 series, FFIEC, SOC2, FedRAMP, STAR, etc.) 
  • Support inquiries from compliance teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes are in compliance with information security policies 
  • Create reports analyzing activities or trends both within and outside of the organization 
  • Support the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats 
  • Reviews internal logs and alerts to identify potential cybersecurity events. Triage cases based on output from automated alerts, and determine when to escalate to other teams 
  • Monitors external service provider activity to detect potential cybersecurity events 
  • Analyzes security data from all systems in real time to spot and thwart potential threats, attacks, and other violations 
  • Analyzes compromised systems and remediates to a clean state 
  • Performs breach indicator assessments to investigate network traffic for malicious activity 
  • Assists with internal or third-party employee investigations 
  • Assists in the production of various reports which identify and analyze relevant upcoming and ongoing threats to the enterprise 
  • Research evolving threats, techniques, tools, and vulnerabilities in support of information security efforts 
  • Stays current with information security program developments, industry frameworks, changes in the company, industry trends, and current security practices 

  

Qualifications 

  • Bachelor’s degree in Information Technology, Cyber Security, Computer Science, or related discipline  
  • 5 + years of experience working in the Cybersecurity Operations or Information Security 
  • Relevant technical and industry certifications, such as CISSP, ISSMP, SANS, GIAC, GCIA, CISM, CEH, GCFA, GCFE, GCIH, or GSEC are preferred 
  • Experience in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics preferred 
  • Experience with information security risk management, including information security audits, reviews, and risk assessments 

Desired Skills 

  • Understanding of enterprise detection and response technologies and processes (advanced threat detection tools, intrusion detection/prevention systems, network packet analysis, endpoint detection and response, firewalls, Anti malware/anti-virus, Security Information and Event Management tools, etc.) 
  • Experienced with CrowdStrike, Tanium, Proofpoint, WAF, O365 security, AWS Security, Wireshark, tcpdump, and open-source incident response and forensic tools 
  • Ability to perform risk analysis utilizing logs and other information compiled from various sources 
  • Understanding of network protocols, operating systems (Windows, Unix, Linux, databases), and mobile device security 
  • Knowledge in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics 
  • Knowledge of cloud security, networks, databases, and applications 
  • Knowledge of the various types of cyber-attacks and their implementations 
  • A fundamental understanding of enterprise cybersecurity frameworks such as MITRE ATT&CK and Cyber Kill Chain 
  • Ability to document and explain technical details in a concise, understandable manner 
  • Experience in operational processes such as security monitoring, data correlation, troubleshooting, security operations, etc. 

The typical base pay range for this role is between $110K - $135K depending on job-related knowledge, skills, experience and location. This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, and paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below.

MUFG Benefits Summary

We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws (including (i) the San Francisco Fair Chance Ordinance, (ii) the City of Los Angeles’ Fair Chance Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair Chance Ordinance, and (iv) the California Fair Chance Act) to the extent that (a) an applicant is not subject to a statutory disqualification pursuant to Section 3(a)(39) of the Securities and Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity Exchange Act, and (b) they do not conflict with the background screening requirements of the Financial Industry Regulatory Authority (FINRA) and the National Futures Association (NFA). The major responsibilities listed above are the material job duties of this role for which the Company reasonably believes that criminal history may have a direct, adverse and negative relationship potentially resulting in the withdrawal of conditional offer of employment, if any.

The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.

We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.

 

Average salary estimate

$122500 / YEARLY (est.)
min
max
$110000K
$135000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

Similar Jobs
Photo of the Rise User
SWBC Hybrid San Antonio, TX
Posted 8 days ago

Seeking a skilled DevOps Engineer at SWBC to drive automation and cloud deployment excellence within a dynamic fintech environment.

Photo of the Rise User

An experienced Systems Engineer II is needed to lead and support Microsoft-centric IT solutions for small-to-medium businesses in Dallas with a focus on consulting and project management.

Posted 11 days ago

Berkley Technology Services requires a seasoned Security Architect to lead and innovate enterprise cybersecurity architecture aligned with industry standards.

Photo of the Rise User
Danaher Hybrid Brea, California, United States
Posted 9 days ago

Lead the Oracle ERP Financials technical architecture at Beckman Coulter Diagnostics to drive innovative ERP solutions and cloud transformation initiatives.

Posted 5 days ago

GovCIO is hiring an experienced Cloud Migration Engineer to lead cloud migration efforts in a fully remote role requiring an active Secret clearance.

Photo of the Rise User
Box Hybrid Austin, TX, United States
Posted 4 days ago
Customer-Centric
Dare to be Different
Diversity of Opinions
Feedback Forward
Take Risks
Growth & Learning
Transparent & Candid

Box is looking for a passionate IT Support Engineer II to deliver exceptional onsite technical support and contribute to global IT initiatives in Austin, TX.

Photo of the Rise User

Lead Cloudflare’s vulnerability management program to protect a global network while fostering innovation and security excellence.

Ascera Hybrid No location specified
Posted 17 hours ago

SP6 is looking for a skilled and customer-focused Managed Services Splunk Engineer to support complex Splunk environments remotely across North America.

Photo of the Rise User
BillingPlatform Hybrid No location specified
Posted 9 days ago

An innovative SaaS leader in cloud revenue management seeks a DevOps Engineer experienced in automation, CI/CD, Kubernetes, and security compliance to join their hybrid team.

CECONY Hybrid New York, New York, United States
Posted 13 days ago

Tech Lead role focused on leading Outage Management Systems projects and vendor collaboration at Con Edison in New York.

Photo of the Rise User
Posted 14 days ago

Experienced ISSOs are needed at Peraton to ensure security compliance and risk management for critical national security systems at MacDill AFB.

Photo of the Rise User

UMMS is looking for an experienced Informatics Training and Support Analyst to manage clinical and business application training and support for ambulatory care environments.

Photo of the Rise User
Posted 2 days ago
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Customer-Centric
Rapid Growth
Social Impact Driven
Maternity Leave
Paternity Leave
Medical Insurance
Dental Insurance
Vision Insurance
Mental Health Resources
Life insurance
Disability Insurance
Health Savings Account (HSA)
Flexible Spending Account (FSA)
401K Matching
Paid Holidays

Take a leadership role at DigitalOcean to drive bug bounty operations and vulnerability management within a pioneering cloud technology company.

MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, hybrid
DATE POSTED
April 8, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!