MUFG Union Bank Jobs

Mobile mufg Logo

Job Information

MUFG Union Bank Threat Detection & Response, Assistant Vice President - Remote in Austin, Texas

Do you want your voice heard and your actions to count?

Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), the 5th largest financial group in the world. Across the globe, we’re 180,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.

With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.

Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.

This is a remote position. A member of our recruitment team will discuss location preferences with you in more detail.

Threat Detection & Response, Assistant Vice President - Remote

This role can be remote in any of these States: Arizona, Texas , North Carolina, Washington, Oregon, California, Illinois, Kentucky, Georgia, New York, Connecticut, Massachusetts, New Jersey, District of Columbia, Utah, Nebraska, Minnesota, Missouri, Arkansas, Indiana, Ohio, Tennessee, Alabama, Florida, South Carolina, Virginia.

Job Summary

In this role you will focus on researching threats posed by cyber criminals to various systems, technologies, operations, and programs and analyzing research to determine a cyber criminal's capabilities, intentions, and attack approaches, including those with multiple phases. Responsibilities include rapidly responding to incidents to minimize risk exposure and ensure system availability; proactively monitoring internal and external-facing environments; seeking opportunities to automate detection and remediation and reduce response times for incidents; and producing reports and briefings that include perspectives on the behavior of adversaries.

Major Responsibilities:

  • Execute processes responsible for the advanced analysis of security threats (malicious code, intrusion logging, etc.) to proactively develop detection for such threats and develop mitigation efforts

  • Support inquiries from compliance teams such as IT risk management and internal and external audit, to ensure documentation is complete and in compliance with information security policies

  • Identify, evaluate, and monitor threats that could affect operational and business activities

  • Manage and support development of security operations playbooks to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats

  • Coordinate CSIRT activities in the case of security event, outside security threat, notification of cyber security breach, or cyber security investigation

  • Conduct post-mortem discussions and provide a summary of lessons learned including filing self-identified issues(SII) and reporting status on remediation and corrective actions

  • Develop the security event simulation program and conduct security event table top exercises at the global level

  • Develop and enhance cross-organization relationships with front line operations teams and risk managers.


  • Bachelor's degree in Computer Science or technology-related field (or equivalent work experience).

  • 5-6 years responding to cyber incidents or emerging threats and developing advanced threat detection capabilities

  • Experience in the banking or finance industries preferred

  • Knowledge of - cyber threats and vulnerabilities, network traffic analysis methods, risk methodologies to assess impact, tactics, techniques, and procedures (TTPs) for intrusion sets., forensic analysis and malware reverse-engineering, cloud security principles

  • Experience in formulating mitigation and response strategies to emerging threats and/or cyber incidents, correlating disparate data sets and security components for holistic threat and risk depiction, data interrogation and data visualization techniques, reconstructing and attributing threat activity to associated threat vector(s) and tactics/techniques.

The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.

We are proud to be an Equal Opportunity/Affirmative Action Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.