Cyber Security Threat Modeler - VP
Listed on 2026-02-16
-
IT/Tech
Cybersecurity, IT Consultant
Overview
Do you want your voice heard and your actions to count?
Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world’s leading financial groups. Across the globe, we’re 150,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.
Job SummaryThis role will focus on integration and execution of an effective Threat Modeling program into MUFG's Enterprise Information Security Risk Next Generation across Combined U.S. Operations (CUSO) processes and overall Application Security model. Responsibilities include preforming threat modeling and providing security consulting to business developers, system designs, and engineers; developing and implementing security threat modeling plans; and supporting threat modeling tools along with identifying associated controls.
This role will also be responsible for development and generation of associated metrics and reporting.
- Monitor information security issues related to MUFG systems and workflows to ensure internal security controls are appropriate and operating as intended
- Manage threat modeling process to help our technology teams, control partners, and business stakeholders understand the state of our technology and data control suite, while working together to prioritize and remediate identified gaps
- Generate security trend analyses and vulnerability reports
- Utilize the MITRE ATT&CK framework to identify and mitigate threats effectively.
- Identify and implement controls to mitigate identified threats.
- Cross-train other teams on threat modeling techniques and best practices.
- 6+ years of experience in secure coding, application security, or similar disciplines
- Knowledge of information security standards, rules and regulations related to information security and data confidentiality, and desktop, server, application, database, network security principles for risk identification and analysis
- Experience with performing Threat Modeling on web applications
- Conducting research into real-world threat actor tactics, techniques, and procedures.
- Solid knowledge and understanding of development life cycle (SSDLC), CI/CD pipelines and Agile methodologies
- Understanding of common software security issues and remediation techniques (OWASP Top 10, SANS 25, Mitre’s ATT&CK, etc.)
- Experience with analyzing vulnerabilities and delivering clear and coherent written reporting, identifying network risks and providing mitigation recommendations
- Excellent knowledge of Windows/AD/Linux systems administration and vulnerabilities
- An organized and detail-oriented cyber security professional able to perform independently as well as part of a team
- Ability to craft/deliver communication of technical information from highly technical reports to C-suite briefs and everything in between
- Experience in the banking or finance industries preferred
- Certified Information Systems Security Professional (CISSP), Global Information Assurance Certification (GIAC), or other security certifications desired
- Knowledge of information security standards, rules and regulations related to information security and data confidentiality, and desktop, server, application, database, network security principles for risk identification and analysis
- Experience in security policy development, security education, network testing, application vulnerability assessments, risk analysis, and compliance testing required
- Experience working in a…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).