LOG IN
SIGN UP
Tech Job Finder - Find Software, Technology Sales and Product Manager Jobs.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Tech Job Finder
OR continue with e-mail and password
E-mail address
First name
Last name
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

Red Team Operator, Assistant Vice President

at Mitsubishi UFJ

Back to all Cybersecurity jobs
Mitsubishi UFJ logo
Investment Banking

Red Team Operator, Assistant Vice President

at Mitsubishi UFJ

Mid LevelNo visa sponsorshipCybersecurity

Posted 20 days ago

No clicks

Compensation
Not specified

Currency: Not specified

City
New York City
Country
United States

As a Red Team Operator (Assistant Vice President) you will plan and execute realistic offensive security engagements to emulate advanced threats against the bank's systems, networks, applications, and people. You will conduct vulnerability exploitation, adversary simulation, phishing/social-engineering exercises, and develop custom tools and playbooks while collaborating with incident response and defensive teams to improve detection and controls. The role requires strong hands-on offensive security skills, clear technical reporting, and the ability to drive remediation and security improvements across business units in a regulated financial environment.

No additional description provided.

Red Team Operator, Assistant Vice President

at Mitsubishi UFJ

Back to all Cybersecurity jobs
Mitsubishi UFJ logo
Investment Banking

Red Team Operator, Assistant Vice President

at Mitsubishi UFJ

Mid LevelNo visa sponsorshipCybersecurity

Posted 20 days ago

No clicks

Compensation
Not specified

Currency: Not specified

City
New York City
Country
United States

As a Red Team Operator (Assistant Vice President) you will plan and execute realistic offensive security engagements to emulate advanced threats against the bank's systems, networks, applications, and people. You will conduct vulnerability exploitation, adversary simulation, phishing/social-engineering exercises, and develop custom tools and playbooks while collaborating with incident response and defensive teams to improve detection and controls. The role requires strong hands-on offensive security skills, clear technical reporting, and the ability to drive remediation and security improvements across business units in a regulated financial environment.

No additional description provided.