Global Security Operations Center (GSOC) Manager, Vice President

Tampa - 4050 West Boy Scout Blvd., United States

⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️

MUFG

三菱UFJ銀行のホームページ。住宅ローン、外貨預金、投資信託、個人年金などの商品案内。インターネットバンキング、口座開設もできます。

View all jobs at MUFG

Apply now Apply later

Do you want your voice heard and your actions to count?

Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world’s leading financial groups. Across the globe, we’re 120,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.

With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.

Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.

The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.

Job Summary

As a GSOC (Global Security Operations Center) Manager, you will lead a regional team of Tier 1 and Tier 2 analysts within the Global Security Operations Center, ensuring 24/7/365 operational coverage and seamless coordination across global sites. You will be responsible for managing daily operations, mentoring staff, overseeing incident response workflows, and driving continuous improvement in detection, triage, and escalation processes. This role includes on-call responsibilities and requires close collaboration with global cybersecurity teams, threat intelligence, and incident response stakeholders.

Major Responsibilities

Operational Leadership

  • Oversee day-to-day operations of GSOC Tier 1 and Tier 2 teams in your operating location.

  • Ensure consistent execution of security monitoring, alert triage, and incident escalation procedures.

  • Maintain shift coverage and on-call rotation schedules to support 24/7 operations

  • Serve as the first point of escalation for high-severity or complex security events.

Team Management & Development

  • Hire, onboard, and train new analysts; design and deliver remedial training as needed.

  • Conduct performance reviews and provide coaching to develop analyst capabilities.

  • Foster a culture of accountability, collaboration, and continuous learning.

Process & Quality Assurance

  • ·Review and refine SOPs and playbooks for Tier 1 and Tier 2 operations.

  • ·Monitor quality of alert handling and incident response; implement corrective actions where needed.

  • ·Track and report operational metrics, SLAs, and KPIs to measure team effectiveness.

Security Event Response & Escalation

  • Coordinate with Global Incident Response (GIR) and Cyber Threat Intelligence (CTI) teams on escalated incidents.

  • Participate in tabletop exercises and readiness drills to validate incident response capabilities

  • Ensure proper documentation for all security tickets and events.

Strategic Collaboration

  • Partner with global GSOC managers to align processes and share best practices.

  • Contribute to regular governance forums to explain security event response.

  • Collaborate with audit to furnish details on security event response.

  • Support integration of new tools and technologies (e.g., SIEM, SOAR, FIM) into GSOC workflows.

Qualifications

  • 10+ years in cybersecurity, including 5+ years in a leadership or management role.
  • Experience managing Tier 1 and Tier 2 SOC operations in a global or regional capacity.
  • Familiarity with SIEM platforms (e.g., Splunk), SOAR tools (e.g. Torq), and incident response frameworks.
  • Strong understanding of NIST, MITRE ATT&CK, and other industry standards.
  • Excellent communication and stakeholder engagement skills.
  • Relevant certifications preferred: CISSP, CISM, GCIA, GCIH, GCFA, or equivalent.
  • Bachelor’s degree in Cybersecurity, Information Technology, or related field or equivalent related work experience.

Visa sponsorship/support is based on business needs. We do not anticipate providing visa sponsorship/support for this position.

The typical base pay range for this role is between $120K - $171K depending on job-related knowledge, skills, experience and location. This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, and paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below.

MUFG Benefits Summary

We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws (including (i) the San Francisco Fair Chance Ordinance, (ii) the City of Los Angeles’ Fair Chance Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair Chance Ordinance, and (iv) the California Fair Chance Act) to the extent that (a) an applicant is not subject to a statutory disqualification pursuant to Section 3(a)(39) of the Securities and Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity Exchange Act, and (b) they do not conflict with the background screening requirements of the Financial Industry Regulatory Authority (FINRA) and the National Futures Association (NFA). The major responsibilities listed above are the material job duties of this role for which the Company reasonably believes that criminal history may have a direct, adverse and negative relationship potentially resulting in the withdrawal of conditional offer of employment, if any.

The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.

We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.

 

Apply now Apply later
Job stats:  1  0  0

Tags: CISM CISSP GCFA GCIA GCIH Governance Incident response KPIs MITRE ATT&CK Monitoring NIST SIEM SLAs SOAR SOC Splunk Threat intelligence

Perks/benefits: Career development Competitive pay Health care Medical leave Parental leave Salary bonus Startup environment Team events Wellness

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.