Start Date
Immediate
Expiry Date
10 Dec, 25
Salary
196000.0
Posted On
10 Sep, 25
Experience
2 year(s) or above
Remote Job
Yes
Telecommute
Yes
Sponsor Visa
No
Skills
Analytical Skills, Automation, Debugging, Design, Scripting Languages, Vbscript, Testing, Python, Javascript, Security Controls, Training, Powershell, Cyber Security, Bash, Red Teaming, Reverse Engineering
Industry
Information Technology/IT
PAY RANGE
Reflected is the base pay range offered for this position. Pay may vary depending on factors including but not limited to achievements, skills, experience, or work location. The range listed is just one component of the compensation package offered to candidates.
$100,000.00 - $196,000.00
APPLICANTS WITH DISABILITIES
To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo .
WELLS FARGO RECRUITMENT AND HIRING REQUIREMENTS:
a. Third-Party recordings are prohibited unless authorized by Wells Fargo.
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process
Required Qualifications:
Desired Qualifications:
Our cyber threat managements group is looking for a strong cyber security professional to join our Cyber Threat Management Organization. This role will involve the operation of the Safebreach Breach and Attack Simulation platform and in-house developed tools to create sustained repeatable tests within the bank environment using a variety of scripting languages and techniques. The position involves collaborating with other members of the research team to turn proof-of-concept code and ideas into stable, automated tools and tests that can be integrated into the attack simulation environment. Management and support of Red Team Lab Infrastructure both on premises and off, to include server deployment, DNS management. This position will also play a role in taking in-house developed tools and operationalizing them for the benefit of the bank. This team member must be able to utilize complex hacking tools, create proof of concept exploits, and document attack chains so they can be re-created and defensive tactics developed for them. This position will reside within the Cyber Threat Management organization and works closely with our defense partners in a purple team capacity.
In this role, you will:
Required Qualifications:
Desired Qualifications:
Job Expectations:
Salary Ranges: