Start Date
Immediate
Expiry Date
16 Nov, 25
Salary
224000.0
Posted On
16 Aug, 25
Experience
5 year(s) or above
Remote Job
Yes
Telecommute
Yes
Sponsor Visa
No
Skills
Siem, Operating Systems, Firewalls, Presentations, Windows, Security Controls, Giac, Red Team, Mac Os, Incident Response
Industry
Information Technology/IT
PAY RANGE
Reflected is the base pay range offered for this position. Pay may vary depending on factors including but not limited to achievements, skills, experience, or work location. The range listed is just one component of the compensation package offered to candidates.
$119,000.00 - $224,000.00
APPLICANTS WITH DISABILITIES
To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo .
WELLS FARGO RECRUITMENT AND HIRING REQUIREMENTS:
a. Third-Party recordings are prohibited unless authorized by Wells Fargo.
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process
Required Qualifications:
Desired Qualifications:
Wells Fargo is seeking a Lead Information Security Engineer in Technology as part of Cybersecurity. Learn more about the career areas and lines of business at wellsfargojobs.com
Wells Fargo is seeking a Lead Information Security Engineer with experience in tactical cyber-attack evaluation, exploit testing and analysis, rule creation, and red or purple teaming. The ideal candidate will have experience in exploit testing, and proof-of-concept development and analysis, to identify over-the-horizon cyber-attack vectors that may pose a risk to the company’s information security environment. The candidate will also have experience partnering with cyber defenders to resolve identified capability gaps. The team member will need to have experience in conducting technical research and identifying methods to detect emerging cyber threats, emulating full-life cycle cyber-attack methodologies, and have a deep technical understanding of evolving Advanced Persistent Threat (APT) Tactics, Techniques, and Procedures (TTPs).
The ideal candidate will have a well-rounded understanding of endpoint/network defenses and detection methodologies. As well as the incident response life cycle and expertise in how adversarial cyber threat actors think and attack. Regular collaboration with multiple teams such as the Cyber Threat Fusion Center, Security Content Development, Cyber Threat Intelligence, and Offensive Security teams will be critical to success.
In this role, you will:
Required Qualifications:
Desired Qualifications:
Job Expectations: