Lead Information Security Engineer

at  Wells Fargo

San Antonio, Texas, USA -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate04 Oct, 2024Not Specified04 Jul, 20241 year(s) or aboveRuby,Testing,Firewalls,Python,Incident Response,C++,Windows,Vulnerability Management,Reverse Engineering,Business Continuity,Mitigation Strategies,Programming Languages,Training,Security Controls,Penetration Testing,Azure,Operating SystemsNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

Wells Fargo is back in the office three days a week, collaborating together for fabulous outcomes!
This role has no Visa sponsorship or transfers.
The req is seated in the location posted on the req.
We are looking for a Lead Information Security Engineer that has an expertise in Cloud.
You’ll come to us with strong experience in designing, implementing, and managing cloud solutions (Azure and GCP). You’ll have a skill set that encompasses understanding of cloud architecture principles, best practices, security standards. What you are really good at is looking at the Cloud and seeing if it’s set up correctly or has any vulnerabilities. You’re adapt at finding a back door open, looking at root caused analysis and closing the door. Most of all, you care deeply about security and have good foundational hands-on experience with the Cloud.
You’ll have a variety of skills which may include information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, and cyber threat intelligence.
In addition, as a Lead Information Security Engineer, you’ll have tactical skills in exploit testing, and exploit proof-of-concept development and analysis, to identify over-the-horizon cyber-attack vectors that may pose a risk to the company’s information security environment.
Each day will be unique and engaging as you’ll conduct technical research and identify methods to detect emerging cyber threats, and have a deep, technical understanding of evolving Advanced Persistent Threat (APT) Tactics, Techniques, and Procedures (TTPs). You’ll have a well-rounded understanding of endpoint/network defenses and detection methodologies, and a proficient understanding in how adversarial cyber threat actors think and attack.
We need someone that has a collaborative nature that will work harmoniously with multiple teams such as the Cyber Threat Fusion Center, Security Content Development, Cyber Threat Intelligence, and Offensive Security teams will be critical to success. You enjoy high paced work load and are able to execute smoothly in a fast paced, high demand environment while balancing multiple priorities. We need someone who is refined and professional both with verbal and written communications.

In this role, you will:

  • Conduct exploit testing, proof-of-concept development, and analysis on relevant cloud threats and threat actors
  • Follow current trends on evolving threats, threat actors, and their TTPs to identify over-the-horizon cyber-attack vectors that may pose a risk to the company’s information security environment
  • Identify, collect, and analyze malicious code to conduct exploit and malware research specific to cloud threats and threat actors
  • Implement, maintain and provide guidance for tasks related to team cloud infrastructure and environments
  • Design, document, test, maintain, and provide issue resolution recommendations for security solutions related to networking, cloud, authentication and directory services, email, internet, applications, and endpoint security
  • Utilize subject matter knowledge in industry identifying security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity
  • Review and correlate security logs
  • Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives
  • Collaborate and influence all levels of professionals including managers

Required Qualifications:

  • 5+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
  • 3+ years of experience in building and deploying cloud native solutions such as Azure or Google Cloud Platform
  • 2+ years of executing ethical penetration testing including exploitation and post-exploitation experience

Desired Qualifications:

  • 4+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence
  • 1-2 years of malware research and analysis experience
  • Experience with security technology product evaluation, proof of concepts and testing
  • Experience in detection engineering and signature development
  • Strong cyber security professional with experience in administrating, designing, managing, maintaining, and engineering solutions in a cyber range or enterprise lab environment.
  • Consult with engineering team on change design requiring solid understanding of technical process controls or standards that influence and drive new initiatives
  • General programming skills, along with knowledge of programming languages such as C, C++, Python, Ruby, Golang, and . NET
  • Assess cloud system vulnerabilities for security risks and propose and implement risk mitigation strategies.
  • Relevant certifications such as AWS Certified Solutions Architect, Microsoft Certified: Azure Solutions Architect Expert, or Google Professional Cloud Architect preferred.
  • Experience with malware reverse engineering
  • Knowledge and understanding of banking or financial services industry
  • Knowledge and understanding of data security controls including malware protection, firewalls, intrusion detection systems, content filtering, Internet proxies, encryption controls, and log management solutions
  • Experience with multiple operating systems to include Windows, Mac OS, and Unix/Linux

Job Expectations:

  • Ability to travel up to 10% of the time

APPLICANTS WITH DISABILITIES

To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo .

Responsibilities:

  • Conduct exploit testing, proof-of-concept development, and analysis on relevant cloud threats and threat actors
  • Follow current trends on evolving threats, threat actors, and their TTPs to identify over-the-horizon cyber-attack vectors that may pose a risk to the company’s information security environment
  • Identify, collect, and analyze malicious code to conduct exploit and malware research specific to cloud threats and threat actors
  • Implement, maintain and provide guidance for tasks related to team cloud infrastructure and environments
  • Design, document, test, maintain, and provide issue resolution recommendations for security solutions related to networking, cloud, authentication and directory services, email, internet, applications, and endpoint security
  • Utilize subject matter knowledge in industry identifying security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity
  • Review and correlate security logs
  • Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives
  • Collaborate and influence all levels of professionals including manager


REQUIREMENT SUMMARY

Min:1.0Max:5.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Software Engineering

Graduate

Proficient

1

San Antonio, TX, USA