This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Wells Fargo is seeking a Lead Information Security Engineer.
Job Responsibility:
Lead computer security incident response activities for highly complex events
Conduct technical investigation of security related incidents and post incident digital forensics to identify causes and recommend future mitigation strategies
Provide security consulting on large projects for internal clients to ensure conformity with corporate information, security policy, and standards
Design, document, test, maintain, and provide issue resolution recommendations for highly complex security solutions related to networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security
Review and correlate security logs
Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity
Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives
Collaborate and influence all levels of professionals including managers
Lead a team to achieve objectives
Requirements:
5+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
Nice to have:
Conduct forensic analysis of cyber incidents including hacking, malware attacks, data breaches and insider threats.
Identify, preserve, extract and analyze digital evidence from computers, mobile devices, servers, cloud systems, and other digital storage media.
Use industry-standard forensic tools and techniques (e.g., FTK, EnCase, X-Ways, Autopsy, Volatility, Cellebrite) to uncover evidence and trace cyber attackers