About this role:
This position is within our Cyber Threat Fusion Center (CTFC) andCTFC engineers are responsible for escalations, alert tuning, playbook automation, and training of the Tier 1 Analyst staff.
In this role, you will:
- Lead computer security incident response activities for highly complex events
- Conduct technical investigation of security related incidents and post incident digital forensics to identify causes and recommend future mitigation strategies
- Provide security consulting on large projects for internal clients to ensure conformity with corporate information, security policy, and standards
- Design, document, test, maintain, and provide issue resolution recommendations for highly complex security solutions related to networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security
- Review and correlate security logs
- Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity
- Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives
- Collaborate and influence all levels of professionals including managers
- Lead a team to achieve objectives
Required Qualifications:
- 5+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
- 3+ years of Information Security reporting and analysis experience
- 3+ years of cyber security incidents and events investigation experience
Desired Qualifications:
- 3 years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence
- Knowledge and understanding of security analytics including: incident response and a digital forensics discipline
- 3+ years of experience with SIEM tools. Experience with Chronicle would be a plus.
- Experience with CrowdStrike or other EDR
- Experience with SOAR
- Experience with documentation creation
- Ability to provide leadership by coaching, training, and mentoring
Job Expectations:
- Position is Friday - Monday 4x10hr shifts with rotational on call support
- This position is not eligible for Visa sponsorship
27 Mar 2025
Wells Fargo Recruitment and Hiring Requirements:
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.