In this role, you will:
- Provide information security consultation to improve awareness and compliance with Enterprise Information Security policy, processes and standards
- Perform remediation of security assessment review issues, complex ad hoc data, and reporting to support information security risk management
- Provide guidance and direction in reviewing assessment findings and mitigating controls to optimize information security
- Identify and direct information asset portfolio reconciliations and certifications
- Provide advanced data aggregation and data of information security risk exposure
- Develop and deliver Information Security Education Awareness and Training in accordance with the Enterprise Information Security Program standards
- Review draft and proposed control standards for business impact and recommend modifications or clarifications as required
- Conduct security control testing and consultation with stakeholders
- Evaluate and interpret internal and Enterprise Information Security policies, processes and standards, and provide recommendations to improve them
- Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals
- Interact with internal customers
- Serve as a mentor to less experienced staff
Required Qualifications:
- 4+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
Desired Qualifications:
- Demonstrated experience and knowledge across technology products and product suites
- Experience with leveraging cyber and information security frameworks and standards, such as but not limited to NIST, CIS, and STIG
- Knowledge of risk and compliance processes and practices
Job Expectations:
- Participate in security consulting on small projects for internal clients to ensure uniformity with corporate information, security policy, and standards
- Track and publish security baselines
- Provide support to product owners to publish their security baseline documentation
- Utilize security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, and business continuity (CIS, NSIT, STIG Industry Frameworks).
- Collaborate and consult with peers, colleagues and managers to resolve issues and achieve goals
- Interface with more experienced technologists
20 Apr 2025
Wells Fargo Recruitment and Hiring Requirements:
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.