In this role, you will:
- Lead or participate in computer security incident response activities for moderately complex events
- Conduct technical investigation of security related incidents and post incident digital forensics to identify causes and recommend future mitigation strategies
- Provide security consulting on medium projects for internal clients to ensure conformity with corporate information, security policy, and standards
- Design, document, test, maintain, and provide issue resolution recommendations for moderately complex security solutions related to networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security
- Review and correlate security logs
- Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity
- Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives
- Collaborate and consult with peers, colleagues and managers to resolve issues and achieve goals
Required Qualifications:
- 4+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
Desired Qualifications:
Expectations:
- Use knowledge of Authorization (AuthZ), and Attribute Based Access Control (ABAC) to define and build solutions using EDA Authorization technology (PlainID).
- Translate requirements to the EDA Operations team for back-end configuration and development in Authorization technology
- Leverage analytical skills to research defects, recommending and implementing solutions. Estimate work using Agile methodology, participate in Daily Scrum Sessions, Sprint Planning, and Sprint Retrospectives
- Engages on a team of dynamic, strategic thinkers within IAM.
- Supports and provides complex technical expertise for technical issues and initiatives related to large-scale applications, systems, databases and/or other technical products and services.
- Contribute as a key player in the building of the framework, tools, services, and governance process execution and provides recommendations and support related to changes in the technology stack supporting attribute based access.
- Participates in the development of technical support strategies and plans.
- Recommends solutions related to automation or manual provisioning and/or certification processes in response to complex business problems.
- Acts as an internal consultant regarding use of tools and process re-engineering to improve delivery.
- Leads support projects and migrations from development to production, upgrades, installations and/or configurations.
- Assures quality, security and compliance requirements are met for supported areas.
- Oversees creation of or updates to and testing of the business continuation plan.
- Provides direction and guidance to less experienced staff.
- Partners and leads security risk assessments to ensure compliance with corporate security policies and adherence to best practices.
- Partners and leads multiple IAM System priorities, like health checks, safety and soundness initiatives.
- Serves as an SME and Technical IAM resource to handle issues on centralizing core and critical assets to one strategic platform.
30 Mar 2025
Wells Fargo Recruitment and Hiring Requirements:
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.