11 days old

Information Security Engineer 6 - Security Content / Network Forensics / Incident Response / Threat Hunting

Chilpancingo de los Bravo, Gro.
  • Job Code
Job Description

At Wells Fargo, we want to satisfy our customers financial needs and help them succeed financially. Were looking for talented people who will put our customers at the center of everything we do. Join our diverse and inclusive team where youll feel valued and inspired to contribute your unique skills and experience.

Help us build a better Wells Fargo. It all begins with outstanding talent. It all begins with you.

Corporate Risk helps all Wells Fargo businesses identify and manage risk.We focus on three key risk areas: credit risk, operational risk, and market risk. We help our management and Board of Directors identify and monitor risks that may affect multiple lines of business, and take appropriate action when business activities exceed the risk tolerance of the company.

Since 1852, customers have trusted that Wells Fargo would keep their assets secure from theft and always available. Today, maintaining customer trust remains our underlying operating principle.

Enterprise Information Securitys (EIS) vision is to provide Wells Fargo world leading cyber security risk management. Through a framework that addresses policy, process, operations, people, and technology, EIS protects Wells Fargos infrastructure, corporate data, and customer assets, and ensures alignment with applicable regulations and laws. EIS is part of Wells Fargo's Corporate Risk organization and is led by the Chief Information Security Officer.

Our Enterprise Information Security team is looking for a senior cyber security engineer to join our Security Content Development (SCD) team. Duties include creating, improving, and delivering events of interest from both upstream security tools and big data solutions for the benefit of the cyber security teams.

This Information Security Engineer 6 will serve as an incident responder to assess the risk, impact, and scope of identified security threats, as well as leading the response efforts to include containment, eradication, and recovery. This Engineer willbe responsible for providingthorough and accurate reporting during and concluding a security incident.

The Engineer will also play a major role in our cyber threat hunting efforts, including creation of new logic and procedures to identify anomalous network and/or endpoint behaviors. Threat hunting efforts will be focused primarily on identifying advanced threats that are not detected via traditional security tools. Regular collaboration with multiple teams such as the Cyber Threat Fusion Center, Security Content Development, Cyber Threat Intelligence, Cyber Threat Forensics, and Offensive Security teams will be critical to success. This position will help to provide crucial metrics associated with our ability to discover and react to security threats.

** Location: The preferred locations are Charlotte NC and Chandler AZ; however also open to telecommute.**

Required Qualifications

3+ years of Incident Management System experience5+ years of Incident Response Protocols and Tools experience5+ years of Python experience5 + years of Regular Expression (regex) experience 5+ years of Security Information and Event Management (SIEM/SIM/SEM) experience5 + years of experience with network security, endpoint security, or security threat vectors10+ years of information security applications and systems experience

Desired Qualifications

Experience working in a large enterprise environmentAbility to execute in a fast paced, high demand, environment while balancing multiple prioritiesKnowledge and understanding of banking or financial services industryKnowledge and understanding of data security controls including malware protection, firewalls, intrusion detection systems, content filtering, Internet proxies, encryption controls, and log management solutionsKnowledge and understanding of malware reverse engineering including: code or behavior analysis for endpoints and the network3+ years of DPI (Deep Packet Inspection) experienceExperience analyzing large data setsAbility to interact and communicate effectively with all levels of an organization; including at the executive levelAbility to manage highly complex issues and negotiate solutionsExcellent verbal and written communication skillsExpert knowledge and understanding of information security practices and policies, including Information Security Frameworks, Standards, and best practices

Other Desired Qualifications
  • Advanced Information Security technical skills and understanding of information security practices and policies
  • Hands-on experience with information security tools such as an enterprise SIEM solution, IDS/IPS, endpoint security solutions, email/web security gateways, and other security detection/mitigation devices
  • Experience with host-based and/or network-based forensics tools and techniques
  • Experience with host and/or network log analysis as applied to incident response / threat hunting
  • Knowledge of offensive security, with the ability to think like an adversary when hunting and responding to incidents
  • Strong ability to identify anomalous behavior on endpoint devices and/or network communications
  • Strong experience in operating system and application security hardening and best practices
  • Strong investigative mindset with an attention to detail
  • Experience with multiple operating systems to include Windows, Mac OS, and Unix/Linux
  • Demonstrated ability to provide written and verbal communications to management to address real-time issues and incidents, including writing formal incident reports
  • Advanced problem solving skills and ability to develop effective long-term solutions to complex problems
  • Certifications in one or more of the following: Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), GIAC Reverse Engineering Malware (GREM), GIAC Certified Forensic Analyst (GCFA), GIAC Network Forensics Analyst (GNFA), Offensive Security (OSCP/OSCE/etc), or other relevant certifications
  • 3+ years of experience with full packet capture solutions
  • Extensive experience in network-focused forensics, incident response, and threat hunting utilizing both Deep Packet Inspection (i.e. full packet capture) and NetFlow solutions

  • Well-rounded background in endpoint/network defenses and security incident response, as well as some offensive security knowledge to allow the ability to think like an adversary

  • Job Expectations

    Ability to travel up to 10% of the time


    All offers for employment with Wells Fargo are contingent upon the candidate having successfully completed a criminal background check. Wells Fargo will consider qualified candidates with criminal histories in a manner consistent with the requirements of applicable local, state and Federal law, including Section 19 of the Federal Deposit Insurance Act.

    Relevant military experience is considered for veterans and transitioning service men and women.
    Wells Fargo is an Affirmative Action and Equal Opportunity Employer, Minority/Female/Disabled/Veteran/Gender Identity/Sexual Orientation.


    Featured Jobs

    Career News

    Before you go...

    Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

    Share this job:

    Information Security Engineer 6 - Security Content / Network Forensics / Incident Response / Threat Hunting

    Wells Fargo
    Chilpancingo de los Bravo, Gro.

    Share this job

    Information Security Engineer 6 - Security Content / Network Forensics / Incident Response / Threat Hunting

    Wells Fargo
    Chilpancingo de los Bravo, Gro.

    Separate email addresses with commas

    Enter valid email address for sender.

    Join us to start saving your Favorite Jobs!

    Sign In Create Account
    th -
    Overall Rating: /199
    Median Salary:

    Work Environment
    Powered ByCareerCast