Important Note: During the application process, ensure your contact information (email and phone number) is up to date and upload your current resume when submitting your application for consideration. To participate in some selection activities you will need to respond to an invitation. The invitation can be sent by both email and text message. In order to receive text message invitations, your profile must include a mobile phone number designated as "Personal Cell" or "Cellular" in the contact information of your application.
At Wells Fargo, we want to satisfy our customers' financial needs and help them succeed financially. We're looking for talented people who will put our customers at the center of everything we do. Join our diverse and inclusive team where you'll feel valued and inspired to contribute your unique skills and experience.
Help us build a better Wells Fargo. It all begins with outstanding talent. It all begins with you.
Wells Fargo Technology sets IT strategy; enhances the design, development, and operations of our systems; optimizes the Wells Fargo infrastructure footprint; provides information security; and enables continuous banking access through in-store, online, ATM, and other channels to Wells Fargo's more than 70 million global customers.
Our Cyber Information Security team is looking for a strong cyber security professional to join our Cyber Security Defense and Monitoring Team. This role will involve performing cutting-edge research on new attack vectors, techniques, and tactics. This role will emulate adversarial attacks in order to provide information to Wells Fargo Lines of Business with the overall goal of providing knowledge of indicators or compromise and TTP (Tools, Tactics, and Procedures) to other teams.
This team member will be responsible for managing a team responsible for identifying, formulating and implementing complex information security policies, procedures and controls. Works with and influences information security and line of business management to identify, formulate and implement information security solutions and controls. Team may be responsible for complex and innovative solutions addressing: vulnerability detection, threat analysis, network intrusion and development/implementation of vulnerability mitigation strategies; identifying security risks and solutions for the company's networks and virtual private networks, application systems, security tools, key public infrastructures, authentication and directory services, and access management services to ensure the security of the network and confidential data. Maintains an advanced awareness of bank security policies and government regulations pertaining to information security and participates in recommending changes to information security policy, standards and procedures as needed for systems/applications/tools. Exercises the usual authority of a manager including budgeting and staff management.
This role reports to the Offensive Security Research Team manager and will lead the Device Research & Exploitation team. The manager of this role should understand financial threat actors and know about the Tactics, Techniques, and Procedures used by threat actors.
As a Team Member Manager, you are expected to achieve success by leading yourself, your team, and the business. Specifically you will:
Lead your team with integrity and create an environment where your team members feel included, valued, and supported to do work that energizes them.
Accomplish management responsibilities which include sourcing and hiring talented team members, providing ongoing coaching and feedback, recognizing and developing team members, identifying and managing risks, and completing daily management tasks.
Experience managing a technology infrastructure function, application or information security function that has impact across multiple lines of business
Excellent verbal, written, and interpersonal communication skills
Ability to effectively influence and interact with all levels of an organization
Experience working in a large enterprise environment
Ability to assess issues, make quick decisions, implement solutions, and influence change
Ability to motivate staff to prioritize work, meet deadlines, achieve goals, and work under pressure in a dynamic and complex environment
Ability to negotiate, influence, and collaborate to build successful relationships
Knowledge and understanding of banking or financial services industry
Certifications in one or more of the following: Global Information Assurance Certification (GIAC), Offensive Security Certified Professional (OSCP), Offensive Security Wireless Professional (OSWP), Offensive Security Certified Expert (OSCE), Offensive Security Exploitation Expert (OSEE), or Offensive Security Web Expert (OSWE)
Other Desired Qualifications
Experience managing security plans, red team tooling, risk acceptations, and TSC exceptions.
Knowledge of the corrective action process and understanding the intent of audit recommendations and the ability to work through annual audits.
Knowledge of device testing research tools and penetration testing tools.
Knowledge and understanding of the MITRE attack framework
TTP - Tactics techniques and procedures.
PTES - Pen Testing Execution Standard
All offers for employment with Wells Fargo are contingent upon the candidate having successfully completed a criminal background check. Wells Fargo will consider qualified candidates with criminal histories in a manner consistent with the requirements of applicable local, state and Federal law, including Section 19 of the Federal Deposit Insurance Act.
Relevant military experience is considered for veterans and transitioning service men and women.
Wells Fargo is an Affirmative Action and Equal Opportunity Employer, Minority/Female/Disabled/Veteran/Gender Identity/Sexual Orientation.