Wells Fargo Info Security Sr Engineer in Saint Louis, Missouri
Important Note: During the application process, ensure your contact information (email and phone number) is up to date and upload your current resume when submitting your application for consideration. To participate in some selection activities you will need to respond to an invitation. The invitation can be sent by both email and text message. In order to receive text message invitations, your profile must include a mobile phone number designated as 'Personal Cell' or 'Cellular' in the contact information of your application.
At Wells Fargo, we want to satisfy our customers' financial needs and help them succeed financially. We're looking for talented people who will put our customers at the center of everything we do. Join our diverse and inclusive team where you'll feel valued and inspired to contribute your unique skills and experience.
Help us build a better Wells Fargo. It all begins with outstanding talent. It all begins with you.
Wells Fargo Technology is a team of more than 40,000 information technology and security professionals who help keep Wells Fargo at the forefront of America's diversified financial services companies. Employees execute an engineering-led IT strategy to deliver stable, secure, scalable and innovative services that provide Wells Fargo global customers ‘round-the-clock' banking access through in-store, online, ATM, and other channels. Wells Fargo Technology plays a critical role in the company's customer and employee experience, business and risk management transformation, and growth agenda.
ENTERPRISE INFORMATION SECURITY:
Since 1852, customers have trusted that Wells Fargo would keep their assets secure from theft and always available. Today, maintaining customer trust remains our underlying operating principle.
Enterprise Information Security's (EIS) vision is to provide Wells Fargo world leading cyber security risk management. Through a framework that addresses policy, process, operations, people, and technology, EIS protects Wells Fargo's infrastructure, corporate data, and customer assets, and ensures alignment with applicable regulations and laws. EIS is part of Wells Fargo's Corporate Risk organization and is led by the Chief Information Security Officer.
Our Enterprise Information Security team is looking for a strong cyber security professional to join our Cyber Threat Fusion Center (CTFC) Threat Hunting team. The ideal candidate will have extensive experience in network and endpoint forensics, incident response, and threat hunting methodologies utilizing both Deep Packet Inspection (i.e. full packet capture) and NetFlow solutions. The ideal candidate will additionally have a well-rounded background in endpoint/network security defenses as well as some offensive security knowledge to allow the ability to think like an adversary. This role will serve as an incident responder to assess the risk, impact, and scope of identified security threats, as well as leading the response efforts to include containment, eradication, and recovery. Strong verbal and written communication skills are desired, in order to ensure thorough and accurate reporting during and concluding a security incident. The candidate will also play a major role in the creation of new logic and supporting procedures to identify anomalous network and/or endpoint behaviors for CTFC alert monitoring. Threat hunting efforts will be focused primarily on identifying advanced threats that are not detected via traditional security tools. Regular collaboration with multiple teams such as Threat Detection Services, Security Content Development, Cyber Threat Intelligence, Cyber Threat Forensics, and Offensive Security teams will be critical to success. This position will help to provide metrics associated with our ability to discover and react to security threats based on the evolving landscape.
7+ years of information security applications and systems experience
6+ years of information technology applications and systems experience
7+ years of Incident Response Protocols and Tools experience
5+ years of Security Information and Event Management (SIEM/SIM/SEM) experience
5 + years of experience with network security, endpoint security, or security threat vectors
5+ years of Incident Management System experience
5+ years of DPI (Deep Packet Inspection) experience
Knowledge and understanding of malware reverse engineering including: code or behavior analysis for endpoints and the network
Ability to execute in a fast paced, high demand, environment while balancing multiple priorities
Experience working in a large enterprise environment
Knowledge and understanding of banking or financial services industry
Knowledge and understanding of threat analysis and assessment of potential and current information security risk/threats
Other Desired Qualifications
Hands-on experience with information security tools such as an enterprise SIEM solution, IDS/IPS, endpoint security solutions, email/web security gateways, and other security detection/mitigation devices
Experience with host-based and/or network-based forensics tools and techniques
Experience with host and/or network log analysis as applied to incident response / threat hunting
Knowledge of offensive security, with the ability to think like an adversary when hunting and responding to incidents
Strong ability to identify anomalous behavior on endpoint devices and/or network communications
Strong experience in operating system and application security hardening and best practices
Strong investigative mindset with an attention to detail
Experience with multiple operating systems to include Windows, Mac OS, and Unix/Linux
Demonstrate the ability to provide written and verbal communications to management to address real-time issues and incidents, including writing formal incident reports
Advanced problem solving skills, ability to develop effective long-term solutions to complex problems
Certifications in one or more of the following: Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), GIAC Reverse Engineering Malware (GREM), GIAC Certified Forensic Analyst (GCFA), GIAC Network Forensics Analyst (GNFA), Offensive Security (OSCP/OSCE/etc), or other relevant certifications.
5+ years of experience with full packet capture solutions.
Provides situational awareness based on team authored threat reports
Ability to hunt for IOCs based on attack surface and implement for CTFC security monitoring
Develop monitoring dashboards based on thresholds or signatures for security alerting/automated case creation
- Ability to travel up to 10% of the time
AZ-Chandler: 2600 S Price Rd - Chandler, AZ
TX-Irving: 2975 Regent Blvd - Irving, TX
CA-SF-Financial District: 333 Market St - San Francisco, CA
IL-Chicago: 10 S Wacker Drive - Chicago, IL
NY-New York: 150 E 42nd St - New York, NY
MN-Minneapolis: 550 South 4th St - Minneapolis, MN
MA-Boston: 125 High Street - Boston, MA
NC-Charlotte: 1525 W Wt Harris Blvd - Charlotte, NC
NC-Raleigh: 1100 Corporate Center Dr - Raleigh, NC
MO-Saint Louis: 1 N Jefferson Ave - Saint Louis, MO
PA-Philadelphia: 101 N Independence Mall E - Philadelphia, PA
IA-Des Moines: 800 Walnut St - Des Moines, IA
All offers for employment with Wells Fargo are contingent upon the candidate having successfully completed a criminal background check. Wells Fargo will consider qualified candidates with criminal histories in a manner consistent with the requirements of applicable local, state and Federal law, including Section 19 of the Federal Deposit Insurance Act.
Relevant military experience is considered for veterans and transitioning service men and women.
Wells Fargo is an Affirmative Action and Equal Opportunity Employer, Minority/Female/Disabled/Veteran/Gender Identity/Sexual Orientation.
Visit https://www.wellsfargo.com/about/careers/benefits for benefits information.
Company: Wells Fargo
Req Number: 5567582-10
Updated: 2021-04-22 02:16:04.915 UTC
Location: Saint Louis,MO