In this role, you will:
- Create and build content based on identified security use cases
- Effectively communicate observations and development deliverables to a wide audience
- Provide security consulting on medium projects for internal clients to ensure conformity with corporate information, security policy, and standards
- Design, document, test, maintain, and provide issue resolution recommendations for moderately complex security solutions related to networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security
- Review and correlate security logs
- Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity
- Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives
- Collaborate and consult with peers, colleagues and managers to resolve issues and achieve goals
Required Qualifications:
- 4+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
- 1+ years of Regular Expression (regex) experience
- 2+ years of SIEM development experience
Desired Qualifications:
- Experience working in a security operations center
- 2 + years of Splunk Enterprise Security experience
- Advanced Information Security technical skills and understanding of information security practices and policies
- Understanding of Agile practices
- Experience working on a Scrum team
- Ability to manage complex issues and develop solutions
- Ability to execute in a fast paced, high demand, environment while balancing multiple priorities
- Knowledge and understanding of data security controls including malware protection, firewalls, intrusion detection systems, content filtering, Internet proxies, encryption controls, and log management solutions
- Experience analyzing large data sets
- Experience with host and/or network log analysis as applied to incident response / threat hunting
- Knowledge of offensive security, with the ability to think like an adversary when hunting and responding to incidents
- Strong investigative mindset with an attention to detail
- Experience with multiple operating systems to include Windows, Mac OS, and Unix/Linux
Job Expectations:
- Travel up to 20% domestically
- Ability to work onsite in the office in a hybrid model.
- This position is not eligible for Visa Sponsorship
Locations:
- Charlotte (CIC)
- Chandler, AZ
27 Aug 2025
Wells Fargo Recruitment and Hiring Requirements:
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.