Important Note: During the application process, ensure your contact information (email and phone number) is up to date and upload your current resume when submitting your application for consideration. To participate in some selection activities you will need to respond to an invitation. The invitation can be sent by both email and text message. In order to receive text message invitations, your profile must include a mobile phone number designated as “Personal Cell” or “Cellular” in the contact information of your application.
At Wells Fargo, we want to satisfy our customers’ financial needs and help them succeed financially. We’re looking for talented people who will put our customers at the center of everything we do. Join our diverse and inclusive team where you’ll feel valued and inspired to contribute your unique skills and experience.
Help us build a better Wells Fargo. It all begins with outstanding talent. It all begins with you.
Wells Fargo Technology sets IT strategy; enhances the design, development, and operations of our systems; optimizes the Wells Fargo infrastructure footprint; provides information security; and enables continuous banking access through in-store, online, ATM, and other channels to Wells Fargo’s more than 70 million global customers.
We have a new opportunity for a senior strategic Information Security Analyst in the Information Security, Cyber Threat Management organization. The individual selected for this position will work as part of Threat Services team to lead efforts involving telecommunication analysis, assess and analyze attack surfaces and deliver ‘actionable intelligence’ with a focus on assessing and analyzing telecomm-centric cyber threats against the financial sector. The candidate will actively engage in telecomm attack surface exposure assessment, implement and maintain war dialing operation, participating in discussions and presentations that enable cyber threat awareness of telecomm vulnerabilities for Wells Fargo. The candidate will work with internal teams to identify, analyze, and share correlated and enriched threat intelligence and assessment reports to collaborate and provide technical consultation to Telecomm teams to respond quickly and effectively to current and potential cyber threats.
Lead cyber threat assessment on telco lines, and collaborate with reporting teams on information obtained from wardialing service.
Lead the deployment, scripting, and maintenance of new wardial infrastructure, execute on-going assessment and provide technical consultation to the reporting team and remediation team of data communication exposure point of presence.
Appropriately manage and communicate relevant cyber threat intelligence to partner teams within Information Security and the bank’s Lines of Business (LOB).
Actively research cyber threats on the Internet and Dark Web with focus on telecommunication infrastructure and protocol's direct or indirect impact/relevance to financial services, business operations, technology infrastructure, and client trust.
Present on cyber threat-related topics to both executive management and large audiences of bank employees.
Develop and further relationships with personnel at external financial institutions, government agencies, and other appropriate organizations.
7+ years of information security administration experience
2 + years of threat intelligence experience within a financial services industry
Advanced Information Security technical skills and solid knowledge and understanding of information security practices and policies
Ability to manage complex issues and develop solutions
Excellent verbal and written communication skills
Ability to execute in a fast paced, high demand, environment while balancing multiple priorities
Ability to work effectively, as well as independently, in a team environment
Experience working in a large enterprise environment
Other Desired Qualifications
Experience with conducting wardialing assessment
Experience with deployment and operation of WarVOX
Advanced development or scripting experience with Ruby and Python on automation and data analytics
Solid knowledge and understanding of telco technology and telecomm infrastructure
Solid knowledge and understanding of VoIP, PBX, SIP, and other relevant telecommunication protocol
Solid knowledge and understanding of information security practices and policies
Advanced hands-on experience in threat management and/or vulnerability management
Attention to detail
Ability to travel up to 5% of the time