Important Note: During the application process, ensure your contact information (email and phone number) is up to date and upload your current resume when submitting your application for consideration. To participate in some selection activities you will need to respond to an invitation. The invitation can be sent by both email and text message. In order to receive text message invitations, your profile must include a mobile phone number designated as “Personal Cell” or “Cellular” in the contact information of your application.
At Wells Fargo, we are looking for talented people who will put our customers at the center of everything we do. We are seeking candidates who embrace diversity, equity and inclusion in a workplace where everyone feels valued and inspired.
Help us build a better Wells Fargo. It all begins with outstanding talent. It all begins with you.
Technology sets IT strategy; enhances the design, development, and operations of our systems; optimizes the Wells Fargo infrastructure; provides information security; and enables Wells Fargo global customers to have 24 hours a day, 7 days a week banking access through in-branch, online, ATMs, and other channels.
Our mission is to deliver stable, secure, scalable, and innovative services at speeds that delight and satisfy our customers and unleash the skills potential of our employees.
The Information and Cyber Security (ICS) team is embarking on a multi-year initiative to improve Wells Fargo’s resiliency to the tactics, and techniques used by today’s most advanced adversaries. ICS is looking to bring together a multi-functional, agile team to partner across disciplines in order to create a more secure future for the company and its customers. Join a team of dedicated cybersecurity professionals working to implement cutting edge threat detection and prevention tools and techniques.
Our ICS team is looking for a strong cyber security professional with experience or education in collecting, assessing, and presenting threat intelligence regarding emerging cyber security threats and advanced persistent threat (APT) actor capabilities. The ideal candidate will have experience in improving and developing innovative threat actor profiling methodologies to ensure ICS remains ahead-of-the-curve in cyber defense preparedness. The team member will need to have experience in working with intelligence vendors, sophisticated cyber threat actors’ evolving Tactics, Techniques, and Procedures (TTPs), and helping to identify defense gaps.
The ideal candidate will have a well-rounded understanding of cyber threat intelligence, vendor intelligence reporting, and a large institutions’ detection, testing, and incident response capabilities. They will have exceptional cyber threat actor knowledge to help them to think like an adversary and overcome a lack of imagination. Success will require regular collaboration with multiple teams such as the Cyber Threat Fusion Center, Threat Detection Services, Offensive Security, and Purple teams.
Please be sure to indicate that you saw this position on Globaljobs.org