About this role: Wells Fargo is seeking a Lead Information Security Analyst to join a dynamic team dedicated to safeguarding our customers and the company’s most critical assets. In this pivotal role, you will provide technical leadership in Cybersecurity Governance, Risk, and Compliance while driving projects and mentoring team members to achieve exceptional results. You're the kind of person who can lead, is coachable and enjoys partnering with others to complete projects. The position requires deep expertise in policy compliance and vulnerability management, with a strong focus on cryptography, encryption key lifecycle management, and digital certificate governance. The ideal candidate will have demonstrated experience in designing and implementing policy compliance or vulnerability management programs and leading initiatives or teams to successful completion. Most of all we need a person who can manage cyber projects, has keen organizational skills and is highly collaborative. This is a hybrid role at Wells Fargo. There is no Visa sponsorship or Visa Transfers. The position is seated in the location posted on the requisition. In this role, you will: Provide advanced information security consultation for policy compliance, risk management, security controls and remediation monitoring Lead projects and coordinate team efforts to ensure timely delivery of security initiatives Direct information security risk assessment and research, and recommend remediation plans and strategies Perform Governance, Risk, and Compliance activities to identify and prioritize key risk areas, monitor remediation, and escalate critical risks to senior management Conduct user engagement on vulnerabilities and identified areas of policy non-adherence, report and advise on moderately complex remediation or mitigation plans Design, document, test, maintain, and provide issue resolution recommendations for moderately complex security solutions related to networking, cryptography, encryption keys and digital certificates Review and correlate technical data such as vulnerability or endpoint scanning reports (e.g., Qualys, Tanium), key and certificate management reports, and security logs Analyze identified vulnerabilities, assess their potential impact, and prioritize remediation efforts based on risk levels Develop and maintain security policies and procedures related to information protection, encryption, and certificate management Create detailed process documentation and governance artifacts for security controls, metrics, and escalation routines
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed
Number of Employees
5,001-10,000 employees