Wells Fargo is seeking a Lead Information Security Engineer in Technology as part of Cybersecurity. Learn more about the career areas and lines of business at wellsfargojobs.com. The Lead Information Security Engineer is responsible for delivering, integrating, and maintaining cybersecurity tools and capabilities across all security domains. This role provides senior engineering expertise with primary responsibility for Cyber Defense Management, ensuring the organization’s critical defense technologies operate effectively and support enterprise‑wide protection goals. In this role, you will: Lead implementation, optimization, and ongoing management of core cybersecurity platforms, including: Network Detection & Response (NDR) Cloud‑Native Application Protection Platforms (CNAPP) Secure Web Proxy / SWPP Cloud Security Posture Management (CSPM) SaaS Security Posture Management (SSPM) SDLC security tooling (SAST/DAST/code scanning) Vulnerability management tools Threat intelligence platforms Telemetry and security data pipelines Engineer integrations between cybersecurity systems to improve detection, automation, and incident response. Ensure security tools are configured to align with best practices and organizational security requirements. Provide technical leadership to support Cyber Defense Operations and enterprise security initiatives. Develop documentation, standards, and reference architectures for security technologies. Drive continuous improvement of defense technologies to address evolving threats. Lead computer security incident response activities for highly complex events Conduct technical investigation of security related incidents and post incident digital forensics to identify causes and recommend future mitigation strategies Provide security consulting on large projects for internal clients to ensure conformity with corporate information, security policy, and standards Design, document, test, maintain, and provide issue resolution recommendations for highly complex security solutions related to networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security Review and correlate security logs Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives Collaborate and influence all levels of professionals including managers Lead a team to achieve objectives
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed