baltimoretechnology | Info Security Engineer 5 in West Des Moines, IA

Info Security Engineer 5

  • Wells Fargo
  • $62,463.33 - 161,640.00 / Year *
  • 2377 Grand Ave
  • West Des Moines, IA 50265
  • Full-Time
save job button

Job Description

Since 1852, customers have trusted that Wells Fargo would keep their assets secure from theft and always available. Today, maintaining customer trust remains our underlying operating principle.

Enterprise Information Security s (EIS) vision is to provide Wells Fargo world leading cyber security risk management. Through a framework that addresses policy, process, operations, people, and technology, EIS protects Wells Fargo s infrastructure, corporate data, and customer assets, and ensures alignment with applicable regulations and laws. EIS is part of Wells Fargo's Corporate Risk organization and is led by the Chief Information Security Officer.


An Information Security Engineer position is open within the Enterprise Information Security (EIS), Enterprise Access Management (EAM) team to assist with authentication and Enterprise Password Vaulting(EPV). This position will be responsible for integrating EAM and EPV work flows. This position will be responsible for EPV governance and reporting with regards to compliance. Will serve as technical lead for integration efforts and strategies regarding authentication controls and EPV solutions. Leads security risk assessments to ensure compliance with corporate security policies and adherence to best practices. Reviews the evaluation of vendor proposals, new and existing security designs, and emerging security technologies and systems. Serves as a high-level technical security resource on large-scale network and/or systems/applications issues.

This position will support the EAM Organization in knowledge and alignment with EPV engineering team, EAM governance teams, and EIS teams.

  • Deliver process consistency across Wells Fargo EIT supporting Access Management initiatives
  • Works with a variety complex applications and/or application initiatives.
  • Utilizes a thorough understanding of available technology, tools, and existing designs.
  • Build and maintain strong relationships within a variety of teams throughout the organization.
  • Develops specifications for extremely complex computer network security/protection technologies for company information and network systems/applications.
  • Design and develop integrations between EAM control tools and processes and EPV tools and processes.
  • Monitor and report on EPV solutions and workflows.
  • Participate in compliance activities and remediation involving EPV and EAM processes.
  • May direct or serve as a mentor to less experienced staff.

    Successful candidate will also work closely with the Information Security Management, Risk, and Enterprise Access Management teams along with business lines and technology leadership across the enterprise in the execution of the WF strategies/objectives. Accordingly, critical success factors will include the ability to effectively engage in a matrixed organization, develop partnerships with many business and functional areas, and have a strong operational focus.

Required Qualifications

  • 7+ years of information security applications and systems experience
  • 7+ years of IAM (Identity and Access Management) experience
  • 7+ years of process design or improvement experience

Desired Qualifications

  • Advanced Information Security technical skills and understanding of information security practices and policies
  • Ability to manage complex issues and develop solutions
  • Excellent verbal and written communication skills
  • Ability to assess issues, make quick decisions, implement solutions, and influence change
  • Strong customer relationship management skills
  • Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified in Risk and Information Systems Control (CRISC)
  • Knowledge and understanding of Information Technology governance risk and compliance processes such as; policies, control standards, risk management concepts, or information security
  • Experience working in a large enterprise environment
  • Knowledge and understanding of banking or financial services industry

Other Desired Qualifications
  • Knowledge and experience working with password vaulting and enterprise password vault tools
  • 3+ years of enterprise password vault experience
  • 2+ years of automated workflow tool experience
  • Ability to think both conceptually and detailed as needed.
  • Ability to negotiate to achieve desired goals with a successful outcome for all parties.
  • Ability to identify challenges, anticipate obstacles, influence and set direction, and resolve issues.
  • Excellent documentation and communication skills (written and spoken) including Senior Management.
  • Expert analytical skills with a keen ability to see how to translate needs of the teams into tangible deliverables.
  • High-level understanding of various development technologies, development environments, and infrastructure.
  • Bachelor s degree, preferably in a technology related field.

Street Address

NC-Charlotte: 301 S Tryon St - Charlotte, NC
AZ-Chandler: 2600 S Price Rd - Chandler, AZ
IA-West Des Moines: 7001 Westown Pkwy - West Des Moines, IA
NC-Charlotte: 1525 W Wt Harris Blvd - Charlotte, NC
MN-Minneapolis: 255 2nd Ave S - Minneapolis, MN


All offers for employment with Wells Fargo are contingent upon the candidate having successfully completed a criminal background check. Wells Fargo will consider qualified candidates with criminal histories in a manner consistent with the requirements of applicable local, state and Federal law, including Section 19 of the Federal Deposit Insurance Act.

Relevant military experience is considered for veterans and transitioning service men and women.

Wells Fargo is an Affirmative Action and Equal Opportunity Employer, Minority/Female/Disabled/Veteran/Gender Identity/Sexual Orientation.

Associated topics: cybersecurity, identity access management, iam, information security, information technology security, leak, protect, security officer, violation, vulnerability

* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.