
Lead SIEM Engineer
Wells Fargo
full-time
Posted on:
Location Type: Hybrid
Location: Iselin • Arizona, New Jersey, Texas • 🇺🇸 United States
Visit company websiteSalary
💰 $119,000 - $224,000 per year
Job Level
Senior
Tech Stack
AnsibleCloudPythonSplunkTerraform
About the role
- Lead computer security incident response activities for highly complex events
- Conduct technical investigation of security related incidents and post incident digital forensics to identify causes and recommend future mitigation strategies
- Provide security consulting on large projects for internal clients to ensure conformity with corporate information, security policy, and standards
- Design, document, test, maintain, and provide issue resolution recommendations for highly complex security solutions related to networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security
- Review and correlate security logs
- Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity
- Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives
- Collaborate and influence all levels of professionals including managers
- Lead a team to achieve objectives
- Act as a subject matter expert for Splunk architecture and engineering. Translate business and compliance requirements into technical solutions using Splunk. Maintain awareness of industry best practices and emerging technologies in observability and log management. Drive continuous improvement and innovation across Splunk deployments. Collaborate with leadership to align technical solutions with enterprise priorities.
Requirements
- 5+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
- 3+ years of hands-on experience with Splunk architecture, administration, and content development.
- Strong understanding of log ingestion, parsing, and data normalization.
- Experience with Splunk Cloud and/or hybrid deployments.
- Familiarity with automation tools (e.g., Python, Ansible, Terraform).
Benefits
- Health benefits
- 401(k) Plan
- Paid time off
- Disability benefits
- Life insurance, critical illness insurance, and accident insurance
- Parental leave
- Critical caregiving leave
- Discounts and savings
- Commuter benefits
- Tuition reimbursement
- Scholarships for dependent children
- Adoption reimbursement
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
information security engineeringdigital forensicsrisk managementthreat identificationincident responseaccess managementSplunk architecturelog ingestiondata normalizationautomation tools
Soft skills
leadershipcollaborationinfluencecommunication