Important Note: During the application process, ensure your contact information (email and phone number) is up to date and upload your current resume when submitting your application for consideration. To participate in some selection activities you will need to respond to an invitation. The invitation can be sent by both email and text message. In order to receive text message invitations, your profile must include a mobile phone number designated as “Personal Cell” or “Cellular” in the contact information of your application.
At Wells Fargo, we want to satisfy our customers’ financial needs and help them succeed financially. We’re looking for talented people who will put our customers at the center of everything we do. Join our diverse and inclusive team where you’ll feel valued and inspired to contribute your unique skills and experience.
Help us build a better Wells Fargo. It all begins with outstanding talent. It all begins with you.
Wells Fargo Technology sets IT strategy; enhances the design, development, and operations of our systems; optimizes the Wells Fargo infrastructure footprint; provides information security; and enables continuous banking access through in-store, online, ATM, and other channels to Wells Fargo’s more than 70 million global customers.
The Identity and Access Management group has an opening for an Information Security Analyst 4 to perform platform access provisioning for Unix access. This position includes providing access management support for Unix access across several business channels, and meeting Service level and Quality Assurance targets.
Provides access management support for Unix systems using approved security tools and applications. Provide technical support for complex security-related issues. Fulfills entitlements requests for authorization and authentication. Reviews access requests for proper authorizations, enforces access management policies and control requirements. Provides technical support for large scale access implementations, assist staff with security consulting and complex security projects related to data access, integrity, confidentiality and business continuity. Assists technology partners with identifying security risks to their applications. Participates in the evaluation and implementation of emerging data access control technologies, information systems security issues, safeguards and techniques. May provide support for testing, emergencies, installations and conversions. May assist in audit compliance projects and access remediations. Provide alternating on-call 24/7 support for after-hours emergencies.
Launch your career - Create your profile now!Create your Profile
Loading some great jobs for you...