Senior Manager, Digital Forensics & Threat Hunting – R.A.P.T.O.R

Other Jobs To Apply

<p><b>About this role:</b></p><p>Wells Fargo is seeking an Information Security Engineering Senior Manager in Technology as part of Cybersecurity. Learn more about the career areas and lines of business <span style="overflow-wrap: break-word; display: inline; text-decoration: inherit; hyphens: auto;">at wellsfargojobs.com.</span></p><p><br>We are seeking a dynamic Senior Manager to lead and mature our global Incident Response and Threat Hunting programs within our R.A.P.T.O.R (Reconnaissance – Analysis and Pursuit for Threat Operations and Response) Team. This role demands deep technical expertise in cyber defense, advanced threat detection, and security architecture, combined with proven leadership in building, mentoring, and scaling high-performing teams. The Senior Manager will drive strategic initiatives, oversee complex investigations, and collaborate cross-functionally to ensure enterprise resilience against sophisticated cyber threats.</p><p></p><p>This position can be hired remotely.</p><p><br><b>In this role, you will:</b></p><ul><li>Manage a team, through less experienced managers, of Information Security Engineers that design, document, test, maintain and provide issue resolution recommendations for highly complex security solutions related to networking, cryptography, cloud, authentication or directory services, email, internet, applications, or endpoint security</li><li>Engage more experienced information security and line of business management to identify, formulate and implement information security solutions and controls</li><li>Lead a large, complex information security unit or a number of smaller specialized work units with direct impact to companywide information security objectives having high risk and complexity</li><li>Manage security consulting on large projects for internal clients to ensure conformity with corporate information security policy and standards</li><li>Set guidelines for compliance and risk management requirements for supported area and work with other stakeholders to implement key risk initiatives</li><li>Oversee resource allocations to ensure commitments align with strategic objectives</li><li>Manage implementation of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management and business continuity</li><li>Maintain a broad awareness of the state of information security across the enterprise and industry</li><li>Influence change to information security policy, standards and procedures for systems, applications or tools</li><li>Lead large, companywide projects and initiatives</li><li>Represent the organization to regulators, industry groups and governmental agencies</li><li>Interface with Information Security Industry Leaders, Financial industry Leaders, Analysts and Regulators</li><li>Advise more experienced leadership or executive management on issues with high, critical impact on the company</li><li>Manage allocation of people and financial resources for Information Security Architecture</li><li>Develop and guide a culture of talent development to meet business objectives and strategy</li></ul><p><br><b>Key Responsibilities</b></p><ul><li>Program Leadership & Strategy<ul><li>Architect and continuously improve enterprise-wide incident response and threat hunting programs, aligning methodologies with frameworks such as MITRE ATT&CK.</li><li>Develop and enforce standardized playbooks, workflows, and KPI-driven metrics for incident response and threat hunting operations.  Review and realign current methodologies.</li><li>Lead the design and delivery of executive-level tabletop exercises and technical workshops to enhance organizational cyber resilience.</li></ul></li><li>Team Management & Mentorship<ul><li>Build, mentor, and manage teams of senior incident responders, and threat hunters.</li><li>Deliver advanced training curricula covering adversary TTP analysis, hypothesis-driven hunting, log analysis, and custom detection engineering.</li><li>Foster a culture of continuous improvement, technical excellence, and proactive threat identification.</li></ul></li><li>Technical Oversight<ul><li>Oversee end-to-end incident response for cloud and on-premises environments, ensuring rapid identification, containment, and remediation of advanced threats.</li><li>Direct the development and optimization of custom threat detection logic, hunting queries, and automated workflows across SIEM and EDR platforms.</li><li>Integrate threat intelligence and behavioral analytics to improve detection efficiency and reduce false positives.</li></ul></li><li>Cross-Functional Collaboration<ul><li>Partner with legal, compliance, and executive leadership to manage post-incident reporting, regulatory compliance, and external threat intelligence sharing.</li><li>Advise stakeholders on strategic threat intelligence, attack surface reduction, and emerging threats.</li><li>Assist with vulnerability assessments, penetration testing, and defense-in-depth strategies for critical infrastructure and business operations.</li></ul></li><li>Operational Excellence<ul><li>Orchestrate full-lifecycle investigations into APTs, ransomware, and insider threats, leveraging forensic tools and threat intelligence platforms.</li><li>Conduct root cause analysis and deliver actionable recommendations to prevent recurrence and strengthen enterprise security posture.</li><li>Work with SIEM platform teams to better enrich visibility of our global network and endpoints.</li></ul></li></ul><p></p><p><b>Required Qualifications:</b></p><ul><li>6+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education</li><li>3+ years of management or leadership experience</li><li>Demonstrated expertise in SIEM/EDR platforms, forensic analysis, and threat intelligence integration.</li></ul><p></p><p><b>Desired Qualifications:</b></p><ul><li>Patent holder or published author in cybersecurity methodologies.</li><li>Experience with cloud security, IoT, and industrial control systems.</li><li>Strong communication, leadership, and stakeholder management skills.</li><li>Bachelor’s Degree in Computer Information Systems, Cybersecurity, or related field.</li><li>Advanced certifications: CISSP, CISM, GCFA, OSWP, CREA.</li><li>Proven track record in developing and scaling security programs, training teams, and leading high-impact investigations.</li><li>Experience with regulatory compliance, post-incident reporting, and executive communications.</li></ul><p style="text-align:inherit"></p><p style="text-align:inherit"></p><p style="text-align:inherit"></p><p style="text-align:left"><b>Pay Range</b><br> </p><p style="text-align:left">Reflected is the base pay range offered for this position. Pay may vary depending on factors including but not limited to achievements, skills, experience, or work location. The range listed is just one component of the compensation package offered to candidates.</p>$191,000.00 - $305,000.00<div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><p style="text-align:inherit"></p><p style="text-align:left"><span><span><span><b>Benefits </b></span></span></span></p><p style="text-align:inherit"></p><p style="text-align:left">Wells Fargo provides eligible employees with a comprehensive set of benefits, many of which are listed below. Visit <a href="https://www.wellsfargojobs.com/en/life-at-wells-fargo/benefits" target="_blank" rel="noopener noreferrer">Benefits - Wells Fargo Jobs</a> for an overview of the following benefit plans and programs offered to employees.</p><ul><li>Health benefits</li><li>401(k) Plan</li><li>Paid time off</li><li>Disability benefits</li><li>Life insurance, critical illness insurance, and accident insurance</li><li>Parental leave</li><li>Critical caregiving leave</li><li>Discounts and savings</li><li>Commuter benefits</li><li>Tuition reimbursement</li><li>Scholarships for dependent children</li><li>Adoption reimbursement</li></ul></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><p style="text-align:inherit"></p><p style="text-align:left"><b><span>Posting End Date:</span></b></p><p style="text-align:inherit"></p>5 Nov 2025<p style="text-align:left"><b><span>*<i><span>Job posting may come down early due to volume of applicants.</span></i></span></b></p><p></p><p><b><span>We Value Equal Opportunity</span></b></p><p></p><p><span>Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic.</span></p><p></p><p><span><span><span>Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit’s risk appetite and all risk and compliance program requirements.</span></span></span></p><p></p><p style="text-align:inherit"></p><p style="text-align:left"><b><span>Applicants with Disabilities</span></b></p><p style="text-align:inherit"></p><p style="text-align:left"><span>To request a medical accommodation during the application or interview process, visit </span><span><a href="https://www.wellsfargojobs.com/en/diversity/disability-inclusion/" target="_blank" rel="noopener noreferrer"><span>Disability Inclusion at Wells Fargo</span></a></span><span>.</span></p><p style="text-align:inherit"></p><p style="text-align:inherit"></p><p style="text-align:inherit"></p><p style="text-align:left"><b>Drug and Alcohol Policy</b></p><p style="text-align:inherit"><b> </b></p><p style="text-align:left">Wells Fargo maintains a drug free workplace.  Please see our <a href="https://www.wellsfargojobs.com/en/wells-fargo-drug-and-alcohol-policy" target="_blank" rel="noopener noreferrer">Drug and Alcohol Policy</a> to learn more.</p><p style="text-align:inherit"></p><p style="text-align:left"><b>Wells Fargo Recruitment and Hiring Requirements:</b></p><p style="text-align:inherit"></p><p style="text-align:left">a. Third-Party recordings are prohibited unless authorized by Wells Fargo.</p><p style="text-align:left">b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.</p>

Back to blog

Common Interview Questions And Answers

1. HOW DO YOU PLAN YOUR DAY?

This is what this question poses: When do you focus and start working seriously? What are the hours you work optimally? Are you a night owl? A morning bird? Remote teams can be made up of people working on different shifts and around the world, so you won't necessarily be stuck in the 9-5 schedule if it's not for you...

2. HOW DO YOU USE THE DIFFERENT COMMUNICATION TOOLS IN DIFFERENT SITUATIONS?

When you're working on a remote team, there's no way to chat in the hallway between meetings or catch up on the latest project during an office carpool. Therefore, virtual communication will be absolutely essential to get your work done...

3. WHAT IS "WORKING REMOTE" REALLY FOR YOU?

Many people want to work remotely because of the flexibility it allows. You can work anywhere and at any time of the day...

4. WHAT DO YOU NEED IN YOUR PHYSICAL WORKSPACE TO SUCCEED IN YOUR WORK?

With this question, companies are looking to see what equipment they may need to provide you with and to verify how aware you are of what remote working could mean for you physically and logistically...

5. HOW DO YOU PROCESS INFORMATION?

Several years ago, I was working in a team to plan a big event. My supervisor made us all work as a team before the big day. One of our activities has been to find out how each of us processes information...

6. HOW DO YOU MANAGE THE CALENDAR AND THE PROGRAM? WHICH APPLICATIONS / SYSTEM DO YOU USE?

Or you may receive even more specific questions, such as: What's on your calendar? Do you plan blocks of time to do certain types of work? Do you have an open calendar that everyone can see?...

7. HOW DO YOU ORGANIZE FILES, LINKS, AND TABS ON YOUR COMPUTER?

Just like your schedule, how you track files and other information is very important. After all, everything is digital!...

8. HOW TO PRIORITIZE WORK?

The day I watched Marie Forleo's film separating the important from the urgent, my life changed. Not all remote jobs start fast, but most of them are...

9. HOW DO YOU PREPARE FOR A MEETING AND PREPARE A MEETING? WHAT DO YOU SEE HAPPENING DURING THE MEETING?

Just as communication is essential when working remotely, so is organization. Because you won't have those opportunities in the elevator or a casual conversation in the lunchroom, you should take advantage of the little time you have in a video or phone conference...

10. HOW DO YOU USE TECHNOLOGY ON A DAILY BASIS, IN YOUR WORK AND FOR YOUR PLEASURE?

This is a great question because it shows your comfort level with technology, which is very important for a remote worker because you will be working with technology over time...