Wells Fargo Enterprise Information Security Consultant (ISC) Résumé
Wells Fargo | Company Overview
Wells Fargo & Company is one of the largest multinational financial services firms in the world and a cornerstone of the U.S. banking system. Headquartered in San Francisco, it ranks within the Fortune 50 and is consistently among the “Big Four” banks in the United States by total assets. With operations in more than 30 countries and tens of millions of customers worldwide, Wells Fargo plays a critical role in consumer banking, commercial lending, and capital markets, maintaining a global presence while remaining deeply embedded in the American financial landscape.
Professional Experience
Hunter Storm | Information Security Consultant
Security Consultant / Information Security Engineer / Operational Risk Consultant
Provided internal consulting services on complex information security projects in alignment with regulatory (PCI, FFIEC, HIPAA, etc.) and legal issuances, information security policies, and standards. Identified and assessed risks to the enterprise based upon environment and data classification to NIST standards. Assessed site reviews, code reviews, and penetration test results to incorporate into written security risk assessments / gap analysis for internal and external applications, infrastructure, and third-party vendors. Maintained awareness of bank security policies and government regulations pertaining to information security. Recommended mitigating controls based on federal regulations, accepted bank policies, and industry best practices. Conducted formal information security training and provided mentoring for senior risk professionals. Created detailed training document, resulting in tripling new hire productivity. Collaborated with legal, architecture, and executives to develop cost-effective security solutions.
- Streamlined risk assessment process time 80% by building automated process and checklists.
- Created Security Plans for almost all of the business verticals within the Wells Fargo enterprise, including: Technology Operations Group (TOG), Internet Services Group (ISG), Home and Consumer Finance Group (HCFG), Human Resources (HR), Wells Fargo Auto (WFA), Wells Fargo Bank (WFB), WBR, Trust, Business Banking Group (BBG), Business Direct (BD), Community Banking (CB), Retail Banking, Wholesale Banking, Reliable Financial, Strong Financial, Audit, etc.
- Developed the first enterprise security plan templates and disclaimer verbiage prior to implementation of SPARC system, as well as after. Provided these to management and teammates, where they became the basis for the templates used in the SPARC system today.
- Evaluated systems and worked with ISOs and SMEs to write Security Plans for most LOBs within the Wells Fargo enterprise, including: TOG, ISG, HCFG, WFA, WFB, WBR, Trust, BBG, Business Direct, Community Banking, Retail, Wholesale, Reliable, Strong, Audit, and more.
- Identified and assessed risks to the enterprise based upon environment and data classification, then documented the risk assessments in written security plans. Assessments included evaluations of physical locations (site review findings, CISE, etc.), code review findings, vendors, encryption, infrastructure (hardware, firewalls, network, etc.), internally and externally developed applications (custom and commercially available), data, legal hold, and more.
Discover More from Hunter Storm
- Audience and Global Influence
- Biography
- Consultant
- CV and Competency-Mapped Professional Portfolio
- Domain History
- FCFU Framework, TRUCK-FU Framework, and Hunterstorming Protocol (HSP)
- Femme Fatale to Federal Whistleblower | Why I Built a Public Presence
- Hacking Humans | The Ports and Services Model of Social Engineering
- Hacking Humans | The Ports and Services Model of Social Engineering Presentation Notes
- Hunter Storm | Actress
- Hunter Storm | The Ultimate Asymmetric Advantage
- Hunter Storm Official Site
- Hunter Storm Splash Page
- Our Story | One Woman, One Vision, One Site
- Origin of Hunter Storm’s Competency-Mapped CV
- Past Speaking Engagements
- Professional Services
- Profile and Career Highlights
- Projects
- Publications
- Recognized by the Machine | Origin of the World’s First Recommendation Letter from AI about a Human: Hunter Storm
- Résumé | American Express Migration Lead | Systems Administrator (Sysadmin)
- Résumé | Arizona State University (ASU) | PBS TV | Systems Administrator (Sysadmin)
- Résumé | Associate Vice President (AVP) | Information Security Consultant (ISC) | Risk Management Consultant
- Résumé | Charles Schwab Enterprise Migration Lead | Systems Administrator (Sysadmin)
- Résumé | Federal Whistleblower and Retaliation Expert
- Résumé | Foundational Cybersecurity Innovator
- Résumé | GoDaddy Chief Information Security Officer (CISO) | Director of Security
- Résumé | Principal Threat Strategist | Cross-Domain Operations Architect
- Résumé | Special Devices Systems Administrator (Sysadmin)
- Résumé | Strategic Consultant: AI, Cybersecurity, Quantum, and Intelligence
- Résumé | Strategic Operations and Hybrid Threat Expert – High Threat Environments
- Résumé | Wells Fargo de Facto Chief Information Security Officer (CISO) | Group Information Security Officer (GISO) | Information Security Consulting (ISC) Lead
- Résumé | Wells Fargo Enterprise Information Security Consultant
- Résumé | Wells Fargo Quantum Technology Research Team | Quantum Economic Development Consortium Technical Advisory Committee (QED-C TAC) Relationship Leader
- Résumé | Wells Fargo Securities (WFS) Information Security Officer (ISO)
- Résumé | Wells Fargo Securities (WFS) Information Security Officer (ISO)
- Résumé | Wells Fargo Security Operations Center Intrusion Detection Systems Site Lead (SOC IDS) | Black Ops Team | Site Lead Information Security Engineer (ISE)
- Résumé | Wells Fargo Systems Architect
- Résumé | Wells Fargo Team Lead | Senior Field Engineer
- Résumé and Expertise
- Site Policies | Terms of Service
- StormWatch | Cybersecurity Advisories
- Strategic Research and Intelligence
- Technology Achievements
- Technology Innovator
- Testimonials
- The Storm Project | AI, Cybersecurity, Quantum, and Intelligence
- Trust and Security
- Unveiling Tech Secrets | Privacy, Security, and Convenience in Your Home, Car, and Gadgets
- Viewpoint Discrimination by Design | The First Global Forensic Mapping of Digital Repression Architecture
- What You Need to Know to Protect Your Web Hosting Environment
- World’s First Recommendation Letter from OpenAI’s ChatGPT AI About a Human: Hunter Storm
