This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Wells Fargo is seeking a Lead Infrastructure Engineer on the Cloud Policy and Data Protection Engineering team within Core Infrastructure Services (CIS). CIS accelerates enterprise application transformation by empowering engineers to build and run secure, scalable applications on cloud platforms. This role requires strong software engineering fundamentals, extensive automation experience, and the ability to design, build, and lead delivery of enterprise cloud compliance and data protection capabilities. Must have extensive experience with scripting and automation practices.
Job Responsibility:
Full‑stack product engineering: Design and build internal applications, dashboards, and APIs for cloud policy, firewall, and data‑protection services using ReactJS, Python, Django, Postgres SQL and Azure SQL Managed Instance (SQL MI)
Create secure, testable backend services (REST), integrate with cloud policy/KMS platforms, and automation systems
Build reusable UI components and front‑end frameworks that support consistent user experiences across policy, firewall, and data‑protection dashboards
Own the full API lifecycle, including design, versioning, documentation, and long‑term maintenance, to support scalable integration patterns across engineering teams
Implement monitoring and observability for applications and services using tools such as Application Insights, Azure Monitor, and Cloud Logging to ensure reliability and performance
Ensure strong developer experience (DX) through intuitive APIs, documentation, self‑service workflows, and responsive support patterns
Cloud policy engineering: Engineer and operationalize policy frameworks across Azure and GCP (e.g., Azure Policy, GCP Organization Policy, HashiCorp Sentinel), including remediation, exemptions, compliance mapping
Resolve complex cloud‑control challenges such as VPC‑SC errors and guardrail conflicts
Contribute to companywide standards/best practices, landing‑zone patterns, and “secure‑by‑default” resource templates
Data protection engineering: Engineer, operate, and automate key and secret management and data protection services (e.g., Azure Key Vault, Managed HSM, Cloud KMS
rotation, audit, monitoring) for Azure and GCP platforms
Provide Tier‑3 engineering support, incident response, and vendor escalation for encryption technologies to ensure resiliency and alignment with enterprise security requirements
Platform, IaC & DevOps: Design, code, test, and ship cloud infrastructure using Terraform (modules, registries, versioning, policy‑as‑code) with GitHub and CI/CD (GitHub Actions, Jenkins, Harness)
Pub/Sub equivalents), IaC testing (tflint, compliance tests), and Terraform Enterprise workflows for scale
Leadership & collaboration: Lead complex, cross‑org cloud initiatives
act as an escalation point
mentor engineers
and collaborate with partner teams and vendors in a globally distributed environment
Define architectural patterns and technical strategy for cloud policy, compliance automation, and data‑protection services, ensuring solutions scale across multiple cloud platforms and engineering teams
Requirements:
5+ years of Software Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
3+ years full‑stack development (ReactJS, Python, Django, MI/ SQL Server)
3+ years IaC with Terraform and GitHub (module development, versioning, reusable patterns, and compliance controls)
3+ years cloud platform security services
3+ years DevOps/CI‑CD engineering (GitHub Actions, Jenkins, Harness)
Nice to have:
3 yrs with Azure or GCP platform security services
Scripting in PowerShell/Bash
Experience with key/secret management and encryption technologies
IAM/Entra ID, service accounts, managed identities, least‑privilege
Experience automating and managing Palo Alto cloud firewall policies through Terraform, GitHub workflows, or other CI/CD platforms