drjobs ETIC Cyber Security Cloud Security Engineer Senior Associate English

ETIC Cyber Security Cloud Security Engineer Senior Associate

صاحب العمل نشط

1 وظيفة شاغرة
drjobs

حالة تأهب وظيفة

سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكتروني
Valid email field required
أرسل الوظائف
drjobs
أرسل لي وظائف مشابهة
drjobs

حالة تأهب وظيفة

سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكتروني

Valid email field required
أرسل الوظائف
موقع الوظيفة drjobs

القاهرة - مصر

الراتب شهرياً drjobs

لم يكشف

drjobs

لم يتم الكشف عن الراتب

عدد الوظائف الشاغرة

1 وظيفة شاغرة

الوصف الوظيفي

Line of Service

Advisory

Industry/Sector

Technology

Specialism

Advisory Other

Management Level

Senior Associate

Job Description & Summary

About PwC ETIC Egypt Technology and Innovation Centre
PwC is opening a new Technology & Innovation Center in Cairo that will
deliver high quality technology solutions to consulting Clients across the
globe. The Centre will provide a broad suite of skills and services to our
clients ranging from Packaged Applications such as SAP & Oracle to
Cybersecurity Data Analytics Custom Development and Cloud services
utilising AWS Azure and Google as well as expanding our existing
Managed Services capabilities.
The centre is looking to expand rapidly and we are looking for
enthusiastic selfstarters with a passion for technology and client
delivery to help shape and form this new venture.

About our practice

Cyber security is one of the defining topics of our age and cyber risk represents one of the most significant strategic risks to PwCs clients. In a recent PwC survey it remains the top risk in the minds of CEOs globally with 91 of UK CEOs rating it as a significant concern. Businesses are changing rapidly facing disrupted supply chains rapidly changing workforces and accelerating digital transformation on an unprecedented scale.

At PwC we help our clients transform and our cyber security practice enables them to execute that transformation securely and to become more resilient to cyber security threats. Our cyber security practice operates nationally and serves clients holistically with strategy risk and governance advice and with deep technical implementation and assurance expertise.

Cloud Security Configuration Review core responsibility
overview:

  • It involves examining the settings configurations and policies used in the IT environment identifying potential security gaps and vulnerabilities and recommending best practices to improve the security posture of the organization. The assets in scope can be (Network appliances security appliances and popular operating systems such as Microsoft windows Unix and Linux) the reviewer is expected to look into configurations setting as well as the man made rules such as firewall rules or access liststo check for any deviations.

    Configuration review process:

  • Validate the Scope: Confirm and validate the scope of the assessment including the systems and devices to be reviewed the types of configuration settings to be assessed and any specific security policies and standards that apply.
  • Prepare the Assessment Criteria or checklist: Develop assessment criteria and checklist based on vendor best practices industry standards and applicable client policies and procedures. The standards can include frameworks such as CIS Controls or NIST Cybersecurity Framework.
  • Conduct the Assessment: Conduct the assessment reviewing the configurations of systems and devices against the assessment criteria. This can be done using automated tools manual review or a combination of both.
  • Identify Findings: Identify any findings or deviations from the assessment criteria. This can include misconfigurations missing patches or insecure settings.
  • Analyze Findings: Analyze the findings to determine their impact on the security posture of the organization. Prioritize the findings based on the risk they pose to the organization.
  • Develop Recommendations: Develop recommendations for remediation of the findings including specific actions to be taken and timelines for completion.
  • Present Findings and Recommendations: Present the findings and recommendations to key stakeholders in the organization.

Overall a configuration review assessment involves a thorough review of configurations against established criteria and checklist to identify potential security risks and develop recommendations for remediation.

Experience in the those or similar tools is preferred: Nipper Tripwire Qualys Nessus Algosec...etc

Role requirements:
Good understanding and practical experience in infrastructure and Cloud
platform security
Good understanding of Microsoft Sentinel and KQL
Experience and proven record of success in integrating custom connectors
with Sentinel using APIs. If you have no direct experience with Sentinel
individuals with good developer skills will be considered
Experience with M365 Threat Protection technologies including Microsoft
Defender for Endpoint Microsoft Defender for Identity Microsoft Defender for
Office 365 and Microsoft Defender for Cloud Apps
Experience with Azure Security technologies including Microsoft Defender for
Cloud Key Vault Azure DDoS Protection and other
Experience with Information Protection technologies such as Azure
Information Protection Windows Information Protection and Data Loss
Prevention
Handson experience establishing and configuring security controls for
Microsoft Azure components (i.e. Defender for Cloud Azure Firewall Azure
DDOS Protection Azure Bastion and Sentinel)
Handson experience establishing and configuring security controls for
Microsoft 365 components (i.e. Microsoft Purview Defender for Cloud App
Endpoint Identity and Vulnerability Management)
Handson experience establishing and configuring security controls for general
security solution (i.e. Azure Active Directory Azure Identity Protection and
Azure RBAC)
Experience with compliance technologies including Advanced eDiscovery Data
Retention and Insider Risk Management
Experience with Identity technologies including Azure Active Directory P1 & P2
Familiarity with a programming or scripting languages (esp. in KQL and
PowerShell) is a plus
Familiarity with Power BI Power Apps or Power Automate is a plus








Knowledge of wellknown SaaS technologies (i.e. SAP Oracle) is a plus
At least 1 year of relevant work experience for Associate grade
At least 3 years of relevant work experience for Senior Associate grade
Open minded seeking innovative solutions
Ability to work within a fastpaced & unstructured environment
Ability to adapt to and communicate with different working styles
Ability to interact efficiently with senior members of the firm across
multiple time zones

Essential skills & attributes:
Demonstrates extensive knowledge in infrastructure and cloud security
Experience in Consulting or in working within multinational environments
Excellent communication and presentation skills
High level of customer orientation and a convincing demeanour
Ability to work within a fastpaced & unstructured environment.Must be able
to multitask and effectively and continually prioritise
Excellent oral and written English skills. German language proficiency is a

plus
Education
University degree ideally in the fields of Computer and Information Science
Business Informatics Computer Engineering Cyber Security Information
Technology Management Information Systems


The following Microsoft certifications are a significant plus:

  • Azure Security Engineer Associate (AZ500

  • Azure Solutions Architect Expert (AZ303 or AZ304 or AZ405

  • Cybersecurity Architect Expert (SC100

  • Security Operations Analyst Associated (SC200

  • Identity and Access Administrator Associate (SC300

  • Information Protection Administrator Associate (SC400

Education (if blank degree and/or field of study not specified)

Degrees/Field of Study required:

Degrees/Field of Study preferred:

Certifications (if blank certifications not specified)

Required Skills

Optional Skills

Accepting Feedback Accepting Feedback Active Listening Analytical Thinking Cloud Administration Cloud Engineering Cloud Infrastructure Cloud Infrastructure Architecture Design Cloud Resource Management Cloud Security Cloud Security Auditing Cloud Service Delivery Cloud Service Level Risk Management Communication Creativity Cyber Engineering Embracing Change Emotional Regulation Empathy Forensic Investigation Incident Investigation Inclusion Information Security Infrastructure as a Service (IaaS) Intellectual Curiosity 19 more

Desired Languages (If blank desired languages not specified)

Travel Requirements

Not Specified

Available for Work Visa Sponsorship

Yes

Government Clearance Required

No

Job Posting End Date


Required Experience:

Senior IC

نوع التوظيف

دوام كامل

نبذة عن الشركة

الإبلاغ عن هذه الوظيفة
إخلاء المسؤولية: د.جوب هو مجرد منصة تربط بين الباحثين عن عمل وأصحاب العمل. ننصح المتقدمين بإجراء بحث مستقل خاص بهم في أوراق اعتماد صاحب العمل المحتمل. نحن نحرص على ألا يتم طلب أي مدفوعات مالية من قبل عملائنا، وبالتالي فإننا ننصح بعدم مشاركة أي معلومات شخصية أو متعلقة بالحسابات المصرفية مع أي طرف ثالث. إذا كنت تشك في وقوع أي احتيال أو سوء تصرف، فيرجى التواصل معنا من خلال تعبئة النموذج الموجود على الصفحة اتصل بنا