drjobs VM Operations SA JDMigrated Associate - Operate

VM Operations SA JDMigrated Associate - Operate

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Bengaluru - India

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Line of Service

Advisory

Industry/Sector

Not Applicable

Specialism

Managed Services

Management Level

Associate

Job Description & Summary

At PwC our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities develop secure systems and provide proactive solutions to safeguard sensitive data.

In cybersecurity incident management at PwC you will focus on effectively responding to and mitigating cyber threats maintaining the security of client systems and data. You will be responsible for identifying analysing and resolving security incidents to minimise potential damage and protect against future attacks.

Driven by curiosity you are a reliable contributing member of a team. In our fastpaced environment you are expected to adapt to working with a variety of clients and team members each presenting varying challenges and scope. Every experience is an opportunity to learn and grow. You are expected to take ownership and consistently deliver quality work that drives value for our clients and success as a team. As you navigate through the Firm you build a brand for yourself opening doors to more opportunities.

Examples of the skills knowledge and experiences you need to lead and deliver value at this level include but are not limited to:

  • Apply a learning mindset and take ownership for your own development.
  • Appreciate diverse perspectives needs and feelings of others.
  • Adopt habits to sustain high performance and develop your potential.
  • Actively listen ask questions to check understanding and clearly express ideas.
  • Seek reflect act on and give feedback.
  • Gather information from a range of sources to analyse facts and discern patterns.
  • Commit to understanding how the business works and building commercial awareness.
  • Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance) uphold the Firms code of conduct and independence requirements.

REQUIRED EXPERIENCE: 2 to 5 years of experience in operations of Vulnerability Management using vulnerability assessment tools for large scale customers across various industry verticals

Experience on performing analysis and prioritization of identified vulnerabilities and remediation recommendations.

Requirements:

  • Qualification: BE / B Tech / ME / M Tech / B.SC / B / BBA

  • Candidate should be willing to work in IST/EST shift timing.

  • Demonstrates experience driving the configuration of vulnerability assessment tools including the integration of feedback from IT owners to reduce false positives.

  • Demonstrates experienceperforming analysis and prioritization of identified vulnerabilities and remediation recommendations.

  • Demonstrates experience preparing vulnerability data and reports for technical and executive audiences.

  • Demonstrates experience identifying timelines/programs and guiding teams to address vulnerabilities including system patching deployment of specialized controls code or infrastructure changes changes in build engineering processes.

  • Demonstrates experience tracking and remediation of vulnerabilities leveraging agreed upon action plans and timelines with responsible technology partners and support teams.

  • Demonstrates experience designing and overseeing actionable dashboards and scorecards.

  • Demonstrates experience reviewing and coordinating changes to patch policies procedures standards and audit work programs in a continuous improvement model.

  • Demonstrates experience driving the protection of valuable information and maintaining confidentiality and integrity of data through knowledge of security management network protocols data application security solutions.

  • Demonstrates knowledge of industry trends including current and emerging risks.

  • Demonstrates knowledge of relevant legislation regulatory requirements guidelines and industry developments related to data protection privacy security and data governance.

  • Demonstrates experience with end to end Vulnerability Management processes and tools including host based applications scanners patch management GRC tools and ITSM.

  • Demonstrates knowledge of operating system and application security administration and debugging.

  • Demonstrates knowledge of security controls including access controls auditing authentication encryption integrity physical security and application security and Vulnerability Management tools like Qualys Tenable Nessus.

Responsibilities

As a Associate you will work as part of a team of problem solvers helping to solve complex business issues from strategy to .

  • Use feedback and reflection to develop selfawareness personal strengths and address development areas.

  • Delegate to others to provide stretch opportunities and coach to help deliver results.

  • Develop new ideas and propose innovative solutions to problems.

  • Use a broad range of tools and techniques to extract insights from current trends in the business area.

  • Review your work and that of others for quality accuracy and relevance.

  • Share relevant thought with leadership.

  • Use straightforward communication in a structured way when influencing others.

  • Able to read situations and modify behavior to build quality diverse relationships.

Education (if blank degree and/or field of study not specified)

Degrees/Field of Study required:

Degrees/Field of Study preferred:

Certifications (if blank certifications not specified)

Required Skills

Optional Skills

Accepting Feedback Accepting Feedback Active Listening Communication Cybersecurity Framework Cybersecurity Governance Cybersecurity Risk Management Cybersecurity Strategy Cyber Security Threat Mitigation Cyber Threat Intelligence Digital Forensics Emotional Regulation Empathy Firewall (Network Security) Forensic Investigation Incident Management Incident Remediation Incident Response Plan Inclusion Intellectual Curiosity Log Analysis Mitigation Measures Network Forensics Network Infrastructure Network Security Platforms 10 more

Desired Languages (If blank desired languages not specified)

Travel Requirements

Not Specified

Available for Work Visa Sponsorship

No

Government Clearance Required

No

Job Posting End Date


Required Experience:

IC

Employment Type

Full-Time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.