Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailLine of Service
AdvisoryIndustry/Sector
FS XSectorSpecialism
RiskManagement Level
Senior AssociateJob Description & Summary
At PwC our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities develop secure systems and provide proactive solutions to safeguard sensitive data.*Why PWC
At PwC we believe in providing equal employment opportunities without any discrimination on the grounds of gender ethnic background age disability marital status sexual orientation pregnancy gender identity or expression religion or other beliefs perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firms growth. To enable this we have zero tolerance for any discrimination and harassment based on the above considerations.
Job Description & Summary:We are seeking a highly skilled and experienced Cybersecurity/Risk Consulting Senior Associate to join our Risk Consulting team. As a Cybersecurity Senior Associate you will be responsible for leading and managing a team of consultants to deliver highquality cybersecurity and risk management services to our clients.
Responsibilities:
Good interpersonal skills (written and oral communication) and ability to articulate complex issues
Ability to communicate technical
information clearly and concisely commensurate with the audience
Conceptual thinking and communication skills the ability to conceptualize complex business and technical requirements into comprehensible models and templates.
Good communicator (written and verbal) and listener.
Must be a team player and motivated selfstarter with ability to work independently with limited supervision.
Must be assertive methodical and detail oriented
Technical Experience:
Experience in Web and Mobile Application Security Testing Vulnerability Assessment and Penetration testing
Analyze scan reports and suggest remediation / mitigation plan for security vulnerabilities
Should be aware of tools like Qualys HP Fortify IBM Appscan Burpsuite Kali Linux suite of tools
Expertise in mobile apps reverse engineering and indepth knowledge of Android and iOS ecosystems. Knowledge of industry standard tools for mobile pentest.
Thorough understanding of OWASP Top 10 vulnerabilities and their mitigations. Knowledge of Network Security technology in areas of Firewall IPS VPN Gateway security solutions (proxy web filtering)
Conduct penetration test and launch exploits using Nessus Metaspoilt kali linux penetration testing distribution tools sets
Conduct Vulnerability Assessments of Network Devices using various open source and commercial tools
Map out a network discover ports and services running on the different exposed network and security devices
Research and maintain proficiency in computer network exploitation tools techniques countermeasures and trends in computer network vulnerabilities data hiding network security and encryption.
Indepth understanding on Common Vulnerability Exposure (CVE)/ CERT advisory database. Broad background of networks operating systems (Window Unix Linux) firewalls and security engineering concepts.
Knowledge of scripting languages (Perl Python Shell etc) will be added advantage
Knowledge of OpenSource Security Testing Methodology Manual (OSSTMM)
Mandatory skill sets:
CEH ECSA LPT any one)
Preferred skill sets:
OSCP OSWE
Years of experience required:
212 years
Education qualification:
Education (if blank degree and/or field of study not specified)
Degrees/Field of Study required: Master of Business Administration Bachelor of EngineeringDegrees/Field of Study preferred:Certifications (if blank certifications not specified)
Required Skills
SoCsOptional Skills
Accepting Feedback Accepting Feedback Active Listening Agile Methodology Analytical Thinking Azure Data Factory Communication Creativity Cybersecurity Cybersecurity Framework Cybersecurity Policy Cybersecurity Requirements Cybersecurity Strategy Embracing Change Emotional Regulation Empathy Encryption Technologies Inclusion Intellectual Curiosity Learning Agility Managed Services Optimism Privacy Compliance Regulatory Response Security Architecture 8 moreDesired Languages (If blank desired languages not specified)
Travel Requirements
Not SpecifiedAvailable for Work Visa Sponsorship
NoGovernment Clearance Required
NoJob Posting End Date
Required Experience:
Senior IC
Full-Time