Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailLine of Service
AdvisoryIndustry/Sector
Not ApplicableSpecialism
Managed ServicesManagement Level
Senior AssociateJob Description & Summary
At PwC our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities develop secure systems and provide proactive solutions to safeguard sensitive data.Focused on relationships you are building meaningful client connections and learning how to manage and inspire others. Navigating increasingly complex situations you are growing your personal brand deepening technical expertise and awareness of your strengths. You are expected to anticipate the needs of your teams and clients and to deliver quality. Embracing increased ambiguity you are comfortable when the path forward isnt clear you ask questions and you use these moments as opportunities to grow.
Examples of the skills knowledge and experiences you need to lead and deliver value at this level include but are not limited to:
Senior Associate Cyber Managed Service Job Description
PwC is looking for an experienced technical candidate to lead and support our Cyber Managed Service clients and Security Operations Center Team an essential part of our worldclass managed services portfolio. In this role you will be part of a team leading clientcentric program development analytics innovation response and delivery. A career in PwCs rapidly growing Cyber Managed Services practice will provide you the opportunity to help define how we solve our clients most critical cyberrelated challenges and allow them to thrive and focus on their core business.
As a Cyber Ops Sr. Associate youll work as part of a team of problem solvers helping to solve complex business issues from strategy to . PwC Professional skills and responsibilities for this level include but are not limited to:
Invite and provide inthemoment feedback in a constructive manner.
Share and collaborate effectively with others creating a positive team spirit.
Identify and make suggestions for improvements when problems and/or opportunities arise.
Validate data and analysis for accuracy and relevance.
Follow risk management and compliance procedures.
Keep uptodate with developments in my area of specialty.
Communicate confidently in a clear concise and articulate manner verbally and in written form.
Seek opportunities to learn about the wider economy alongside the business models/corporate governance and/or regulatory environment of our clients.
Uphold the firms code of ethics and business conduct.
Basic Qualifications:
Minimum Degree Required: Bachelors Degree
Minimum Years of Experience: Five 5 or more
Certification(s) Preferred: GSEC GCDA SEC Network Certified Incident Handler (GCIH) Certified Intrusion Analyst (GIAC) CCNASecurity CEH CISSP CTIA
Preferred Knowledge/Skills: Demonstrates knowledge leadership and/or a proven record of success in the following areas:
Networking and applying Network Principles (including the OSI Model TCP/IP DNS HTTP SMTP) System Administration and Security Architecture
Applying Incident Response Frameworks and Handling Procedures
Threat Hunting/Threat Intelligence (Hypothesis and IOC)
SIEM/SOAR Engineering and Administration
Malware Analysis (Static and Dynamic)
Fluency with the cyber attack lifecycle and/or the tactics techniques and procedures of threat actors
Information security compliance assurance and/or other security best practices and principles
Possessing and fostering an inquisitive mindset amongst team members
Demonstrates abilities leadership and/or a proven record of success in the following areas:
Working in a global team environment in an assigned shift ensuring holidays coverage aligns with client schedules
Leading daily huddles shift handovers preparing reports or providing inputs for reports as assigned
Acting as a shift leader monitoring and responding to alert queues distributing alerts to analysts monitoring SLA adherence and working in an evolving environment with multiple priorities.
Acting as the escalation point for Level 1 analysts based on the defined processes; leading investigations into SIEM EDR Email Security DLP and Phishing security issues and determining if a security concern is present escalating to client security teams or Cyber Ops leadership as appropriate
Monitoring and analyzing alerts from a wide array of security devices and systems such as SIEMs Firewalls IDS/IPS systems network and perimeter devices Endpoint Detection and Response (EDR) platforms etc.
Applying the security incident response process: identification containment and remediation on a 24x7 basis as well as maintaining a willingness to provide suggestions for process improvement.
Applying scripting language skills in Python or PowerShell to investigations or triage workflow
Preparing materials (reports presentations spreadsheets etc. to help enable informed decision making
Acquiring and utilizing knowledge on new technologies and solutions exploits attack vectors emerging threats and vulnerabilities
Running and analyzing vulnerability scan per client schedules
Analyzing and working with SIEMs proxy tools network security devices IAM DLP Windows *NIX and application logs and cloud security monitoring tools and services
Researching and communicating information regarding the security threat landscape to team members leadership and clients
Contributing to an environment of information sharing as well as acting as a coach for lowerlevel more junior analysts.
Tools Knowledge:
SentinelOne Splunk MS Sentinel MS Defender EDR CrowdStrike Cortex XDR Palo Alto XSOAR Phantom O365 Proofpoint DLP
SentinelOne:
Play a critical role in proactively detecting analyzing and responding to cybersecurity threats using SentinelOne SIEM platforms.
Lead the investigation of complex security incidents perform indepth threat analysis and guide junior analysts (L1 during triage and escalation processes.
Experience in building and optimizing dashboards creating and managing watchlists writing and finetuning queries and developing detection rules aligned with current threat intelligence and MITRE ATT&CK use cases.
Education (if blank degree and/or field of study not specified)
Degrees/Field of Study required:Degrees/Field of Study preferred:Certifications (if blank certifications not specified)
Required Skills
Optional Skills
Accepting Feedback Accepting Feedback Active Listening Analytical Thinking Communication Creativity Cybersecurity Framework Cybersecurity Governance Cybersecurity Risk Management Cybersecurity Strategy Cyber Security Threat Mitigation Cyber Threat Intelligence Digital Forensics Embracing Change Emotional Regulation Empathy Firewall (Network Security) Forensic Investigation Incident Management Incident Remediation Incident Response Plan Inclusion Intellectual Curiosity Learning Agility Log Analysis 15 moreDesired Languages (If blank desired languages not specified)
Travel Requirements
Not SpecifiedAvailable for Work Visa Sponsorship
NoGovernment Clearance Required
NoJob Posting End Date
Required Experience:
Senior IC
Full-Time