Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailLine of Service
AdvisoryIndustry/Sector
Not ApplicableSpecialism
Cybersecurity & PrivacyManagement Level
AssociateJob Description & Summary
A career in our Advisory Acceleration Centre is the natural extension of PwCs leading class global delivery capabilities. We provide premium cost effective high quality services that support process quality and delivery capability in support for client engagements.To really stand out and make us fit for the future in a constantly changing world each and every one of us at PwC needs to be a purpose-led and values-driven leader at every level. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines geographies and career paths and provides transparency on the skills we need as individuals to be successful and progress in our careers now and in the future.
As a Associate 2 youll work as part of a team of problem solvers helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to:
Cyber Threat & Device Monitoring Analyst (Tier 1) As an Associate youll work as part of a team of problem solvers helping to solve complex business issues from strategy to execution. Responsibilities include but are not limited to:
Roles & Responsibilities:
A 24x7 shift based schedule to continuously monitors the alert queue
Triage security and device alerts
Receives phone calls from clients and create necessary ticket for the incident or request and channel it to the required team for action
Collects data and context necessary to initiate investigation over to level 2 security analysts
Follows alerts and incidents playbooks/runbooks
Responsible for maintaining access to all security tools required for security investigation
Primarily responsible for security monitoring detection response and client care
Ensure incident identification assessment reporting communication mitigation and monitoring
Ensure compliance to SLA process adherence and process improvements to achieve operational objectives
Revise and develop processes to strengthen the current Security Operations Framework review policies and highlight the challenges in managing SLAs
Coordination with stakeholders build and maintain positive working relationships with them
Experience & Skills:
Proficient in Incident Management and Response
Experience in security device management and multiple SIEM platforms
In-depth knowledge of security concepts such as cyber-attacks and techniques threat vectors risk management incident management etc.
Experience in MSSP environment
Knowledge of various operating system flavors including but not limited to Windows Linux Unix
Knowledge of applications databases middleware to address security threats
Proficient in preparation of reports dashboards and documentation
Excellent communication and leadership skills
Experience in performing vendor management
Ability to handle high pressure situations with key stakeholders
Good Analytical skills Problem solving and Interpersonal skills
CISSP and GIAC certifications preferred
A demonstrated commitment to valuing differences and working alongside diverse people and perspectives
Qualifications:
A Bachelors Degree is a relevant area of study with a preference for Computer Science or Computer Engineering
Minimum of 2 years in Information Technology
Minimum of 2 years in Information Security
Education (if blank degree and/or field of study not specified)
Degrees/Field of Study required:Degrees/Field of Study preferred:Certifications (if blank certifications not specified)
Required Skills
Optional Skills
Accepting Feedback Accepting Feedback Active Listening Cloud Security Communication Conducting Research Cyber Defense Cyber Threat Intelligence Emotional Regulation Empathy Encryption Inclusion Information Security Intellectual Curiosity Intelligence Analysis Intelligence Report Intrusion Detection Intrusion Detection System (IDS) IT Operations Malware Analysis Malware Detection Tools Malware Intelligence Gathering Malware Research Malware Reverse Engineering Malware Sandboxing 11 moreDesired Languages (If blank desired languages not specified)
Travel Requirements
0%Available for Work Visa Sponsorship
NoGovernment Clearance Required
NoJob Posting End Date
Required Experience:
IC
Full-Time