drjobs Cyber - TDR Associate L1 India__Migrated - Associate - Operate

Cyber - TDR Associate L1 India__Migrated - Associate - Operate

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Bengaluru - India

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Line of Service

Advisory

Industry/Sector

Not Applicable

Specialism

Managed Services

Management Level

Associate

Job Description & Summary

At PwC our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities develop secure systems and provide proactive solutions to safeguard sensitive data.

In cybersecurity incident management at PwC you will focus on effectively responding to and mitigating cyber threats maintaining the security of client systems and data. You will be responsible for identifying analysing and resolving security incidents to minimise potential damage and protect against future attacks.

Driven by curiosity you are a reliable contributing member of a team. In our fast-paced environment you are expected to adapt to working with a variety of clients and team members each presenting varying challenges and scope. Every experience is an opportunity to learn and grow. You are expected to take ownership and consistently deliver quality work that drives value for our clients and success as a team. As you navigate through the Firm you build a brand for yourself opening doors to more opportunities.

Examples of the skills knowledge and experiences you need to lead and deliver value at this level include but are not limited to:

  • Apply a learning mindset and take ownership for your own development.
  • Appreciate diverse perspectives needs and feelings of others.
  • Adopt habits to sustain high performance and develop your potential.
  • Actively listen ask questions to check understanding and clearly express ideas.
  • Seek reflect act on and give feedback.
  • Gather information from a range of sources to analyse facts and discern patterns.
  • Commit to understanding how the business works and building commercial awareness.
  • Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance) uphold the Firms code of conduct and independence requirements.

A career in our Cyber Managed Services will provide you the opportunity to solve our clients most critical business and data protection related challenges. You will be part of a growing team driving strategic programs data analytics innovation deals cyber resiliency response and technical implementation activities. You will have access to not only the top Cybersecurity Privacy and Forensics professionals at PwC but to our clients and industry analysts across the globe.

A career in our Advisory Acceleration Center is the natural extension of PwCs leading class global delivery capabilities. We provide premium cost effective high quality services that support process quality and delivery capability in support for client engagements. Our Acceleration Center team extends our leading Cybersecurity Privacy & Forensics capabilities.

As a Cyber Ops Associate youll work as part of a team of problem solvers helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to:

  • Share and collaborate effectively with others creating a positive team spirit.

  • Identify and make suggestions for improvements when problems and/or opportunities arise.

  • Validate data and analysis for accuracy and relevance.

  • Follow risk management and compliance procedures.

  • Keep up-to-date with developments in my area of specialty

  • Communicate confidently in a clear concise and articulate manner - verbally and in written form.

  • Seek opportunities to learn about the wider economy alongside the business models/corporate governance and/or regulatory environment of our clients

  • Uphold the firms code of ethics and business conduct

Basic Qualifications:

Minimum Degree Required: Bachelors Degree

Minimum Years of Experience: 3-5 Years

Certification(s) Preferred: CEH SecurityCHFICTIA or Any SANS certification.

Preferred Knowledge/Skills:

Demonstrates knowledge leadership and/or a proven record of success in the following areas:

  • Networking and applying Network Principles (including the OSI Model TCP/IP DNS HTTP SMTP) System Administration and Security Architecture

  • Applying Incident Response Frameworks and Handling Procedures

  • Fluency with the cyber attack lifecycle and/or the tactics techniques and procedures of threat actors

  • Information security compliance assurance and/or other security best practices and principles

  • Possessing and fostering an inquisitive mindset amongst team members

SOC L1 Analyst Responsibilities:

Monitoring: Continuously monitor security alerts and events generated by various security tools such as SIEM (Security Information and Event Management) systemsEndpoint Detection and Response (EDR)intrusion detection systems SOAR UEBAEmail GatewayProxy and firewalls.

Incident Detection and Analysis: Analyze security events and incidents to identify potential security breaches or threats. This involves investigating alerts analyzing network traffic user/host anomalyPhishing and conducting initial triage to determine the severity and impact of the incident.

Incident Response: Respond to security incidents by following established proceduresprotocols and SLAs. This may involve escalating incidents to higher-level analysts or incident response teams coordinating with Endusers/Stakeholders and IT teams and documenting incident details as per the standard templates.

Threat Intelligence: Stay updated on the latest security threats vulnerabilities and Zero-Day attacks. Leverage threat intelligence sources to identify potential indicators of compromise/Indicators of Attack and proactively detect emerging threats and also notifying about these threats to Leadership and Client teams.

Threat Hunting: To detect and mitigate potential threats that may bypass traditional security measures. You will utilize various tools and techniques to identify indicators of compromise (IOCs) and potential attack vectors. By continuously monitoring threat intelligence feeds and analyzing security bulletins you will stay updated on the latest attack techniques and vulnerabilities. Collaborating with other security teams you will investigate incidents develop hunting techniques document findings and provide reports to management.

Documentation and Reporting: Maintain accurate and detailed records of security incidents including incident timelines actions taken and outcomes. Prepare incident reports and contribute to post-incident reviews and lessons learned sessions also working on Client weeklyMonthly and quarterly reports.

Collaboration: Collaborate with other analysts of the SOC team as well as with Leadership teams to share knowledge insights and best practices. Work closely with Client incident response teams to ensure effective incident resolution and mitigation.

Continuous Improvement: Contribute to the improvement of security monitoring and incident response processes by identifying areas for SOP/Procedure enhancement proposing solutions Automations and Alert tunings.

Compliance: Ensure compliance with relevant security standards regulations and policies such as PCI DSS HIPAA or GDPR.

Tools Knowledge: SplunkSentinelMS Defender EDR CrowdStrike Cortex XDRPalo alto XSOAR Phantom0365ProofPointDLP

Education (if blank degree and/or field of study not specified)

Degrees/Field of Study required:

Degrees/Field of Study preferred:

Certifications (if blank certifications not specified)

Required Skills

Optional Skills

Accepting Feedback Accepting Feedback Active Listening Communication Cybersecurity Framework Cybersecurity Governance Cybersecurity Risk Management Cybersecurity Strategy Cyber Security Threat Mitigation Cyber Threat Intelligence Digital Forensics Emotional Regulation Empathy Firewall (Network Security) Forensic Investigation Incident Management Incident Remediation Incident Response Plan Inclusion Intellectual Curiosity Log Analysis Mitigation Measures Network Forensics Network Infrastructure Network Security Platforms 10 more

Desired Languages (If blank desired languages not specified)

Travel Requirements

Not Specified

Available for Work Visa Sponsorship

No

Government Clearance Required

No

Job Posting End Date


Required Experience:

IC

Employment Type

Full-Time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.