Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailNot Disclosed
Salary Not Disclosed
1 Vacancy
Line of Service
AdvisoryIndustry/Sector
Not ApplicableSpecialism
OperationsManagement Level
Senior AssociateJob Description & Summary
At PwC our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities develop secure systems and provide proactive solutions to safeguard sensitive data.Why PWC
At PwC you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes forour clients and communities. This purpose-led and values-driven work powered by technology in an environment that drives innovation will enable you to make a tangible impact in the real world. We reward your contributions support your wellbeing and offer inclusive benefits flexibility programmes and mentorship that will help you thrive in work and life. Together we grow learn care collaborate and create a future of infinite experiences foreach other. Learn more about us.
At PwC we believe in providing equal employment opportunities without any discrimination on the grounds of gender ethnic background age disability marital status sexual orientation pregnancy gender identity or expression religion or other beliefs perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firms growth. To enable this we have zero tolerance for any discrimination and harassment based on the above considerations.
Responsibilities:
Configuring and managing monitoring tools deployed in SOC such as SIEM UBA NBA DAM DRA PCAP VA SOAR TIP IMT (Incident Management Tool) and underlying SOC IT infrastructure to ensure their effectiveness. The broad outline of the activities involved for the contract period: - Optimized deployment architecture & implementation Configuration maintenance Asset list management for SOC perspective Data & log source management Performance & Health Monitoring License optimization & capacity planning Tool Administration user & role management Reporting of SOC Audit and Compliance Managing DR BCP Drill Upkeeping the availability of the SOC tools Version management of the deployed tools. Cyber Drills & Simulations
Mandatory skill sets:
Mandatory (Any-one): - Certified SOC Analyst (EC-Council) Computer Hacking Forensic Investigator (EC-Council) Certified Ethical Hacker (EC-Council) CompTIA Security CompTIA CySA (Cybersecurity Analyst) GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc.
Preferred skill sets:
L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting.
Years of experience required:
4 years
Education qualification:
I. B.E / B. Tech in: a) Cyber Security Computer Science/Computer Science & Engineering b) Information Technology/ Software Engineering/ c) Electronics & Communications Engineering d) Or equivalent degree in relevant discipline II. MCA or BCA or / in: a)
Education (if blank degree and/or field of study not specified)
Degrees/Field of Study required: Bachelor of Technology Master Degree Bachelor of EngineeringDegrees/Field of Study preferred:Certifications (if blank certifications not specified)
Required Skills
Cyber Operations Imperva SecureSphereOptional Skills
Accepting Feedback Accepting Feedback Active Listening Analytical Thinking Cloud Security Communication Conducting Research Creativity Cyber Defense Cyber Threat Intelligence Embracing Change Emotional Regulation Empathy Encryption Inclusion Information Security Intellectual Curiosity Intelligence Analysis Intelligence Report Intrusion Detection Intrusion Detection System (IDS) IT Operations Learning Agility Malware Analysis Malware Detection Tools 16 moreDesired Languages (If blank desired languages not specified)
Travel Requirements
Not SpecifiedAvailable for Work Visa Sponsorship
NoGovernment Clearance Required
NoJob Posting End Date
Required Experience:
Senior IC
Full-Time