Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailLine of Service
AssuranceIndustry/Sector
TMT X-SectorSpecialism
Cybersecurity & PrivacyManagement Level
AssociateJob Description & Summary
At PwC we help clients build trust and reinvent so they can turn complexity into competitive advantage. Were a tech-forward people-empowered network with more than 370000 people in 149 countries. Across audit and assurance tax and legal deals and consulting we help clients build accelerate and sustain momentum. Find out more at .As an Associate youll be exposed to a diverse scope of work namely:
Penetration Testing youll learn to identify and exploit vulnerabilities helping clients secure their assets and protect sensitive data all while gaining hands-on experience and growing professionally.
Red Teaming Simulate adversary tactics techniques and procedures to test organizational defenses focusing on achieving specific objectives conducting covert operations and maintaining long-term access to compromised systems.
Cybersecurity Assessment Assess clients security posture through the performance of host configuration review against industry benchmarks source code reviews architecture review and cybersecurity risk assessment.
Requirements
Computer Science Computer Engineering and Information Technology students from reputable local and overseas universities
Strong fundamental knowledge of information technology and cyber security
Knowledge of security testing tools (e.g. Kali Linux Covenant Metasploit nmap burp suite etc.)
Are keen to develop themselves in the profession.
Are highly motivated enthusiastic confident and creative.
Critical thinking & problem solving.
Possess strong interpersonal and communication skills.
Committed to teamwork and excellence.
Knowledge of scripting programming languages (e.g. bash python )
Penetration testing specific certification such as CEH CRT OSCP etc. is an advantage.
Participation in CTF publicly discovered information security flaws and acknowledged CVE published research or tool within offensive security domain is an advantage
Note
Please note we accept only one application per candidate. You may indicate your second preference in the same application. We recommend that you apply to your preferred position that closely aligns with your skills passions and interests.
You can indicate another role in the same application form. Duplicate entries will slow down your application with us.
Kindly upload both your resume and degree audit or transcript in PDF format all under Resume attachment upload
Kindly note only shortlisted candidates will be contacted.
Got a question Email to .
Education (if blank degree and/or field of study not specified)
Degrees/Field of Study required:Degrees/Field of Study preferred:Certifications (if blank certifications not specified)
Required Skills
Optional Skills
Accepting Feedback Accepting Feedback Active Listening Bash (Programming Language) Common Vulnerability Scoring System (CVSS) Communication Cybersecurity Emotional Regulation Empathy Encryption Ethical Hacking Firewall (Network Security) Inclusion Information Security Information Security Management System (ISMS) Information Security Risk Assessments Intellectual Curiosity Intrusion Detection System (IDS) IT Infrastructure Kali Linux Microsoft Active Directory MITRE ATT&CK Framework Network Security Assessment Network Security Penetration Testing Offensive Security 20 moreDesired Languages (If blank desired languages not specified)
Travel Requirements
Not SpecifiedAvailable for Work Visa Sponsorship
YesGovernment Clearance Required
NoJob Posting End Date
Required Experience:
IC
Full-Time