Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Line of Service
AdvisoryIndustry/Sector
Not ApplicableSpecialism
Cybersecurity & PrivacyManagement Level
ManagerJob Description & Summary
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.Enhancing your leadership style, you motivate, develop and inspire others to deliver quality. You are responsible for coaching, leveraging team member’s unique strengths, and managing performance to deliver on client expectations. With your growing knowledge of how business works, you play an important role in identifying opportunities that contribute to the success of our Firm. You are expected to lead with integrity and authenticity, articulating our purpose and values in a meaningful way. You embrace technology and innovation to enhance your delivery and encourage others to do the same.
Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to:
Cybersecurity - Vulnerability Management, Manager
JD
Experince : 9-14 years
Demonstrates thorough level abilities and success with managing the identification and addressing of client needs including:
o Demonstrates experience driving the configuration of vulnerability assessment tools, including the integration of feedback from IT owners to reduce false positives;
o Demonstrates experienceperforming analysis and prioritization of identified vulnerabilities and remediation recommendations;
o Demonstrates experience preparing vulnerability data and reports for technical and executive audiences;
o Demonstrates experience identifying timelines/programs and guiding teams to address vulnerabilities, including system patching, deployment of specialized controls, code or infrastructure changes, changes in build engineering processes;
o Demonstrates experience tracking and remediation of vulnerabilities leveraging agreed upon action plans and timelines with responsible technology partners and support teams;
o Demonstrates experience designing and overseeing actionable dashboards and scorecards;
o Demonstrates experience reviewing and coordinating changes to patch policies, procedures, standards and audit work programs in a continuous improvement model;
o Demonstrates experience driving the protection of valuable information and maintaining confidentiality and integrity of data through knowledge of security management, network protocols, data, application security solutions;
o Demonstrates knowledge of industry trends, including current and emerging risks;
o Demonstrates knowledge of relevant legislation, regulatory requirements, guidelines, and industry developments related to data protection, privacy, security, and data governance;
o Demonstrates experience with end to end Vulnerability Management processes and tools including host based applications scanners, patch management, GRC tools and ITSM;
o Demonstrates knowledge of operating system and application security, administration and debugging; and,
o Demonstrates knowledge of security controls including access controls, auditing, authentication, encryption, integrity, physical security and application security.
Vulnerability Management tools, like Qualys, Tenable, Nessus.
Education
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required:Degrees/Field of Study preferred:Certifications (if blank, certifications not specified)
Required Skills
Optional Skills
Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Coaching and Feedback, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Learning Agility, Malware Analysis {+ 21 more}Desired Languages (If blank, desired languages not specified)
Travel Requirements
Not SpecifiedAvailable for Work Visa Sponsorship?
NoGovernment Clearance Required?
NoJob Posting End Date
No results found for your search.