Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Line of Service
AdvisoryIndustry/Sector
Not ApplicableSpecialism
Cybersecurity & PrivacyManagement Level
AssociateJob Description & Summary
A career in our Cybersecurity, Privacy and Forensics will provide you the opportunity to solve our clients most critical business and data protection related challenges. You will be part of a growing team driving strategic programs, data analytics, innovation, deals, cyber resilency, response, and technical implementation activities. You will have access to not only the top Cybersecurity, Privacy and Forensics professionals at PwC, but at our clients and industry analysts across the globe.To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be an authentic and inclusive leader, at all grades/levels and in all lines of service. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future.
As an Associate, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to:
Cyber Threat & Device Monitoring Analyst (Tier 1) As an Associate, you’ll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. Responsibilities include but are not limited to:
Roles & Responsibilities:
● A 24x7 shift based schedule to continuously monitors the alert queue
● Triage security and device alerts
● Receives phone calls from clients and create necessary ticket for the incident or request and channel it to the required team for action
● Collects data and context necessary to initiate investigation over to level 2 security analysts
● Follows alerts and incidents playbooks/runbooks
● Responsible for maintaining access to all security tools required for security investigation
● Primarily responsible for security monitoring, detection, response and client care
● Ensure incident identification, assessment, reporting, communication, mitigation and monitoring
● Ensure compliance to SLA, process adherence and process improvements to achieve operational objectives
● Revise and develop processes to strengthen the current Security Operations Framework, review policies and highlight the challenges in managing SLAs
● Coordination with stakeholders, build and maintain positive working relationships with them
Experience & Skills:
● Proficient in Incident Management and Response
● Experience in security device management and multiple SIEM platforms
● In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management, etc.
● Experience in MSSP environment
● Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix
● Knowledge of applications, databases, middleware to address security threats
● Proficient in preparation of reports, dashboards and documentation
● Excellent communication and leadership skills
● Experience in performing vendor management
● Ability to handle high pressure situations with key stakeholders
● Good Analytical skills, Problem solving and Interpersonal skills
● CISSP and GIAC certifications preferred
● A demonstrated commitment to valuing differences and working alongside diverse people and perspectives
Qualifications:
● A Bachelor's Degree is a relevant area of study with a preference for Computer Science or Computer Engineering
● Minimum of 2 years in Information Technology
● Minimum of 2 years in Information Security
● A Bachelor's Degree is a relevant area of study with a preference for Computer Science or Computer Engineering
● Minimum of 2 years in Information Technology
● Minimum of 2 years in Information Security
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required:Degrees/Field of Study preferred:Certifications (if blank, certifications not specified)
Required Skills
Optional Skills
Accepting Feedback, Accepting Feedback, Active Listening, Cloud Security, Communication, Conducting Research, Cyber Defense, Cyber Threat Intelligence, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Malware Analysis, Malware Detection Tools, Malware Intelligence Gathering, Malware Research, Malware Reverse Engineering, Malware Sandboxing {+ 11 more}Desired Languages (If blank, desired languages not specified)
Travel Requirements
0%Available for Work Visa Sponsorship?
NoGovernment Clearance Required?
NoJob Posting End Date
No results found for your search.