Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Line of Service
AdvisoryIndustry/Sector
Not ApplicableSpecialism
MicrosoftManagement Level
Senior AssociateJob Description & Summary
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.*Why PWC
At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes forour clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences foreach other. Learn more about us.
At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. "
Responsibilities:
The candidate must have demonstrated the following through abilities
● Administrate and Implement API integration for establishing connectivity to MDCA with Microsoft and other third-party tools.
● Evaluate the discovered apps and assess the organization security and compliance posture, optimize the SaaS Security Posture Management (SSPM)
● Configuration of API’s and get visibility and control of the connected apps
● Should have knowledge on MDCA core features of the technology, threat protection, Cloud Discovery (Shadow IT) and App Governance, visibility into cloud application usage, data protection.
● Strong understanding of use cases like blocking, allowing an application
● Deep understanding of how to configure and manage a CASB platform, creating app discovery policies, discover and manage Shadow IT
● Utilize Information Technology Infrastructure Library (ITIL)-based processes used to support security solutions: Incident Management, Requests Fulfillment, Change Management, Problem Management etc.
Preferred Qualifications:
The candidate preferably should have demonstrated the following through abilities
● Experience with MDCA policy configuration and Onboarding
● Knowledge on CASB tools like MDCA, SkyHigh Security, Proofpoint CASB
● Basic Knowledge of Cloud platforms (like Azure, GCP, AWS) Information protection. Preferably for AIP (Azure Information protection) and Cloud Concepts such as cloud models (IaaS, PaaS, SaaS) and how applications work.
● Data classification, sensitivity labeling, policy enforcement, access controls, encryption, rights management, understanding of Microsoft 365 services.
Mandatory skill sets:
Azure Information Protection (AIP), CASB solutions like MDCA,
Preferred skill sets:
SkyHigh, Shadow IT, Encryption key and Management,
Years of experience required:
3-7 Years
Education qualification:
B.Tech/B.E
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required: Bachelor of EngineeringDegrees/Field of Study preferred:Certifications (if blank, certifications not specified)
Required Skills
Fabric ManagementOptional Skills
Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Learning Agility, Malware Analysis, Malware Detection Tools {+ 16 more}Desired Languages (If blank, desired languages not specified)
Travel Requirements
Available for Work Visa Sponsorship?
Government Clearance Required?
Job Posting End Date