Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Cyber Security jobs across the world
Copyright 2024 All Rights Reserved by YipCraft
We will contibute 1% of your purchase to remove CO2 from the atmosphere.
Line of Service
AdvisoryIndustry/Sector
Not ApplicableSpecialism
Managed ServicesManagement Level
Senior AssociateJob Description & Summary
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.Focused on relationships, you are building meaningful client connections, and learning how to manage and inspire others. Navigating increasingly complex situations, you are growing your personal brand, deepening technical expertise and awareness of your strengths. You are expected to anticipate the needs of your teams and clients, and to deliver quality. Embracing increased ambiguity, you are comfortable when the path forward isn’t clear, you ask questions, and you use these moments as opportunities to grow.
Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to:
TDR – Security Analysts (SOC Analyst):
SOC L1 Analyst Responsibilities:
Monitoring: Continuously monitor security alerts and events generated by various security tools, such as SIEM (Security Information and Event Management) systems,Endpoint Detection and Response (EDR),intrusion detection systems, SOAR, UEBA,Email Gateway,Proxy and firewalls.
Incident Detection and Analysis: Analyze security events and incidents to identify potential security breaches or threats. This involves investigating alerts, analyzing network traffic, user/host anomaly,Phishing and conducting initial triage to determine the severity and impact of the incident.
Incident Response: Respond to security incidents by following established procedures,protocols and SLAs. This may involve escalating incidents to higher-level analysts or incident response teams, coordinating with Endusers/Stakeholders and IT teams, and documenting incident details as per the standard templates.
Threat Intelligence: Stay updated on the latest security threats, vulnerabilities, and Zero-Day attacks. Leverage threat intelligence sources to identify potential indicators of compromise/Indicators of Attack and proactively detect emerging threats and also notifying about these threats to Leadership and Client teams.
Threat Hunting: To detect and mitigate potential threats that may bypass traditional security measures. You will utilize various tools and techniques to identify indicators of compromise (IOCs) and potential attack vectors. By continuously monitoring threat intelligence feeds and analyzing security bulletins, you will stay updated on the latest attack techniques and vulnerabilities. Collaborating with other security teams, you will investigate incidents, develop hunting techniques, document findings, and provide reports to management.
Documentation and Reporting: Maintain accurate and detailed records of security incidents, including incident timelines, actions taken, and outcomes. Prepare incident reports and contribute to post-incident reviews and lessons learned sessions also working on Client weekly,Monthly and quarterly reports.
Collaboration: Collaborate with other analysts of the SOC team, as well as with Leadership teams, to share knowledge, insights, and best practices. Work closely with Client incident response teams to ensure effective incident resolution and mitigation.
Continuous Improvement: Contribute to the improvement of security monitoring and incident response processes by identifying areas for SOP/Procedure enhancement, proposing solutions, Automations and Alert tunings.
Compliance: Ensure compliance with relevant security standards, regulations, and policies, such as PCI DSS, HIPAA, or GDPR.
Tools Knowledge: Splunk,Sentinel,MS Defender EDR, CrowdStrike, Cortex XDR,Palo alto XSOAR, Phantom,0365,ProofPoint,DLP
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required:Degrees/Field of Study preferred:Certifications (if blank, certifications not specified)
Required Skills
Optional Skills
Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Communication, Creativity, Cybersecurity Framework, Cybersecurity Governance, Cybersecurity Risk Management, Cybersecurity Strategy, Cyber Security Threat Mitigation, Cyber Threat Intelligence, Digital Forensics, Embracing Change, Emotional Regulation, Empathy, Firewall (Network Security), Forensic Investigation, Incident Management, Incident Remediation, Incident Response Plan, Inclusion, Intellectual Curiosity, Learning Agility, Log Analysis {+ 15 more}Desired Languages (If blank, desired languages not specified)
Travel Requirements
Not SpecifiedAvailable for Work Visa Sponsorship?
NoGovernment Clearance Required?
NoJob Posting End Date
No results found for your search.