A career in our Threat, Intelligence and Vulnerability Management practice, within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. You’ll play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats. Our team helps organisations to rapidly and effectively respond to threats against potential security incidents by helping to detect, respond to, investigate, and remediate threats across the incident management life cycle.
As an Associate, you’ll work as part of a team of problem solvers with extensive consulting and industry experience, helping our clients solve their complex business issues from strategy to execution. Specific responsibilities include but are not limited to:
Proactively assist the team in various aspects of the project
Contribute to the development of your own and team’s technical acumen
Keep up to date with local and national business and economic issues
Ensure you are adhering to compliance matters
Work on developing internal relationships and your PwC brand
Job Requirements and Preferences:
Minimum Degree Required:
Minimum Years of Experience:
4 year(s) of relevant experience in information technology, intelligence analysis, or security analysis.
Preferred Fields of Study:
Computer and Information Science, Information Technology, Computer Applications, Computer Engineering, Information CyberSecurity
.GIAC Cyber Threat Intelligence (GCTI), Certified Cyber Threat Analyst (CCTA), FOR578: Cyber Threat Intelligence, Pherson Institute, GCIH (GIAC Certified Incident Handler).
Demonstrates thorough abilities and/or a proven record of success managing and integrating teams that perform analyses related to forensic investigations, cybercrimes, and/or cyberattacks, including the following areas: - Interfacing with industry peers, government and law enforcement organizations, as appropriate to acquire and share threat intelligence information; - Tracking advanced adversarial threats actors by targeted industry or Indicators of Compromises (IOC); - Authoring threat intelligence advisories and reports based on output from various data sources; - Performing code and behavioral analysis on malware samples to derive indicators for tracking and monitoring of threat actors; - Mapping visually adversarial threat actor infrastructure with industry leading tools; - Utilizing problem solving and communication, oral and written, to articulate, explain, and deliver technical concepts and issues to non-technical business leadership, as well as research pertinent technical matters with an attention to detail, and innovating new solutions and processes; - Incorporating new technologies when warranted; - Conducting analyses and developing reports for evidence of network penetrations and data theft using Firewalls, Active Directory, Windows Operating Systems, Intrusion Detection/Prevention Systems, Proxy Servers, breach indicators, and Log Aggregation Technology; - Multitasking, performing and delivering results as both part of a team and independently; - Adapting to ever changing schedules and work assignments, including working extended hours and conduct business travel domestically and/or globally; - Traveling internationally on business assignments, as requested, possessing and/or obtaining successfully security clearance; and, - Demonstrating the willingness and motivation in taking the initiative for individual personal and professional growth and development.
Demonstrates thorough abilities and/or a proven record of success leveraging forensic technology solutions to perform and deliver cyber threat reports, which includes the following technologies: - Leveraging cyber attack technology related platforms and tools such as Network Traffic Collection and Analysis, and Computer Programming; - Scripting languages such as Perl, Python, Ruby, shell, C, C++, and/or Java; and, - Creating presentations using industry standard tools to inform all lines of business.
All qualified applicants will receive consideration for employment at PwC without regard to race; creed; color; religion; national origin; sex; age; disability; sexual orientation; gender identity or expression; genetic predisposition or carrier status; veteran, marital, or citizenship status; or any other status protected by law. PwC is proud to be an affirmative action and equal opportunity employer.
For positions based in San Francisco, consideration of qualified candidates with arrest and conviction records will be in a manner consistent with the San Francisco Fair Chance Ordinance.