IN Senior Associate Platform management Strategy and Governance Advisory Mumbai
Airoli, India
Line of Service
AdvisoryIndustry/Sector
Not ApplicableSpecialism
OperationsManagement Level
Senior AssociateJob Description & Summary
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation's security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure.
*Why PWC
At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us.
At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. "
Responsibilities:
Configuring and managing monitoring tools deployed in SOC such as SIEM, UBA, NBA, DAM, DRA, PCAP, VA, SOAR, TIP, IMT (Incident Management Tool) and underlying SOC IT infrastructure to ensure their effectiveness. The broad outline of the activities involved for the contract period: - · Optimized deployment architecture & implementation · Configuration maintenance · Asset list management for SOC perspective · Data & log source management · Performance & Health Monitoring · License optimization & capacity planning · Tool Administration, user & role management · Reporting of SOC Audit and Compliance · Managing DR BCP Drill · Upkeeping the availability of the SOC tools · Version management of the deployed tools. · Cyber Drills & Simulations
Mandatory skill sets:
Mandatory (Any-one): - Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc.
Preferred skill sets:
L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting.
Years of experience required:
4+
Education qualification:
I. B.E / B. Tech in: a) Cyber Security Computer Science/Computer Science & Engineering b) Information Technology/ Software Engineering/ c) Electronics & Communications Engineering d) Or equivalent degree in relevant discipline II. MCA or BCA or M.Tech / M.Sc/ B.Sc in: a)
Computer Science b) Information Technology c) Electronic & Communications Engineering Shift Availability :On-Site-16X7
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required: Bachelor of EngineeringDegrees/Field of Study preferred:Certifications (if blank, certifications not specified)
Required Skills
Platform ManagementOptional Skills
Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Learning Agility, Malware Analysis, Malware Detection Tools {+ 16 more}Desired Languages (If blank, desired languages not specified)
Travel Requirements
Available for Work Visa Sponsorship?
Government Clearance Required?
Job Posting End Date
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation C CHFI Clearance Clearance Required Cloud Compliance CompTIA Computer Science Cyber defense Encryption GCIH GIAC Governance IDS Incident response Intrusion detection IT infrastructure Malware Monitoring PCAP SIEM SOAR SOC Strategy Threat detection Threat intelligence Vulnerabilities Vulnerability management
Perks/benefits: Career development Health care
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.