Job description

Cyber Sr. Analyst

Apply Now    
Job Category:   Cybersecurity/Privacy
Line of Service:   Advisory
State & City:   TX-San Antonio
Travel Requirements:   0-20%
Position Type:   Senior Analyst
Req ID:   101358BR
PwC/LOS Overview
PwC is a network of firms committed to delivering quality in assurance, tax and advisory services.

We help resolve complex issues for our clients and identify opportunities. Learn more about us at www.pwc.com/us.

At PwC, we develop leaders at all levels. The distinctive leadership framework we call the PwC Professional (http://pwc.to/pwcpro) provides our people with a road map to grow their skills and build their careers. Our approach to ongoing development shapes employees into leaders, no matter the role or job title.

Are you ready to build a career in a rapidly changing world? Developing as a PwC Professional means that you will be ready
- to create and capture opportunities to advance your career and fulfill your potential. To learn more, visit us at www.pwc.com/careers.

PwC Advisory helps our clients with their most challenging imperatives from strategy through execution. We combine the breadth of knowledge of over 48,000 global professionals with deep industry knowledge to deliver custom solutions for our clients. We work with the world's largest and most complex companies and understand the unique business issues and opportunities our clients face.

Job Description
PricewaterhouseCoopers is committed to a global sourcing strategy that leverages the strength of our worldwide network.

Our Advisory Global Sourcing and Delivery (GSD) model is a set of capabilities resident outside our core US practice that supports us in performing client service activities anywhere in the world, where the appropriate mix of talent and knowledge is available at the best value. Working together with our client service engagement teams, we tailor a plan that combines the best resource and pricing options for a specific piece of work, based on the client business drivers, delivery requirements, and value factors.

Our Cybersecurity and Privacy Consultants are a team of business integrators with extensive consulting and industry experience who help our clients solve their complex business issues from strategy through execution. A Cybersecurity and Privacy consulting career may provide the opportunity to grow and contribute to our clients' business issues every day, applying a collection of security spectrum capabilities, including security strategy and governance, IT risk, security technologies, and cybercrime and breach response.

Position/Program Requirements
Minimum Year(s) of Experience: 1


Minimum Degree Required: High School Diploma


Knowledge Preferred:

Demonstrates some knowledge and/or a proven record of success in the following areas:

- Communicate

information regarding the secruity threat landscape;

- Identify security threats, exploits, attack vectors and skills to perform investigation and remediation;

- Monitor the local threat ops channels/SIEM/AV/DLP Policy violation consoles and notifies the client/stakeholders of any suspicious/malicious activity within agreed SLA timelines;

- Implement standard/non-standard changes as assigned;

- Run a vulnerability scan as per the client schedules;

- Perform initial triage of SIEM, DLP, Host (end point) security issues and escalates to tier 2/3 based on the defined processes;

- Participate in daily huddles, shift handovers, prepare reports or provide inputs for reports as assigned;

- Work with Arcsight, proxy tools, DLP, windows, UNIX and application logs; and

- Utilize Security Operations Center (SOC), Security Incident Response Team (SIRT), or Computer Security Incident Response Center (CSIRC) to investigate targeted intrusions through complex global network segments.


Skills Preferred:

Demonstrates some abilities and/or a proven record of success in Security Information and Events Management including the following areas:

- Analyze logs from Network security devices, hands on experience with SIEM technology, network security devices, identity and access management principles, DLP incident evidence gathering;

- Utilize and apply into projects analytic skills for problem analysis and resolution;

- Quickly acquire and utilize knowledge on new technologies and solutions, emerging threats and vulnerabilities;

- Work in a 2nd shift environment in the assigned shifts, with holidays aligned with client schedules;

- Utilize into projects knowledge of AD (foundational level) or access management requests for IAM/PAM roles, CCNA, CompTIA + Security, MCSE or equivalent, HPOV, Wireshark , McAfee, Symantec; and

- Program/code for IAM/PAM roles: C, C++,

ITIL certification.




Apply Now    
Link for schema