Epicareer Might not Working Properly
Learn More

Cybersecurity Senior Associate (Red Team)

Salary undisclosed

Checking job availability...

Original
Simplified

Overall Scope of Work:

A career in our Cybersecurity will provide you the opportunity to solve our clients most critical business and data protection related challenges. You will be part of a growing team driving strategic programs, data analytics, innovation, cyber resilency, response, and technical implementation activities.

To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be an authentic and inclusive leader, at all grades/levels and in all lines of service. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future.

As a Senior Associate, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to:

  • Invite and provide evidence-based feedback in a timely and constructive manner.
  • Share and collaborate effectively with others.
  • Work with existing processes/systems whilst making constructive suggestions for improvements.
  • Validate data and analysis for accuracy and relevance.
  • Follow risk management and compliance procedures.
  • Keep up-to-date with technical developments for the business area.
  • Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
  • Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
  • Uphold the firm's code of ethics and business conduct
  • Perform technical security assessments such as penetration testing, source code review , security system configuration on various cyber assets including web, mobile, wireless, network and Internet of Things devices
  • Deliver client engagements effectively and efficiently as team member as well as team lead role.
  • Articulate and present security vulnerabilities fluently in both written and verbal forms to clients’ stakeholders

Basic Qualifications:

  • Minimum Degree Required: Bachelor Degree
  • Minimum Years of Experience: Two (2) year(s) experience on penetration testing, whether network infrastructure or application penetration testing

Preferred Qualifications:

  • Preferred Fields of Study: Information/ Cyber Security, Computer and Information Science, Information Technology
  • Certification(s) Preferred: PenTest+, Security+, Network+, Certified Ethical Hacker (C|EH), eLearnsecurity Junior Penetration Tester (eJPT), Offensive Security Certified Professional (OSCP), CREST certifications

Required Skill Set:

  • Being well-versed in performing penetration tests, secure design and/or code reviews
  • Being skilful in using and interpreting results from common security tools including but not limited to NMap, Nessus, Burp Suite, Drozer, MobSF, QARK, SQLMap, SSLyze and other tools in PenToo or Kali Linux distro.
  • Familiarity with industry standard classification schemes such as CVE, CVSS, CWE, CAPEC
  • Experience with basic to intermediate working knowledge of Unix, Linux, Windows, network devices, firewalls, web and/or mobile application developments
  • Be able to conduct and simulate manual penetration tests
  • Willing to develop tools or scripts as necessary so as to create proof-of-concept in challenging engagements
  • Possess strong analytical mind in analysing, and verifying findings from security tools
  • Possess relentless self-motivation and passion to explore new technologies, learn new penetration testing techniques and tools, circumvent security controls imposed in hardened applications
  • Possess good interpersonal communication skills and helping mind in team-oriented environment

Preferred Knowledge/Skills:

Demonstrates some knowledge and/or proven record of success in the following:

  • Understanding Networking and applying Network Principles (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture;
  • Applying ISO 27k Frameworks, NIST 800-53, OWASP and Penetration Testing Execution Standards; and,
  • Applying vulnerability management and penetration testing of systems, networks and other devices

Demonstrates some level of ability and/or proven record of success with:

  • Working in a shift environment in the assigned shifts, with holidays aligned with client schedules;
  • Leading daily huddles, shift handovers, preparing reports or providing inputs for reports as assigned;
  • Preparing materials (reports, presentations, spreadsheets, etc.) to help enable informed decision making;
  • Acquiring and utilizing knowledge on new technologies and solutions, emerging threats and vulnerabilities;
  • Running and analyzing a vulnerability scan as per the client schedules;
  • Communicating information regarding the security threat landscape to leadership and clients; and,
  • Identifying security threats, exploits, and attack vectors

Overall Scope of Work:

A career in our Cybersecurity will provide you the opportunity to solve our clients most critical business and data protection related challenges. You will be part of a growing team driving strategic programs, data analytics, innovation, cyber resilency, response, and technical implementation activities.

To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be an authentic and inclusive leader, at all grades/levels and in all lines of service. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future.

As a Senior Associate, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to:

  • Invite and provide evidence-based feedback in a timely and constructive manner.
  • Share and collaborate effectively with others.
  • Work with existing processes/systems whilst making constructive suggestions for improvements.
  • Validate data and analysis for accuracy and relevance.
  • Follow risk management and compliance procedures.
  • Keep up-to-date with technical developments for the business area.
  • Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
  • Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
  • Uphold the firm's code of ethics and business conduct
  • Perform technical security assessments such as penetration testing, source code review , security system configuration on various cyber assets including web, mobile, wireless, network and Internet of Things devices
  • Deliver client engagements effectively and efficiently as team member as well as team lead role.
  • Articulate and present security vulnerabilities fluently in both written and verbal forms to clients’ stakeholders

Basic Qualifications:

  • Minimum Degree Required: Bachelor Degree
  • Minimum Years of Experience: Two (2) year(s) experience on penetration testing, whether network infrastructure or application penetration testing

Preferred Qualifications:

  • Preferred Fields of Study: Information/ Cyber Security, Computer and Information Science, Information Technology
  • Certification(s) Preferred: PenTest+, Security+, Network+, Certified Ethical Hacker (C|EH), eLearnsecurity Junior Penetration Tester (eJPT), Offensive Security Certified Professional (OSCP), CREST certifications

Required Skill Set:

  • Being well-versed in performing penetration tests, secure design and/or code reviews
  • Being skilful in using and interpreting results from common security tools including but not limited to NMap, Nessus, Burp Suite, Drozer, MobSF, QARK, SQLMap, SSLyze and other tools in PenToo or Kali Linux distro.
  • Familiarity with industry standard classification schemes such as CVE, CVSS, CWE, CAPEC
  • Experience with basic to intermediate working knowledge of Unix, Linux, Windows, network devices, firewalls, web and/or mobile application developments
  • Be able to conduct and simulate manual penetration tests
  • Willing to develop tools or scripts as necessary so as to create proof-of-concept in challenging engagements
  • Possess strong analytical mind in analysing, and verifying findings from security tools
  • Possess relentless self-motivation and passion to explore new technologies, learn new penetration testing techniques and tools, circumvent security controls imposed in hardened applications
  • Possess good interpersonal communication skills and helping mind in team-oriented environment

Preferred Knowledge/Skills:

Demonstrates some knowledge and/or proven record of success in the following:

  • Understanding Networking and applying Network Principles (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture;
  • Applying ISO 27k Frameworks, NIST 800-53, OWASP and Penetration Testing Execution Standards; and,
  • Applying vulnerability management and penetration testing of systems, networks and other devices

Demonstrates some level of ability and/or proven record of success with:

  • Working in a shift environment in the assigned shifts, with holidays aligned with client schedules;
  • Leading daily huddles, shift handovers, preparing reports or providing inputs for reports as assigned;
  • Preparing materials (reports, presentations, spreadsheets, etc.) to help enable informed decision making;
  • Acquiring and utilizing knowledge on new technologies and solutions, emerging threats and vulnerabilities;
  • Running and analyzing a vulnerability scan as per the client schedules;
  • Communicating information regarding the security threat landscape to leadership and clients; and,
  • Identifying security threats, exploits, and attack vectors