Line of Service
Advisory
Industry/Sector
FS X-Sector
Specialism
Risk
Management Level
Associate
Job Description & Summary
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.
In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation’s security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure.
Why PWC
At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us.
At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations.
Job Description & Summary
A career within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. We play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats.
We are looking for an experienced cybersecurity professional with a comprehensive understanding of various security domains, including application security, network segregation, access controls, IDS/IPS devices, physical security, and information security risk management. The ideal candidate will possess expertise in security testing tools, networking protocols, operating systems, common programming and scripting languages, and cybersecurity frameworks. This role requires hands-on experience in performing penetration testing, executing stealthy red team engagements, and managing security operations and SIEM tools. The candidate should be adept at identifying critical vulnerabilities, compromising Active Directory environments, and conducting social engineering/phishing activities. Strong communication skills, the ability to manage junior staff, and proficiency in documenting and presenting findings are essential.
Responsibilities:
Mandatory skill sets:
Preferred skill sets:
Years of experience required:
2+ years
Education qualification:
B.Tech
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required: Bachelor of Technology
Degrees/Field of Study preferred:
Certifications (if blank, certifications not specified)
Required Skills
VAT Accounting
Optional Skills
Accepting Feedback, Accepting Feedback, Active Listening, Cloud Security, Communication, Conducting Research, Cyber Defense, Cyber Threat Intelligence, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Malware Analysis, Malware Detection Tools, Malware Intelligence Gathering, Malware Research, Malware Reverse Engineering, Malware Sandboxing {+ 11 more}
Desired Languages (If blank, desired languages not specified)
Travel Requirements
Available for Work Visa Sponsorship?
Government Clearance Required?
Job Posting End Date
June 1, 2026
Full job description Additional Information Job Number26053464 Job CategoryInformation Technology LocationJaisalmer Marriott Resort & Spa, Jaisalmer-Sam-Dhanana Road, Police Line, Jaisalmer,...
Apply For This JobCompany Description Gabion Technologies India Limited (GTI) specializes in providing solutions for Geo-Technical Engineering challenges in sectors like roads, railways,...
Apply For This JobRole Overview: Support the delivery of daily F&B, housekeeping, events, pantry, and soft services at The Client at Pune, maintaining...
Apply For This JobJob Purpose The role holder is expected lead the Business Technology group in partnering BSLI functions to leverage the latest...
Apply For This JobWe use cookies to offer you the best possible website experience. Your cookie preferences will be stored in your browser’s...
Apply For This JobFull job description Job Summary : IT Software & Hardware Manager oversees a company’s entire technology stack, ensuring all devices...
Apply For This Job
