Line of Service
Advisory
Industry/Sector
FS X-Sector
Specialism
Risk
Management Level
Associate
Job Description & Summary
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.
In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation’s security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure.
Why PWC
At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us.
At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations.
Job Description & Summary
A career within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. We play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats.
We are looking for an experienced cybersecurity professional with a comprehensive understanding of various security domains, including application security, network segregation, access controls, IDS/IPS devices, physical security, and information security risk management. The ideal candidate will possess expertise in security testing tools, networking protocols, operating systems, common programming and scripting languages, and cybersecurity frameworks. This role requires hands-on experience in performing penetration testing, executing stealthy red team engagements, and managing security operations and SIEM tools. The candidate should be adept at identifying critical vulnerabilities, compromising Active Directory environments, and conducting social engineering/phishing activities. Strong communication skills, the ability to manage junior staff, and proficiency in documenting and presenting findings are essential.
Responsibilities:
Mandatory skill sets:
Preferred skill sets:
Years of experience required:
2+ years
Education qualification:
B.Tech
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required: Bachelor of Technology
Degrees/Field of Study preferred:
Certifications (if blank, certifications not specified)
Required Skills
VAT Accounting
Optional Skills
Accepting Feedback, Accepting Feedback, Active Listening, Cloud Security, Communication, Conducting Research, Cyber Defense, Cyber Threat Intelligence, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Malware Analysis, Malware Detection Tools, Malware Intelligence Gathering, Malware Research, Malware Reverse Engineering, Malware Sandboxing {+ 11 more}
Desired Languages (If blank, desired languages not specified)
Travel Requirements
Available for Work Visa Sponsorship?
Government Clearance Required?
Job Posting End Date
June 1, 2026
At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse...
Apply For This JobKey Responsibilities Manage and optimize product listings on our e-commerce platform Conduct market analysis and research to identify trends and...
Apply For This JobRequisition Id: 1706808 As a global leader in assurance, tax, transaction and advisory services, we hire and develop the most...
Apply For This JobJob Description: Key Responsibilities Category Management Manage and own merchandising for 2–3 assigned categories across B2B stores. Plan product assortment,...
Apply For This JobPosition Description Company Profile: At CGI, we’re a team of builders. We call our employees members because all who join...
Apply For This JobKey Responsibilities Develop content and social media strategies for the brand Incorporate brand storytelling into different media channels Assist with...
Apply For This Job
