• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » Security Analyst (Remote) – PwC

Security Analyst (Remote) – PwC

2021-04-20 by Geo

Cyber Security Job Philadelphia

Security Analyst (Remote) – PwC – Philadelphia, PA – Remote

Note: We may earn a commission from products or services when you click on a link and make a purchase.

About the job

  • Line of Service: Advisory
  • Specialty/Competency: Cybersecurity & Privacy
  • Industry/Sector: Not Applicable
  • Time Type: Full time
  • Government Clearance Required: No
  • Available for Work Sponsorship: Yes
  • Travel Requirements: Up to 20%

A career in our Cybersecurity, Privacy, & Forensics will provide you the opportunity to solve our clients most critical business and data protection related challenges. You will be part of a growing team driving strategic programs, data analytics, innovation, deals, cyber resilency, response, and technical implementation activities. You will have access to not only the top Cybersecurity, Privacy, and Forensics professionals at PwC, but at our clients and industry analysts across the globe. Our Advisory Acceleration Center is the natural extension of PwC’s leading class global delivery capabilities. We provide premium, cost effective, high quality services that support process quality and delivery capability in support for client engagements.

SEE ALSO: Cyber security analyst median salary

To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be an authentic and inclusive leader, at all grades/levels and in all lines of service. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future.

Responsibilities

PwC Professional skills and responsibilities for this management level include but are not limited to

As a Specialist, you’ll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution.

  • Consistently deliver on multiple commitments.
  • Flex approach to meet the changing needs of teams and clients.
  • Identify and make suggestions for efficiencies and improvements when performing work.
  • Take action to stay up to date with the evolution and impact of technology developments.
  • Use tools, techniques and firm standard methodologies to support research, analysis and problem solving.
  • Adapt communication style to meet the needs of the situation and audience.
  • Manage expectations of stakeholders effectively.
  • Embrace diverse perspectives and welcome opposing and conflicting ideas.
  • Uphold the firm’s code of ethics and business conduct.

Our Most Popular Cyber Security Training Courses

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native

Minimum Degree Required

Basic Qualifications: High School Diploma

Minimum Years of Experience: 1 year(s) and 1 year with Amazon Web Services (AWS)

Certification(s) Preferred

Preferred Qualifications: GSEC, SEC+, Network+, Certified Incident Handler (GCIH), Certified Intrusion Analyst (GIAC)

Preferred Knowledge/Skills

Demonstrates some abilities and/or a proven record of success with identifying and addressing client



Amazon Web Services Training On Demand

Amazon Web Services Logo
  • AWS Fundamentals: Going Cloud-Native
  • AWS Fundamentals Specialization


Needs

  • Networking and applying Network Principles (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture;
  • Incident Response Frameworks and Handling Procedures;
  • Vulnerability management and penetration testing of systems, applications, and networks; and,
  • Information security, compliance, assurance, and/or other security best practices and principles.

READ 20 Online Courses for a Successful Career in Cyber Security in 2021

Demonstrates some abilities and/or a proven record of success with:

  • Participating in daily huddles, shift handovers, preparing reports or providing inputs for reports as assigned;
  • Communicating information regarding the security threat landscape;
  • Identifying security threats, exploits, attack vectors and performing security investigations;
  • Monitoring the local threat ops channels/SIEM/AV/DLP Policy violation consoles and notifying the client/stakeholders of any suspicious/malicious activity within agreed SLA timelines;
  • Running a vulnerability scan as per the client schedules;
  • Performing initial triage of SIEM, DLP, Host (end point) security issues and escalating based on the defined processes;
  • Working with SIEMs, proxy tools, DLP, windows, UNIX and application logs;
  • Analyzing logs from Network security devices, hands on experience with SIEM technology, network security devices, identity and access management principles, DLP incident evidence gathering utilizing and applying into projects analytic skills for problem analysis and resolution;
  • Acquiring and utilizing knowledge on new technologies and solutions, emerging threats and vulnerabilities;
  • Monitoring and analyzing alerts from a wide array of security devices and systems (SIEM’s, Firewalls, IDS/IPS, Systems, Networks, Anti-virus, etc.);
  • Applying the security incident response process: identification, containment and remediation on a 24×7 basis;
  • Applying scripting language skills in Python or PowerShell; and,
  • Preparing materials (reports, presentations, spreadsheets, etc.) to help enable informed decision making.

All qualified applicants will receive consideration for employment at PwC without regard to race; creed; color; religion; national origin; sex; age; disability; sexual orientation; gender identity or expression; genetic predisposition or carrier status; veteran, marital, or citizenship status; or any other status protected by law. PwC is proud to be an affirmative action and equal opportunity employer.

For positions based in San Francisco, consideration of qualified candidates with arrest and conviction records will be in a manner consistent with the San Francisco Fair Chance Ordinance.

For positions in Colorado, visit the following link for information related to Colorado’s Equal Pay for Equal Work Act: https://pwc.to/coloradoadvisoryspecialist.

LinkedIn Apply
Apply on LinkedIn

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version