Internal Firm Services
Industry/Sector
Management Level
Senior Manager
& Summary
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.
Those in security architecture at PwC will focus on designing and implementing robust security frameworks to protect organisations from cyber threats. You will develop strategies and solutions to safeguard sensitive data and enable the integrity of systems and networks.
Why PWC
At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purposeled and valuesdriven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us .
& Summary
A career in Information Technology, within Internal Firm Services, will provide you with the opportunity to support our core business functions by deploying applications that enable our people to work more efficiently and deliver the highest levels of service to our clients. You ll focus on managing the design and implementation of technology infrastructure within PwC, developing and enhancing both client and internal facing applications within PwC, and providing technology tools that help create a competitive advantage for the Firm to drive strategic business growth.
- Demonstrates intimate knowledge and/or a proven record of success in the following areas
- Engaging business and technology (Work with stakeholders at all levels to gather long term goals & requirements.
- Mapping long term business requirements to complex security architecture frameworks.
- Designing and building security techn010U solutions aligned to a global central service environment.
- Utilizing and applying security technology at an enterprise and solution level.
- Transitioning technology from a local focus to a central technology service organization.
- Working in a complex, matrix organization; and,
- Working with multiple stakeholders across functional and technical skillsets.
- Demonstrates intimate abilities and/or a proven record of success in the following areas
- Understands the functions applied in the support of and integration with key business and strategic priorities.
- Contributes new intellectual capital through deep expertise in a subject matter area and/or technical domain within this function.
- Translate pillar strategy by leading and/or managing others and performing work with significant independence.
- Influences both internally and externally through building and leading a large team Or complex project, Or multiple teams Or projects, within the subpillar team;
- Builds and maintain complex programs while supervise teams to execute against overall strategy; and,
- Performs Security Engineering tasks with autonomy
Mandatory skill sets
- Perform security Engineering tasks with autonomy.
- Skilled in at least one of the following languages
- Python 3
- Go language
- Java / Javascript
- Powershell / Bash scripting
- Familiarity with the following technologies and principles CSPM / CNAPP
Preferred skill sets
- Azure, AWS, GCP at least one platform should be a strength TCP/IP networking and associated controls such as
- WAF / DNS / Firewalls in general
Years of experience required
6+ Years
Education qualification
Any UG/PG in IT field
Education
Degrees/Field of Study required Bachelor Degree, Master Degree
Degrees/Field of Study preferred
Required Skills
Cloud Security
Accepting Feedback, Accepting Feedback, Active Listening, Amazon Web Services (AWS), Analytical Thinking, Azure Data Factory, Coaching and Feedback, Communication, Compliance, Safety, Accountability (CSA), Computer Network Defense, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Requirements, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Forensic Investigation, Incident Response Tool, Inclusion, Influence, Intellectual Curiosity, Java (Programming Language), Learning Agility {+ 22 more}
Travel Requirements
0%
No