IN_Specialist 3_SOC_Managed Services_Advisory_Kolkata

PwC View all jobs

  • Kolkata, West Bengal
  • Permanent
  • Full-time
  • 9 hours ago
Line of Service AdvisoryIndustry/Sector FS X-SectorSpecialism OperationsManagement Level SpecialistJob Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively.*Why PWCAt PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more .At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. "Job Description & Summary:. We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats, drive transformation, and foster growth. As companies increasingly adopt digital business models, the generation and sharing of data among organizations, partners, and customers multiply. We play a crucial role in ensuring that our clients are protected by developing transformation strategies focused on security, efficiently integrating and managing new or existing technology systems, and enhancing their cybersecurity investments.Responsibilities:Detailed Responsibilities/DutiesResponsible for initial or secondary triage of security incidents identified by internal controls or external SOC partnersProficient in Threat Research and understands the latest malware trends, common attack TTPs, and the general threat landscapeProficient in Incident Response and automation workflows as it relates to Security OperationsDemonstrates ability to author content using a variety of query languages, as well as scripting for event enrichment and investigationDetects, identifies, and responds to cyber events, threats, security risks and vulnerabilities in line with cyber security policies and proceduresConducts threat hunting and analysis using various toolsets based on intelligence gatheredResponsible for documenting the incident life cycle, conducting handoffs’, escalation, and providing support during cyber incidentsCreate detailed Incident Reports and contribute to lessons learned in collaboration with the teamWorks with vulnerability management resources to uncover and prioritize potential risks and makes specific recommendations to reduce the threat landscape and minimize riskWorks with leadership and the engineering team to improve and expand available toolsets when warrantedare critical for the roleRequired QualificationsSkillsExperience with one or more Security Information and Event Management (SIEM) solutionsUnderstanding of common Attack methods and their SIEM signaturesExperience in security monitoring, Incident Response (IR), security tools configuration and security remediationStrong knowledge and experience in Security Event Analysis capabilityUnderstanding of network protocols (TCP/IP stack, SSL/TLS, IPSEC, SMTP/IMAP, FTP, HTTP etc.)Understanding of Operating System, Web Server, database, and Security devices (firewall/NIDS/NIPS) logs and log formatsUnderstanding of String Parsing and Regular ExpressionsStrong analytical and problem-solving skillsHigh level of personal integrity, and the ability to professionally handle confidential matters and show an appropriate level of judgment and maturityAbility to interact effectively at all levels with sensitivity to cultural diversityAbility to adapt as the external environment and organization evolvesPassionate about Cybersecurity domain and has the inclination to learn current technologies / concepts / improvementsExcellent in security incident handling, documentation, root cause analysis, troubleshooting and publishing post-Incident Reports.Strong experience with cyber security in the domains of cyber threat intelligence and analysis, security monitoring and incident responseExperience of network and system vulnerabilities, malware, networking protocols and attack methods to exploit vulnerabilitiesKnowledge of cyber security frameworks and attack methodologiesExperience working with EDRs, Proxies, and anti-virusKnowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologiesExcellent verbal and written English communication skillsExperienceMore than 4-6 years of experience in Enterprise Cybersecurity or with a reputed services/consulting firm offering Security Consulting, Implementation and Managed Security servicesMore than 4 years of technical experience in Security Operations Center (SOC) and Information Security requiredExperience with one or more Security Information and Event Management (SIEM) solutionsMandatory skill sets:ToolsEmail Security: Proofpoint, Abnormal Security, M365 DefenderSOAR: Palo Alto XSOARSIEM: SplunkFirewall: Palo AltoEDR: CrowdstrikeOther tools: Darktrace and M365 DefenderCertifications like CEH CHFI EnCE or ECIH is bare minimum.Preferred skill sets:Certifications like CEH CHFI EnCE or ECIH is bare minimum.Years of experience required:2-7 YearsEducation qualification:B.Tech/MCA/MBA with IT background/ Bachelor’s degree in Information Technology, Cybersecurity, Computer ScienceEducation (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering, Master of Business AdministrationDegrees/Field of Study preferred:Certifications (if blank, certifications not specified)Required Skills SoCsOptional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring {+ 3 more}Desired Languages (If blank, desired languages not specified)Travel Requirements Not SpecifiedAvailable for Work Visa Sponsorship? NoGovernment Clearance Required? NoJob Posting End Date March 20, 2026

PwC