Home > San Antonio jobs > San Antonio trades & labor jobs

Posted: Sunday, January 7, 2018 7:36 PM

PricewaterhouseCoopers is committed to a global sourcing strategy that leverages the strength of our worldwide network. Our Advisory Global Sourcing and Delivery (GSD) model is a set of capabilities resident outside our core US practice that supports us in performing client service activities anywhere in the world, where the appropriate mix of talent and knowledge is available at the best value. Working together with our client service engagement teams, we tailor a plan that combines the best resource and pricing options for a specific piece of work, based on the client business drivers, delivery requirements, and value factors.

Our Cybersecurity and Privacy Consultants are a team of business integrators with extensive consulting and industry experience who help our clients solve their complex business issues from strategy through execution. A Cybersecurity and Privacy consulting career may provide the opportunity to grow and contribute to our clients' business issues every day, applying a collection of security spectrum capabilities, including security strategy and governance, IT risk, security technologies, and cybercrime and breach response.

As we aim to rapidly grow our Cybersecurity and Privacy practice, we are looking for consultants who are passionate about how strategy and technology can improve the role of cybersecurity, privacy and data protection in our digital world. We are looking for consultants with extensive consulting, technological and industry experience who will help our clients solve their complex business issues from strategy through execution. A Cybersecurity and Privacy consulting career will provide the opportunity to grow and contribute to our clients' business issues every day, applying a collection of information and Cyber security capabilities, including security and privacy strategy and governance, IT risk, security testing, technology implementation/operations, and cybercrime and breach response.

Our Strategy and services help clients understand the current cybersecurity and privacy landscape, make cybersecurity a collective priority, and develop and implement solutions across people, processes, and technologies. We provide the foundations to design, manage and operate a cybersecurity program aligned to business strategy, and increase organizational resilience in the face of an ever-changing threat landscape. Position/Program Requirements Minimum Year(s) of Experience: 0 0-1 year experience.

Minimum Degree Required: High School Diploma

Certification(s) Preferred: ITIL certification.

Knowledge Preferred:

Demonstrates thorough knowledge and proven success in the following areas:

* Communicate information regarding the information secruity threat landscape;

* Identify security threats, exploits, attack vectors and skills to perform investigation and remediation;

* Monitor the local threat ops channels/SIEM/AV/DLP Policy violation consoles and notifies the client/stakeholders of any suspicious/malicious activity within agreed SLA timelines;

* Implement standard/non-standard changes as assigned;

* Run a vulnerability scan as per the client schedules;

* Perform initial triage of SIEM, DLP, Host (end point) security issues and escalates to tier 2/3 based on the defined processes;

* Participate in daily huddles, shift handovers, prepare reports or provide inputs for reports as assigned;

* Work with Arcsight, proxy tools, DLP, windows, UNIX and application logs; and

* In a network security environment, such as a Security Operations Center (SOC), Security Incident Response Team (SIRT), or Computer Security Incident Response Center (CSIRC), investigate targeted intrusions through complex global network segments.

Skills Preferred:

Demonstrates some abilities, proven industry experience and success with Security Information and Events Management, analysis of logs from Network security devices, hands on experience with a SIEM technology, network security devices, strong foundation of identity and access management principles, DLP incident evidence gathering or any of the applicable services mentioned above, including the following areas:

* Analytic ability for problem analysis and resolution;

* Quickly acquire and utilize knowledge on new technologies and solutions, emerging threats and vulnerabilities;

* Willingness to work in 2nd shift environment in the assigned shifts, with holidays aligned to client schedules;

* Work with AD (foundational level) or access management requests for IAM/PAM roles;

* Security/process certifications/skills in one or more of the following areas (relevant to the service line): CCNA, CompTIA + Security, MCSE or equivalent, HPOV, Wireshark , McAfee, Symantec; and

* Programming/coding for IAM/PAM roles: C, C++. Line of Service Advisory Industry Financial Services State & City TX-San Antonio Travel Requirements 0-20% Position Type Full Time Auto req ID 101310BR Categories Cybersecurity/Privacy


Associated topics: iam, idm, information security, information technology security, malicious, phish, security, security analyst, security officer, vulnerability


• Location: San Antonio

• Post ID: 34860497 sanantonio is an interactive computer service that enables access by multiple users and should not be treated as the publisher or speaker of any information provided by another information content provider. © 2018