PwC/LOS OverviewPwC is a network of firms committed to delivering quality in assurance, tax and advisory services.We help resolve complex issues for our clients and identify opportunities. Learn more about us at www.pwc.com/us.At PwC, we develop leaders at all levels. The distinctive leadership framework we call the PwC Professional ( provides our people with a road map to grow their skills and build their careers. Our approach to ongoing development shapes employees into leaders, no matter the role or job title.Are you ready to build a career in a rapidly changing world? Developing as a PwC Professional means that you will be ready- to create and capture opportunities to advance your career and fulfill your potential. To learn more, visit us at www.pwc.com/careers.PwC Advisory helps our clients with their most challenging imperatives from strategy through execution. We combine the breadth of knowledge of over 48,000 global professionals with deep industry knowledge to deliver custom solutions for our clients. We work with the world's largest and most complex companies and understand the unique business issues and opportunities our clients face.Job DescriptionAs we aim to rapidly grow our Cybersecurity and Privacy practice, we are looking for consultants who are passionate about how strategy and technology can improve the role of cybersecurity, privacy and data protection in our digital world.We are looking for consultants with extensive consulting, technological and industry experience who will help our clients solve their complex business issues from strategy through execution. A Cybersecurity and Privacy consulting career will provide the opportunity to grow and contribute to our clients' business issues every day, applying a collection of information and Cyber security capabilities, including security and privacy strategy and governance, IT risk, security testing, technology implementation/operations, and cybercrime and breach response.Our Strategy and Transformation services help clients understand the current cybersecurity and privacy landscape, make cybersecurity a collective priority, and develop and implement solutions across people, processes, and technologies. We provide the foundations to design, manage and operate a cybersecurity program aligned to business strategy, and increase organizational resilience in the face of an ever-changing threat landscape.Position/Program RequirementsMinimum Year(s) of Experience: 5Minimum Degree Required: Bachelor's degreeDegree Preferred: Cybersecurity, Computer Science, Computer Engineering, Information Technology, Engineering, Computer Application, Business, or relevant fieldCertification(s) Preferred: Amazon and/or Microsoft certified Solutions ArchitectKnowledge Preferred:Demonstrates thorough knowledge and/or a proven record of success designing and implementing in the following areas:-Secure Amazon and/or Azure standardized solutions as well as Identity & Access Management, Data Protection, Secure DevOps, Security Operations, and other security domains for Cloud;- Linux/Unix tools and architectures and DevOps tools and processesWeb, security, and networking protocols;- Security tools such as intrusion detection, log analysis, and network scanning;- The \"stack\" of front-end web user interfaces and web servers through to back-end processing and storage;- Software development experience in a combination of any of the following languages: C++, Java, C#, Python or Ruby;- Enterprise Cloud solutions across IaaS, PaaS & SaaS. This may include: AWS, Azure, OpenStack, Cloud Foundry, Salesforce, Microsoft Office 365, Box etc.; and,- Enterprise security and Cloud security specific solutions such as: IAM/IdaaS, CASB, Identity Governance, Cloud SOC/SIEM, Key Management & Encryption, Public, Private and Hybrid cloud solutionsSkills Preferred:Demonstrates a thorough level of abilities with, and/or a proven record of success as both an individual contributor and team member, identifying and addressing client needs in the following areas:- Working on complex systems, being customer-centric, and delivering results while solving security challenges in innovative ways;- Bringing high level energy, sense of urgency, decisiveness, and ability to work well under pressure; and,- Focusing on C-Level client relationship building and relationship management.
Associated topics: forensic, identity access management, iam, information security, information technology security, malicious, security, security officer, violation, vulnerability