PwC

IN_Associate_VAPT_GCC_Advisory_Bangalore

PwC  •  Republic of India (Onsite)  •  3 hours ago
Apply
AI can make mistakes so check important info. Chat history is never stored.
50
AI Success™

Job Description

Line of Service

Advisory

Industry/Sector

FS X-Sector

Specialism

Risk

Management Level

Associate

& Summary

At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.

In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation's security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure.

Why PWC

At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us

At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations.

& Summary

A career within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurityprogrammethat protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared amongorganisations,partnersand customers. We play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats.

We are looking for an experienced cybersecurity professional with a comprehensive understanding of various security domains, including application security, network segregation, access controls, IDS/IPS devices, physical security, and information security risk management. The ideal candidate willpossessexpertisein security testing tools, networking protocols, operating systems, common programming and scripting languages, and cybersecurity frameworks. This role requires hands-on experience in performing penetration testing, executing stealthy red team engagements, and managing security operations and SIEM tools. The candidate should be adept atidentifyingcritical vulnerabilities, compromising Active Directory environments, and conducting social engineering/phishing activities.Strong communicationskills, the ability to manage junior staff, andproficiencyin documenting and presenting findings are essential.

Responsibilities:

  • Network Security Analysis:  Conduct in-depth analyses of computer networks to identify vulnerabilities and gaps in security.

  • Security Tools Management:  Administer and manage a variety of security products, including firewalls, IDS/IPS, Firewall Analyzers, Azure Firewalls, NSGs, Application Gateways, and WAFs.

  • Firewall and VPN Administration:  Oversee the administration of firewalls, routers, VPNs, and other security tools to ensure robust network security.

  • Scripting and Automation: Utilizescripting languages such as Python to automate security tasks and enhance operational efficiency.

  • System and Network Management:  Work with Linux and/or Windows Operating Systems, coding languages, and network environments to support and enhance security measures.

  • Networking Knowledge Application:  Apply knowledge of networking concepts, including LAN, WAN, TCP/IP, web protocols, and network-related cyber-attacks.

  • Recon Tools Usage:  Use network assessment and reconnaissance tools likenmap, Angry IP, and Metasploit for comprehensive security assessments.

  • Penetration Testing:  Perform penetration testing activities within client environments, emphasizing manual and stealthy techniques.

  • Red Team Engagements:  Execute stealthy penetration testing, advanced red team, or adversary simulation engagements using offensive security tools and utilities.

  • Vulnerability Identification: Identifysecurity-critical vulnerabilities without relying on vulnerability scanning tools.

  • Active Directory Compromise:  Compromise Active Directory environments anddemonstratebusiness impact by accessing critical assets and information.

  • Social Engineering and Phishing:  Conduct social engineering and phishing activities, including reconnaissance, campaign development, and malicious payload creation.

  • Client Interaction: Participatein client discussions, communicate potential add-on services based on identified weaknesses, and actively engage in meetings.

  • Engagement Management:  Manage engagements with junior staff, prepare concise andaccurateproject deliverables, and balance project economics with unexpected issues.

  • Team Environment:  Create a positive environment by monitoring team workloads, meeting client expectations, and respecting team members' work-life quality.

  • Continuous Learning:  Proactively seek guidance, clarification, and feedback, and keep leadership informed of progress and issues.

Mandatory skill sets:

  • In-depth knowledge of technical concepts such as application security, network segregation, access controls, IDS/IPS devices, physical security, and information security risk management.

  • Hands-on experience with networking protocols, TCP/IP stack, systems architecture, and operating systems.

  • Ability to perform penetration testing activities using manual stealthy techniques and advanced red team engagements.

  • Capability toidentifysecurity critical vulnerabilities without using a scanning tool.

  • Experience in compromising Active Directory environments anddemonstratingbusiness impact.

  • Skills in social engineering/phishing activities, including reconnaissance, developing phishing campaigns, and creating malicious payloads.

  • Effective participation in client discussions andmeetings, andcommunicating potential add-on services based on identified weaknesses.

  • Proven record of preparing concise andaccuratedocuments and project deliverables.

  • Ability to balance project economics with unanticipated issues and create a positive work environment for the team.

Preferred skill sets:

  • Expertise insecurity testing tools likeBurpSuite,Mimikatz, Cobalt Strike,PowerSploit, Metasploit, Nessus, HP Web Inspect, and tools from Kali Linux.

  • Proficiencyin common programming and scripting languages such as Python, PowerShell, Ruby, Perl, Bash, JavaScript, or VBScript.

  • Deep understanding of well-known cybersecurity frameworks and industry-leading practices such as OWASP, NIST CSF, PCI DSS, and NY-DFS.

  • Experience with traditional security operations, event monitoring, and SIEM tools.

  • Demonstrated ability to manage engagements, mentor junior staff, and balance project economics.

  • Strong documentation skills andproficiencywith MS Office and Google Docs.

  • Ability to create a positive team environment and manage workloads effectively.

  • Proactive in seeking guidance, clarification, and feedback, and keeping leadership informed of progress and issues.

Years of experiencerequired

2+ years

Education qualification:

B.Tech

Education (if blank, degree and/or field of study not specified)

Degrees/Field of Study required: Bachelor of TechnologyDegrees/Field of Study preferred:

Certifications (if blank, certifications not specified)

Required Skills

VAT Accounting

Optional Skills

Accepting Feedback, Accepting Feedback, Active Listening, Cloud Security, Communication, Conducting Research, Cyber Defense, Cyber Threat Intelligence, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Malware Analysis, Malware Detection Tools, Malware Intelligence Gathering, Malware Research, Malware Reverse Engineering, Malware Sandboxing {+ 11 more}

Desired Languages (If blank, desired languages not specified)

Travel Requirements

Available for Work Visa Sponsorship?

Government Clearance Required?

Job Posting End Date

June 1, 2026

PwC

About PwC

At PwC, we help clients drive their companies to the leading edge. We’re a tech-forward, people-empowered network with more than 370,000 people in 149 countries. Across audit and assurance, tax and legal, deals and consulting we help build, accelerate and sustain momentum. Find out more at www.pwc.com.

PwC: Audit and assurance, consulting and tax services

PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Content on this page has been prepared for general information only and is not intended to be relied upon as accounting, tax or professional advice. Please reach out to your advisors for specific advice.

Industry
Consulting & Advisory
Company Size
10,000+ employees
Headquarters
, GB
Year Founded
Unknown
Website
pwc.com
Social Media