Line of Service
Advisory
Industry/Sector
FS X-Sector
Specialism
Operations
Management Level
Manager
& Summary
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.
As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively.
*Why PWC
At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us
At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. "
& We areseekinga professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats, drive transformation, and foster growth. As companies increasingly adopt digital business models, the generation and sharing of data among organizations, partners, and customers multiply. We play a crucial role in ensuring that our clients are protected by developing transformation strategies focused on security, efficiently integrating and managing new or existing technology systems, and enhancing their cybersecurity investments
Responsibilities:
Detailed Responsibilities/Duties
Responsible forinitialor secondary triage of security incidentsidentifiedby internal controls or external SOC partners
Proficient in Threat Research and understands the latest malware trends, common attack TTPs, and the general threat landscape
Proficient in Incident Response and automation workflows as it relates to Security Operations
Demonstrates ability to author content using a variety of query languages, as well as scripting for event enrichment and investigation
Detects,identifies, and responds to cyber events, threats, securityrisksand vulnerabilities in line with cyber security policies and procedures
Conducts threat hunting and analysis using various toolsets based on intelligence gathered
Responsible for documenting the incident life cycle, conducting handoffs’,escalation, and providing support during cyber incidents
Create detailed Incident Reports and contribute to lessons learned in collaboration with the team
Works with vulnerability management resources to uncover and prioritize potential risks and makes specific recommendations to reduce the threat landscape and minimize risk
Works with leadership and the engineering team to improve and expand available toolsets when warranted
are critical for the role
Required Qualifications
Skills
Experience with one or more Security Information and Event Management (SIEM) solutions
Understanding of common Attack methods and their SIEM signatures
Experience in security monitoring, Incident Response (IR), security tools configuration and security remediation
Strong knowledge and experience in Security Event Analysis capability
Understanding ofnetwork protocols (TCP/IP stack, SSL/TLS, IPSEC, SMTP/IMAP, FTP,HTTPetc.)
Understanding of Operating System, Web Server, database, and Security devices (firewall/NIDS/NIPS) logs and log formats
Understanding of String Parsing and Regular Expressions
Strong analytical and problem-solving skills
High levelof personal integrity, and the ability to professionally handle confidential matters and showan appropriate levelof judgment and maturity
Ability to interact effectively at all levels with sensitivity to cultural diversity
Ability to adapt as the external environment and organization evolves
Passionate about Cybersecurity domain and has the inclination to learn current technologies / concepts / improvements
Excellent in security incident handling, documentation, root cause analysis, troubleshooting and publishing post-Incident Reports.
Strong experience with cyber security in the domains of cyber threat intelligence and analysis, securitymonitoringand incident response
Experience of network and system vulnerabilities, malware, networkingprotocolsand attack methods to exploit vulnerabilities
Knowledge of cyber security frameworks and attack methodologies
Experience working with EDRs, Proxies, and anti-virus
Knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies
Excellent verbal and written English communication skills
Experience
More than 4-6 years of experience in Enterprise Cybersecurity or with a reputed services/consulting firm offering Security Consulting, Implementation and Managed Security services
More than 4 years of technical experience in Security Operations Center (SOC) and Information Securityrequired
Experience with one or more Security Information and Event Management (SIEM) solutions
Mandatory skill sets:
Tools
Email Security: Proofpoint, Abnormal Security, M365 Defender
SOAR: Palo Alto XSOAR
SIEM: Splunk
Firewall Palo Alto
EDR:Crowdstrike
Other tools: Darktrace and M365 Defender
Certifications like CEH CHFIEnCEor ECIHisbare minimum.
Preferred skill sets:
Certifications like CEH CHFIEnCEor ECIHisbare minimum.
Years of experiencerequired
2-7Years
Education qualification:
B.Tech/MCA/MBA with IT background/Bachelor’s degree in Information Technology, Cybersecurity, Computer Science
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required: Bachelor of Engineering, Master of Business AdministrationDegrees/Field of Study preferred:
Certifications (if blank, certifications not specified)
Required Skills
SoCs
Optional Skills
Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Coaching and Feedback, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance, Professional Courage {+ 13 more}
Desired Languages (If blank, desired languages not specified)
Travel Requirements
Not Specified
Available for Work Visa Sponsorship?
No
Government Clearance Required?
No
Job Posting End Date
March 20, 2026

At PwC, we help clients drive their companies to the leading edge. We’re a tech-forward, people-empowered network with more than 370,000 people in 149 countries. Across audit and assurance, tax and legal, deals and consulting we help build, accelerate and sustain momentum. Find out more at www.pwc.com.
PwC: Audit and assurance, consulting and tax services
PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Content on this page has been prepared for general information only and is not intended to be relied upon as accounting, tax or professional advice. Please reach out to your advisors for specific advice.