PwC
Cybersecurity, Privacy and Forensics - Cyber Incident Response - Manager
PwC, Houston, Texas, United States, 77246
Cybersecurity, Privacy and Forensics - Cyber Incident Response - Manager
We are looking for an experienced Cyber Incident Response Manager to join PwC’s Cybersecurity, Privacy, and Forensics team. The role requires a combination of technical expertise in advanced penetration testing, incident response, and leadership to guide high‑performance teams and deliver secure solutions for our clients.
Skills
Analyse and identify the linkages and interactions between the component parts of an entire system.
Take ownership of projects, ensuring their successful planning, budgeting, execution, and completion.
Partner with team leadership to ensure collective ownership of quality, timelines, and deliverables.
Develop skills outside your comfort zone, and encourage others to do the same.
Effectively mentor others.
Use the review of work as an opportunity to deepen the expertise of team members.
Address conflicts or issues, engaging in difficult conversations with clients, team members and other stakeholders, escalating where appropriate.
Uphold and reinforce professional and technical standards (e.g. refer to specific PwC tax and audit guidance), the Firm's code of conduct, and independence requirements.
Opportunity As part of the Cyber Incident Response team you will perform penetration testing activities within a client's environment, emphasizing manual stealthy testing techniques. In this managerial role you will coach teams, manage client service accounts, and drive assigned client engagement workstreams by solving and analyzing complex problems to deliver elevated‑quality deliverables. You will also lead and execute stealthy penetration testing, advanced stealth team, or adversary simulation engagements.
Responsibilities
Lead and execute stealthy penetration testing.
Perform advanced security team engagements.
Conduct adversary simulation activities.
Supervise and mentor team members.
Manage client service accounts and engagement workstreams.
Solve complex problems to deliver exceptional results.
Assure project success and maintain exceptional standards.
Develop and implement testing strategies.
What You Must Have
Bachelor's Degree in Computer and Information Science, Computer Applications, Computer Engineering, Forensic Science, or Management Information Systems.
5 years of experience.
GIAC certifications such as GCFA, GCFE, GREM, GNFA, GCCC, and/or GCIA.
What Sets You Apart
Master's Degree preferred.
Applying incident handling processes.
Analyzing attack techniques.
Utilizing tools to determine malware.
Using memory dumps and analysis tools.
Acquiring infected machines and detecting artifacts.
Analyzing security architecture for deficiencies.
Recognizing common assembly‑level patterns.
Deriving Indicators of Compromise (IOCs).
The salary range for this position is: $99,000 - $232,000. Actual compensation within the range will be dependent upon the individual's skills, experience, qualifications and location, and applicable employment laws. All hired individuals are eligible for an annual discretionary bonus. PwC offers a wide range of benefits, including medical, dental, vision, 401k, holiday pay, vacation, personal and family sick leave, and more.
PwC does not intend to hire individuals who will require sponsorship through the H‑1B lottery, except as set forth within the following policy: https://pwc.to/H-1B-Lottery-Policy.
PwC is an equal opportunity employer. All qualified applicants will receive consideration for employment at PwC without regard to race, color, religion, national origin, sex (including pregnancy, sexual orientation, and gender identity), age, disability, genetic information, veteran, marital, or citizenship status, or any other status protected by law.
We recognize that conviction records may have a direct, adverse, and negative relationship to responsibilities such as accessing sensitive company or customer information, handling proprietary assets, or collaborating closely with team members. We evaluate these factors thoughtfully to establish a secure and trusted workplace for all.
#J-18808-Ljbffr
Skills
Analyse and identify the linkages and interactions between the component parts of an entire system.
Take ownership of projects, ensuring their successful planning, budgeting, execution, and completion.
Partner with team leadership to ensure collective ownership of quality, timelines, and deliverables.
Develop skills outside your comfort zone, and encourage others to do the same.
Effectively mentor others.
Use the review of work as an opportunity to deepen the expertise of team members.
Address conflicts or issues, engaging in difficult conversations with clients, team members and other stakeholders, escalating where appropriate.
Uphold and reinforce professional and technical standards (e.g. refer to specific PwC tax and audit guidance), the Firm's code of conduct, and independence requirements.
Opportunity As part of the Cyber Incident Response team you will perform penetration testing activities within a client's environment, emphasizing manual stealthy testing techniques. In this managerial role you will coach teams, manage client service accounts, and drive assigned client engagement workstreams by solving and analyzing complex problems to deliver elevated‑quality deliverables. You will also lead and execute stealthy penetration testing, advanced stealth team, or adversary simulation engagements.
Responsibilities
Lead and execute stealthy penetration testing.
Perform advanced security team engagements.
Conduct adversary simulation activities.
Supervise and mentor team members.
Manage client service accounts and engagement workstreams.
Solve complex problems to deliver exceptional results.
Assure project success and maintain exceptional standards.
Develop and implement testing strategies.
What You Must Have
Bachelor's Degree in Computer and Information Science, Computer Applications, Computer Engineering, Forensic Science, or Management Information Systems.
5 years of experience.
GIAC certifications such as GCFA, GCFE, GREM, GNFA, GCCC, and/or GCIA.
What Sets You Apart
Master's Degree preferred.
Applying incident handling processes.
Analyzing attack techniques.
Utilizing tools to determine malware.
Using memory dumps and analysis tools.
Acquiring infected machines and detecting artifacts.
Analyzing security architecture for deficiencies.
Recognizing common assembly‑level patterns.
Deriving Indicators of Compromise (IOCs).
The salary range for this position is: $99,000 - $232,000. Actual compensation within the range will be dependent upon the individual's skills, experience, qualifications and location, and applicable employment laws. All hired individuals are eligible for an annual discretionary bonus. PwC offers a wide range of benefits, including medical, dental, vision, 401k, holiday pay, vacation, personal and family sick leave, and more.
PwC does not intend to hire individuals who will require sponsorship through the H‑1B lottery, except as set forth within the following policy: https://pwc.to/H-1B-Lottery-Policy.
PwC is an equal opportunity employer. All qualified applicants will receive consideration for employment at PwC without regard to race, color, religion, national origin, sex (including pregnancy, sexual orientation, and gender identity), age, disability, genetic information, veteran, marital, or citizenship status, or any other status protected by law.
We recognize that conviction records may have a direct, adverse, and negative relationship to responsibilities such as accessing sensitive company or customer information, handling proprietary assets, or collaborating closely with team members. We evaluate these factors thoughtfully to establish a secure and trusted workplace for all.
#J-18808-Ljbffr