PwC are driving major change across information & cyber security by building a centralized model to provide security services across the entire member firm network. Mandated at the network level, NIS operate outside IT & are responsible for this major program initiative, from definition of the security strategy to execution of the global Cyber Readiness Program, moving from local to centralized services. Our mission is to identify, control & reduce the attack surface across the member firm network while increasing our adversaries' cost of attack. In order to deliver the Cyber Readiness Program the NIS team is structured into the following Pillars:
NIS are building the first global cyber security function at PwC. Our mission protects 300,000 PwC members across 160 member firms worldwide as well as our global clients. If you are seeking an exciting career with the scope to grow your security skills through major change on a global scale, then NIS will empower you to do so. The SAEIT pillar within NIS is responsible for the following services:
If you love designing & building security technology this is the place to be. Within SAEIT we work closely with the business to define the NIS 5 year security roadmap. Gathering business requirements to combine PwC's goals with conceptual long term security trends to create a target architecture for NIS to deliver against. From this future state plan the Security Engineering team break down long term goals into manageable projects and look to technical security solutions to solve business problems. Designing & building security technology that span the wider PwC network of firms. Once security technologies are built the security engineering team work closely with Cyber in order to highlight the capability of the technology to ensure maximum impact as it is transitioned into an operational environment.
Scope of Responsibility:The Application Security team own following tasks:
Definition of application landscape & creation of application risk register across the PwC Network of firms
Utilisation of application security tools for scanning applications for common application security risks
Engagement with development teams to articulate complex application security risks
Continual engagement throughout the software development lifecycle (SDLC) to identify, track & reduce application security risks across new applications
Assessment of application security vulnerabilities across existing application landscape.
Plan & prioritise application security vulnerabilities & develop structured remediation plan
Engaging stakeholders in ISRC to ensure technical vulnerabilities that cannot be remediated are managed & mitigating controls are developed to reduce the risk of said vulnerability within the business environment.
Responsibilities and Metrics;
Through expert knowledge of software development work with development teams to minimize vulnerabilities throughout the Software Development Lifecycle.
Through engagement with development teams educate developers around secure coding practices & common vulnerabilities in applications (OWASP Top 10))
Carry out penetration tests on applications to highlight vulnerabilities in the code
Manage reduction of vulnerabilities throughout SDLC
Identify & understand all vulnerabilities across the PwC application landscape
Determine critical risks to PwC applications and work with IRSC to create mitigating controls to reduce risks in the live environment to an acceptable level
Promote secure coding principles throughout software development teams
Analytical: Inquisitive nature and intuition regarding what questions to ask, when, and their relative significance.
Technical: Broad understanding of enterprise technology & how to design & build a range of security tools
Business: High level understanding of PwC's business model, service offerings, and business operating environment as it pertains to the firm's threat landscape. Ability to frame threats and exposures in a business context recognized by non-technical staff and executives.
Threat landscape: Knowledge of how attack techniques are used in enterprise intrusions to gain entry, gain privilege, and ultimately accomplish a nefarious objective against a victim organization.
Communication: High level verbal and written communication skills vital to informing, persuading, and teaching stakeholders to enable effective response
Delivery. Ability to define the conceptual and execute within a real world business environment.
Be unique. Be authentic. However you prefer to say it, we really mean it. Our culture
embraces people’s diverse perspectives and creates a positive environment where everyone
belongs. We’re determined to build a better, more connected world for everyone.