A career in our Security Architecture practice, within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. You'll play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats.
In joining, you'll be a part of a team that helps organisations design and create sustainable security solutions to provide foundational capabilities and operational discipline through a focus on enterprise requirements and prioritisation, Information Technology security architecture, and the software development lifecycle.Background
Are you passionate about investigating state sponsored attacks, data breaches, economic espionage and targeted intrusions? Join the CIR-accredited IR team at PwC responsible for the development and delivery of incident response and threat hunting services provided by PwC across the globe, ranging from single-system analysis to major intrusions on some of the world's largest corporate networks.About the team
Our Cyber Threat Operations practice is PwC's front-line technical services group, responsible for the development, management and execution of a portfolio of blue and red team services. We provide subscription and bespoke threat research services, short-term and managed endpoint and network hunting services, incident response and readiness services and adversary emulation.About The Role
The Cyber Security Incident Response Associate role will primarily consist of conducting incident response investigations on behalf of a wide variety of clients across every sector.
Within the role you will have scope to be involved in all aspects of incident response activity, as well as to develop specialisms in particular areas.
You will be working within complex security environments and alongside Incident Response Managers to design, communicate and execute incident response, containment and remediation plans.Responsibilities
Skills and Experience
- Plan, organise and devise approaches necessary to respond to incidents and obtain useful forensic information from the evidence collected
- Prioritising and differentiating between potential intrusion activity and false alarms
- Conduct incident and investigation post-mortem briefings, analysis, and reporting
- Conduct forensic investigations including physical/logical disk, network packet capture, memory analysis or malware analysis
- Provide technical guidance to investigations to correctly gather, analyse and present digital evidence to both business and legal audiences
- Collate conclusions and recommendations and present forensics findings to stakeholders
- Contribute to the development of policies, standards and guidelines for incident response
- Correlate threat intelligence with active attacks and vulnerabilities within the enterprise
- Monitor and analyse security events and identify trends, attacks, and potential threats
- Research and test out new DFIR tooling and techniques
- Creating and tracking security investigations to resolution; and, Facilitate the integration of threat and data feeds for the purposes of incident response.
- Experience in forensic capture and investigation tools such as EnCase, X-Ways, SIFT or F-Response
- Knowledge of Windows system internals and ability to identify common indicators of compromise from dead or live systems and live memory using tools such as the SysInternals suite, RegRipper, Volatility, or Mandiant Redline
- Experience of gleaning and analysing security information from enterprise network and host based sensors, such as IDS/IPS systems, HIDS, SIEMs, AD controllers and firewalls
- Expertise analysing raw network traffic captures or deployment and use of network forensics or monitoring devices such as FireEye, Solera, WireShark, SNORT or Netwitness
- Consulting experience deploying and using enterprise EDR or investigative products such as Tanium, Carbon Black, Mandiant MIR, CrowdStrike Falcon or EnCase Cybersecurity
- Knowledge of scripting languages such as Python, Perl or PowerShell and their use in forensic analysis and live incident response, or experience using other programming languages to develop software for host-centric, network-centric or log-centric security analysis