Line of Service Advisory
Industry/Sector Not Applicable
Specialism Operations
Management Level Associate
& Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.
In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation's security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure.
*Why PWC
At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more .
At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm's growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. "
About the Role
We are seeking a highly motivated and experienced IT & OT Security manager to join our dynamic security team. You will play a pivotal role in protecting our organization's IT and OT systems from cyber threats by developing, implementing, and maintaining a comprehensive security program. This role requires a unique blend of IT security knowledge and understanding of OT specific security principles.
Responsibilities
Design, implement, and manage a holistic IT/OT security program that addresses vulnerabilities and risks across both IT and OT environments.
Conduct regular security assessments and penetration testing to identify and remediate vulnerabilities in IT systems (networks, applications, servers) and OT systems (industrial control systems, SCADA).
Design and implement a secure IT/OT architecture, including network segmentation, firewalls, access controls, and specific OT security measures.
Design secure system architectures for critical infrastructure, implementing network segmentation, access controls, and intrusion detection systems. Their expertise ensures reliable operations in OT/ICS environments.
Develop, enforce, and maintain security policies, procedures, and best practices for both IT and OT domains.
Oversee incident response activities for both IT and OT, including detection, containment, eradication, and recovery, ensuring business continuity and minimal disruption.
Stay up-to-date on the latest IT and OT security threats and trends to maintain a proactive security posture.
Deliver security awareness training programs to educate IT and OT personnel on best practices and potential threats specific to their domains.
Design and specification of OT architecture and systems from an OT/cyber security perspective. (SCADA/Automation network design and configuration)
Acting as the lead/project manager on multidiscipline projects along with the project team in close collaboration with clients.
Manage and maintain IT and OT security tools and technologies, ensuring optimal performance and effectiveness.
Collaborate effectively with IT and OT teams to integrate security considerations seamlessly into operational procedures.
Report on the organization's overall security posture and key security metrics to senior management.
Qualifications
Bachelor's degree in Cybersecurity, Information Technology, Engineering, or a related field (Master's degree a plus).
Minimum 4 years of experience in IT security with a strong understanding of OT security principles.
Proven track record of developing and implementing successful IT/OT security programs.
In-depth knowledge of IT security best practices, standards, and frameworks (e.g., NIST Cybersecurity Framework) and familiarity with OT security frameworks (e.g., ISA/IEC 62443).
Experience in conducting security assessments and penetration testing methodologies for both IT and OT systems.
Excellent communication, collaboration, and interpersonal skills.
Ability to thrive in a fast-paced environment, manage multiple priorities, and work independently while also leading and motivating a team.
Strong analytical and problem-solving skills.
Mandatory Skill Sets- IT & OT Security
Preferred Skill sets:
Experience in relevant industries (e.g., manufacturing, utilities, energy) a strong plus.
Certifications in IT security (e.g., CISSP, CISA, CISM, OSCP) and OT security (e.g., IEC 62443 Cybersecurity or GICSP, GSEC, SSCP) highly desirable. (one in IT & one in OT is must)
Working knowledge of IT and OT architectures and protocols.
Experience in incident response and disaster recovery planning for both IT and OT environments.
Understanding/experience on Advance Metering Infrastructure is a plus
Years of Experience required:
4
Education Qualification
Any Graduate
Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor Degree
Degrees/Field of Study preferred:
Certifications (if blank, certifications not specified)
Required Skills Application Vulnerability Management
Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Cloud Security, Communication, Conducting Research, Cyber Defense, Cyber Threat Intelligence, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Malware Analysis, Malware Detection Tools, Malware Intelligence Gathering, Malware Research, Malware Reverse Engineering, Malware Sandboxing {+ 11 more}
Desired Languages (If blank, desired languages not specified)
Travel Requirements Not Specified
Available for Work Visa Sponsorship? No
Government Clearance Required? No
Job Posting End Date
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.