Job Description

A career in our Risk and Compliance Management practice, within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. You’ll play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats.

Our team helps organisations transform their governance, risk, and compliance activities into a tool that is able to anticipate and mitigate risk to drive business performance. In joining, you’ll develop risk management solutions, compliance and ethics controls, business continuity planning, internal audit procedures, and a compliance framework.

To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be a purpose-led and values-driven leader at every level. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future.

As a Manager, youll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to:

  • Develop new skills outside of comfort zone.
  • Act to resolve issues which prevent the team working effectively.
  • Coach others, recognise their strengths, and encourage them to take ownership of their personal development.
  • Analyse complex ideas or proposals and build a range of meaningful recommendations.
  • Use multiple sources of information including broader stakeholder views to develop solutions and recommendations.
  • Address sub-standard work or work that does not meet firms/clients expectations.
  • Use data and insights to inform conclusions and support decision-making.
  • Develop a point of view on key global trends, and how they impact clients.
  • Manage a variety of viewpoints to build consensus and create positive outcomes for all parties.
  • Simplify complex messages, highlighting and summarising key points.
  • Uphold the firms code of ethics and business conduct.

Roles & Responsibilities

  • Lead and manage Organisation’s Security Operations Center (SOC).
  • Responsible for incident identification, assessment, quantification, reporting, communication, mitigation and monitoring
  • Responsible for compliance to SLA, process adherence and process optimization to achieve the SOC’s operational objectives
  • Responsible for team & vendor management, overall use of resources and initiation of corrective action where required for Security Operations Center
  • Perform threat management, threat modelling, identify threat vectors and develop use cases for security monitoring
  • Responsible for integration of standard and non-standard logs into SIEM
  • Creation of reports, dashboards, metrics for SOC operations and presentation to Executive Management and Cyber and Information security or Risk Management committees
  • Develop and maintain an incident response program/plan consistent with incident response management processes and standards.
  • Implement monitoring tools in the cloud
  • Work with other SOC analysts to create security-related rules to provide alerts on any suspicious activities
  • Conduct periodic threat simulation activities to evaluate the adequacy of deployed detective controls
  • Establish and maintain a database of detected and reported information security incidents
  • Provide support for forensic investigations related to Information security incidents and develop and share security event logging requirements with infrastructure and applications teams
  • Liaise with stakeholders for timely isolation, containment and remediation of Indicators of Compromise (IOCs) related to validated threat intelligence information

Requirements

  • A minimum of a degree in Computer Science / Engineering, Information
  • Technology, Electrical Engineering or a related field of study from a recognised Professional Certification such as CISSP, CISM, CEH or GCIH will be an added advantage
  • A Second degree is an added advantage

Minimum of Five (5) years of relevant IT work experience which may include Information Security, IT Infrastructure Management, IT Vendor Assessment and over two (2) years in a managerial role.


Job Details

Role Level: Mid-Level Work Type: Full-Time
Country: Philippines City: Makati National Capital Region
Company Website: https://www.pwc.com/gx/en Job Function: Management
Company Industry/
Sector:
Professional Services

What We Offer


About the Company

Searching, interviewing and hiring are all part of the professional life. The TALENTMATE Portal idea is to fill and help professionals doing one of them by bringing together the requisites under One Roof. Whether you're hunting for your Next Job Opportunity or Looking for Potential Employers, we're here to lend you a Helping Hand.

Report

Disclaimer: talentmate.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@talentmate.com.


Recent Jobs
View More Jobs
Talentmate Instagram Talentmate Facebook Talentmate YouTube Talentmate LinkedIn