DallasRecruiter Since 2001
the smart solution for Dallas jobs

Cybersecurity - Cloud Architecture - Senior Manager

Company: PwC
Location: Richardson
Posted on: August 24, 2019

Job Description:

A career in our Incident and Crisis Management practice, within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. You'll play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats.Our team helps organisations manage their controls over access to critical systems and assets during a crisis or an active cyber threat. As part of the team, you'll help us develop controls to stay ahead of a crisis, but also help us maintain security and information risk by responding and remediating any current or future cyber threats.
To really stand out and make us ?t for the future in a constantly changing world, each and every one of us at PwC needs to be an authentic and inclusive leader, at all grades/levels and in all lines of service. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future.As a Senior Manager, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to:- Take action to ensure everyone has a voice, inviting opinion from all.- Establish the root causes of issues and tackle them, rather than just the symptoms.- Initiate open and honest coaching conversations at all levels.- Move easily between big picture thinking and managing relevant detail.- Anticipate stakeholder needs, and develop and discuss potential solutions, even before the stakeholder realises they are required.- Develop specialised expertise in one or more areas.- Advise stakeholders on relevant technical issues for their business area.- Navigate the complexities of global teams and engagements.- Build trust with teams and stakeholders through open and honest conversation.- Uphold the firm's code of ethics and business conduct.
Job Requirements and Preferences:

Basic Qualifications:

Minimum Degree Required:
Bachelor Degree

Required Fields of Study:
Computer and Information Science, Computer Applications, Management Information Systems, Computer Engineering, Forensic Science

Minimum Years of Experience:
7 year(s)

Preferred Qualifications:

Degree Preferred:
Master Degree

Certification(s) Preferred:
Any of the following: GIAC including GCFA, GCFE, GREM, GNFA, GCCC, and/or GCIA.

Preferred Knowledge/Skills:
Demonstrates intimate knowledge and/or a proven record of success in the following areas: - Apply incident handling processes-including preparation, identification, containment, eradication, and recovery-to protect enterprise environments; - Analyze the structure of common attack techniques to evaluate an attacker's spread through a system and network, anticipating and thwarting further attacker activity; - Utilize tools and evidence to determine the kind of malware used in an attack, including rootkits, backdoors, and Trojan horses, choosing appropriate defenses and response tactics for each; - Use memory dumps and memory analysis tools to determine an attacker's activities on a machine, the malware installed, and other machines the attacker used as pivot points across the network; - Acquire infected machines and then detect the artifacts and impact of exploitation through process, file, memory, and log analysis; - Recognize and understand common assembly-level patterns in malicious code, such as code injection, API hooking, and anti-analysis measures; - Derive Indicators of Compromise (IOCs) from malicious executables to strengthen incident response and threat intelligence efforts; - Conduct forensic analysis of Windows operating systems and media exploitation focusing on Windows 7, Windows 8/8.1, Windows 10, and Windows Server 2008/2012/2016; - Conduct forensic analysis of *Nix operating systems and media exploitation focusing on CentOS, RHEL, Solaris, AIX, HPUX, and Ubuntu/Debian; - Identify artifact and evidence locations to answer critical questions, including application execution, file access, data theft, external device usage, cloud services, anti-forensics, and detailed system usage; - Hunt and respond to advanced adversaries such as nation-state actors, organized crime, and hacktivists; - Extract files from network packet captures and proxy cache files, allowing follow-on malware analysis, or definitive data loss determinations; - Examine traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation; - Detect and hunt unknown live, dormant, and custom malware in memory across multiple Windows systems in an enterprise environment; - Identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connections; - Target advanced adversary anti-forensics techniques like hidden and time-stomped malware, along with utility-ware used to move in the network and maintain an attacker's presence; - Use memory analysis, incident response, and threat hunting tools to detect hidden processes, malware, attacker command lines, rootkits, network connections, and more; - Track user and attacker activity second-by-second on the system via in-depth timeline and super-timeline analysis; and, - Identify lateral movement and pivots within client enterprises, showing how attackers transition from system to system without detection.

Demonstrates intimate abilities and/or a proven record of success in the following areas: - Network Analysis, Memory Analysis, Endpoint Analysis, Cyber Incident Lifecycle, NIST 800-61; and, - Programming Languages such as Python, Perl, C/C++, C#, PowerShell, BASH, and Batch. Demonstrates intimate abilities and/or a proven record of success in at least two of the following tools: - X-Ways, Rekall, Volatility, EnCase, Remnux, IDA, Capture.Bat, RegShot, Radare, OllyDbg, Wireshark, Network Miner, NFdump, GREP, Tanium, CarbonBlack, CylancePROTECT, and PLASO/Log2Timeline.

All qualified applicants will receive consideration for employment at PwC without regard to race; creed; color; religion; national origin; sex; age; disability; sexual orientation; gender identity or expression; genetic predisposition or carrier status; veteran, marital, or citizenship status; or any other status protected by law. PwC is proud to be an affirmative action and equal opportunity employer.

Keywords: PwC, Dallas , Cybersecurity - Cloud Architecture - Senior Manager, Executive , Richardson, Texas

Click here to apply!

Didn't find what you're looking for? Search again!

I'm looking for
in category
within


Other Executive Jobs


Compliance Risk Management Officer (Data Management)
Description: Summary: br br Serves as a compliance risk officer for Independent Compliance Risk Management ICRM responsible for establishing internal strategies, policies, procedures, processes, and programs (more...)
Company: Citi
Location: Hutchins
Posted on: 09/21/2019

Strategic Systems Program Director with Security Clearance
Description: The ACT Advanced RF ARF Product Line is seeking an experienced Program Management Director to assume leadership of the Strategic Systems Program SS business area. The Director will be responsible (more...)
Company: Raytheon
Location: Dallas
Posted on: 09/21/2019

Operations Manager
Description: Save Skills - Maintenance - Lean - Team Management - Microsoft Word - Continuous Improvement The Operations Manager will be responsible for oversight and execution of the monthly build plan for all shifts (more...)
Company: Lockheed Martin Corporation
Location: Dallas
Posted on: 09/21/2019


Client Onboarding Team Lead - VP
Description: The Build Mgmt Sr Specialist is a strategic professional who stays abreast of developments within own field and contributes to directional strategy by considering their application in own job and the (more...)
Company: Citi
Location: Lewisville
Posted on: 09/21/2019

Associate Vendor Manager II
Description: Job Description Job : 1009017 SERVICES TO BE PERFORMED Admin Event Set Up - offer creation collect and label images, obtain features and specs from vendors or brand sites validate accuracy of events. (more...)
Company: Apex Systems, Inc
Location: Carrollton
Posted on: 09/21/2019

Nurse Manager Cardiac Cath Lab
Description: Description SHIFT: No Weekends br br SCHEDULE: Full-time br br Nurse Manager of Cardiac Cath Lab Medical City Plano br br The Nurse Manager manages a defined patient care area to provide a (more...)
Company: HCA.
Location: Plano
Posted on: 09/21/2019

Client Onboarding Team Lead - VP
Description: The Build Mgmt Sr Specialist is a strategic professional who stays abreast of developments within own field and contributes to directional strategy by considering their application in own job and the (more...)
Company: Citi
Location: Coppell
Posted on: 09/21/2019

Compliance Risk Management Officer (Data Management)
Description: Summary: br br Serves as a compliance risk officer for Independent Compliance Risk Management ICRM responsible for establishing internal strategies, policies, procedures, processes, and programs (more...)
Company: Citi
Location: Denton
Posted on: 09/21/2019

Director of Risk Compliance Management (Enterprise Security Group & Ch
Description: Purpose of JobJob RequirementsABOUT USAAUSAA knows what it means to serve. We facilitate the financial security of millions of U.S. military members and their families. This singular mission requires (more...)
Company: USAA
Location: Coppell
Posted on: 09/21/2019

Chief of Staff to CEO
Description: Overview br br About Us br br Cornerstone Healthcare Group, based in Dallas, Texas, was founded in 1990 and provides excellent healthcare services to our patients, residents and their families. (more...)
Company: Cornerstone Healthcare Group
Location: Dallas
Posted on: 09/21/2019

Log In or Create An Account

Get the latest Texas jobs by following @recnetTX on Twitter!

Dallas RSS job feeds