PwC Cyber Incident Response Director in Atlanta, Georgia
PwC is a network of firms committed to delivering quality in assurance, tax and advisory services.
We help resolve complex issues for our clients and identify opportunities. Learn more about us at www.pwc.com/us.
At PwC, we develop leaders at all levels. The distinctive leadership framework we call the PwC Professional (http://pwc.to/pwcpro) provides our people with a road map to grow their skills and build their careers. Our approach to ongoing development shapes employees into leaders, no matter the role or job title.
Are you ready to build a career in a rapidly changing world? Developing as a PwC Professional means that you will be ready
- to create and capture opportunities to advance your career and fulfill your potential. To learn more, visit us at www.pwc.com/careers.
PwC Advisory helps our clients with their most challenging imperatives from strategy through execution. We combine the breadth of knowledge of over 48,000 global professionals with deep industry knowledge to deliver custom solutions for our clients. We work with the world's largest and most complex companies and understand the unique business issues and opportunities our clients face.
As we aim to rapidly grow our Cybersecurity and Privacy practice, we are looking for consultants who are passionate about how strategy and technology can improve the role of cybersecurity, privacy and data protection in our digital world.
We are looking for consultants with extensive consulting, technological and industry experience who will help our clients solve their complex business issues from strategy through execution. A Cybersecurity and Privacy consulting career will provide the opportunity to grow and contribute to our clients' business issues every day, applying a collection of information and Cyber security capabilities, including security and privacy strategy and governance, IT risk, security testing, technology implementation/operations, and cybercrime and breach response.
Our Incident and Threat Management services help clients perform assessments and prepare for and respond to the tactical and strategic impacts of cybersecurity incidents. We assist in understanding the unique threats to clientsâ€™ organizations through analysis of the threat landscape; we also leverage government, law enforcement, and peer resources to more effectively combat threats through information-sharing opportunities such as ISAOs and information-sharing models.
Minimum Year(s) of Experience: 10
Minimum Degree Required: Bachelor's degree in Computer Science, Computer Engineering, Digital Forensics Sciences, or IT related fields.
Degree Preferred: Master's degree
Certification(s) Preferred: in GIAC including GCFA, GCFE, GREM, GNFA, GCCC,
Demonstrates thought leader-level knowledge with, and/or a proven record of success directing efforts in the following areas:
Apply incident handling processes-including preparation, identification, containment, eradication, and recovery-to protect enterprise environments;
Analyze the structure of common attack techniques in order to evaluate an attacker's spread through a system and network, anticipating and thwarting further attacker activity;
Utilize tools and evidence to determine the kind of malware used in an attack, including rootkits, backdoors, and Trojan horses, choosing appropriate defenses and response tactics for each;
Analyze a security architecture for deficiencies;
Derive Indicators of Compromise (IOCs) from malicious executables to strengthen incident response and threat intelligence efforts;
Conduct in-depth forensic analysis of Windows operating systems and media exploitation focusing on Windows 7, Windows 8/8.1, Windows 10, and Windows Server 2008/2012/2016;
Conduct in-depth forensic analysis of *Nix operating systems and media exploitation focusing on CentOS, RHEL, Solaris, AIX, HPUX, and Ubuntu/Debian;
Identify artifact and evidence locations to answer critical questions, including application execution, file access, data theft, external device usage, cloud services, anti-forensics, and detailed system usage;
Hunt and respond to advanced adversaries such as nation-state actors, organized crime, and hacktivists;
Examine traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation;
Detect and hunt unknown live, dormant, and custom malware in memory across multiple Windows systems in an enterprise environment;
Identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connections;
Target advanced adversary anti-forensics techniques like hidden and time-stomped malware, along with utility-ware used to move in the network and maintain an attacker's presence; and,
Use memory analysis, incident response, and threat hunting tools to detect hidden processes, malware, attacker command lines, rootkits, network connections, and more.
Demonstrates thought leader-level abilities with, and/or a proven record of success directing efforts in the following areas:
Utilize Network Analysis, Memory Analysis, Endpoint Analysis, Cyber Incident Lifecycle, NIST 800-61;
Identify and address client needs by building solid relationships with clients, developing an awareness of firm services, communicating with the client in an organized and knowledgeable manner, delivering clear requests for information, demonstrating flexibility in prioritizing and completing tasks, and communicating potential conflicts;
Direct the identification and addressing of client needs by building, maintaining, and utilizing networks of client relationships and community involvement, communicating value propositions, managing resource requirements, project workflow, budgets, margins, billing and collection;
Lead and supervise teams to create an atmosphere of trust and seek diverse views to encourage improvement and innovation, answer questions and provide direction to less-experienced staff, coach staff including providing timely meaningful written and verbal feedback; and,
Provide opportunities to contribute to practice development through the development of new collateral and thought leadership pieces, as well as participation in sales and driving revenue.
All qualified applicants will receive consideration for employment at PwC without regard to race; creed; color; religion; national origin; sex; age; disability; sexual orientation; gender identity or expression; genetic predisposition or carrier status; veteran, marital, or citizenship status; or any other status protected by law.