Line of Service
AdvisoryIndustry/Sector
FS X-SectorSpecialism
OperationsManagement Level
Senior ManagerJob Description & Summary
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.In identity and access management at PwC, you will focus on confirming secure and efficient access to systems and data for employees and/or clients. Your work will involve the design and implementation of strategies to protect sensitive information and manage user identities.
*Why PWC
At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us.
At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. "
Job Description
Candidate should have understanding on performing gap assessment on clients Cyber security landscape primarily to prevent them from cyber security threats
Candidate should have exposure to design, development, implementation, and maintenance frameworks like ISO 27001:2022, NIST CSF 2.0, NIST 800-53, PCI-DSS etc
Responsibilities
Experience in performing the risk assessment from Cyber Security, Business Continuity and Privacy perspective
Experience on design/ assessment/ review of information security and privacy framework aligned to RBI Guidelines and other BFSI requirements
Development and documentation of information security / cyber security policies and procedures
Exposure to international standards like NIST, ISO27001, ISO 22301, ISO 20000, PCI-DSS etc.,
Developing cyber strategy, Gap assessment and recommending roadmap for strengthening the client’s cyber security posture
Ability to perform independent assessment for third parties and provide recommendations to clients in order to minimize cyber security risks
Knowledge on VA/PT, network architecture, source code review etc.,
Candidate should have experience in working in teams and managing internal and external stakeholders
Experience in handling clients from responding to RFP, proposals, resource and delivery management until project completion sign off.
Essential Skills
Engineering/master’s in computer related fields
8+ Years of experience in Information/cyber security, Governance, Risk, and Compliance
People and Project management
Excellent analytical skills & critical thinking
Ability to prioritize and appropriately manage time
Self-starter with the ability to work with minimal supervision
Certifications like CISA, CISM CISSP, CIPP, CRISC and other information security certifications.
Mandatory skill sets:Cyber Security Governance
Preferred skill sets:Cyber Security Governance
Years of experience required:7
Education Qualification:Graduate and above
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required: Bachelor DegreeDegrees/Field of Study preferred:Certifications (if blank, certifications not specified)
Required Skills
Cyber Security GovernanceOptional Skills
Accepting Feedback, Accepting Feedback, Access Control Models, Access Control System, Access Management, Active Listening, Analytical Thinking, Authorization Compliance, Authorization Management Systems, Azure Active Directory, Cloud Identity and Access Management (IAM), Coaching and Feedback, Communication, Creativity, CyberArk Management, Cybersecurity, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Federated Identity Management, ForgeRock Identity Platform, Identity and Access Management (IAM), Identity-Based Encryption, Identity Federation {+ 30 more}Desired Languages (If blank, desired languages not specified)
Travel Requirements
Not SpecifiedAvailable for Work Visa Sponsorship?
NoGovernment Clearance Required?
NoJob Posting End Date
May 27, 2026