Job Description
<strong>Line of Service</strong><p><br></p>Advisory<p><br></p><strong>Industry/Sector</strong><p><br></p>Technology<p><br></p><strong>Specialism</strong><p><br></p>Advisory – Other<p><br></p><strong>Management Level</strong><p><br></p>Senior Associate<p><br></p><strong><u>Job Description & Summary</u></strong><p><br></p>About PwC ETIC – Egypt Technology and Innovation Centre<p><br></p>PwC is opening a new Technology & Innovation Center in Cairo that will<p><br></p>deliver high quality technology solutions to consulting Clients across the<p><br></p>globe. The Centre will provide a broad suite of skills and services to our<p><br></p>clients, ranging from Packaged Applications such as SAP & Oracle, to<p><br></p>Cyber Security, Data Analytics, Custom Development and Cloud services<p><br></p>utilising AWS, Azure and Google, as well as expanding our existing<p><br></p>Managed Services capabilities.<p><br></p>The centre is looking to expand rapidly and we are looking for<p><br></p>enthusiastic self-starters with a passion for technology and client<p><br></p>delivery to help shape and form this new venture.<p><br></p><strong>Ethical Hacking Senior Associate</strong><p><br></p><strong><u>About PwC ETIC – Egypt Technology And Innovation Centre</u></strong><p><br></p>PwC ETIC (Egypt Technology & Innovation Center) in Cairo is delivering high quality technology solutions to consulting clients across the globe. The centre provides a broad suite of skills and services to our clients, ranging from packaged applications such as SAP & Oracle, to Cyber Security, Data Analytics, Custom Development and Cloud Services utilizing AWS, Azure and Google, as well as expanding our existing Managed Services capabilities.<p><br></p>The centre is looking to expand rapidly and we are looking for enthusiastic self-starters with a passion for technology and client delivery to help shape and form this new venture.<p><br></p><strong><u>Core Responsibilities</u></strong><p><br></p><ul><li>As a senior associate, you support the leadership and management of the new practice by taking an active role in the delivery team</li><li>Work with a global mindset with teams based in the UK, Germany and other Middle Eastern countries</li><li>Participate in client engagements requiring the use of ethical hacking tools and techniques to expose vulnerabilities in client IT systems by legally breaking into computer systems, websites, mobile applications, wireless platforms, Operational Technology (OT) and Internet of Things (IoT) environments</li><li>Provide risk based recommendations to iconic clients on security matters</li><li>Conduct a variety of testing including: infrastructure testing (both internal and external), application and protocol testing, mobile systems testing including RF and WiFi solutions</li><li>Research a variety of topics including: embedded devices such as IIoT/IoT; Scada/ICS, automotive; cryptography techniques and implementations; novel techniques and capabilities.</li><li>Work with clients to review and enhance the security of key platforms such as Azure AD, Office 365 and a variety of supporting cloud platforms including IaaS and SaaS</li><li>Support other business teams such as Incident Response, Threat Intelligence, Crisis Response and Cyber Security Advisory</li><li>Conduct end-to-end, web application, network/infrastructure penetration testing exercises on client assets/infrastructure and report findings and recommendations effectively.</li><li>Additionally, the role involves conducting mobile apps penetration testing and source code reviews to identify security weaknesses in the application source code, leveraging manual and automated tools and effectively reporting them to development teams, red-teaming exercises, including defining attack scenarios, conducting attack simulations that include social engineering, lateral movement, evasion techniques, obfuscation in alignment with cyber kill-chain and MITRE ATT&CK.</li><li>Present test findings, risks and conclusions to technical and non-technical audience.</li><li>Communicate effectively (both verbal and writing) with cybersecurity team, IT personnel, and executive management.</li></ul><p><br></p><strong><u>Role Requirements</u></strong><p><br></p><ul><li>Years of experience: 3+ years of experience in cybersecurity penetration testing.</li><li>University degree, ideally in the fields of Computer and Information Science, Computer Engineering, Information Cyber Security.</li><li>Experience in 2 or more of the following areas of penetration testing: Web applications, networks, red teaming, mobile applications, source code review.</li><li>Certifications in cybersecurity (OSCP, OSEP, eWPTX, GPEN, GXPN).</li><li>Good understanding of emerging cybersecurity technologies and standards.</li><li>Experience in VAPT tools such as burpsuite, metasploit framework, Kali Linux, Acunetix, Nessus, etc..</li><li>Achievement oriented with the ability to be flexible and adaptive on a daily basis.</li><li>Good organizational skills, having the ability to prioritize workload whilst being resilient and able to cope well under pressure and meet tight deadlines.</li><li>Good problem-solving skills with a structured thinking process.</li><li>Good time-management and organizational skills.</li><li>Language Skills: Excellent communication skills (verbal and written) in English and Arabic.</li><li>The ability and willingness to travel to KSA is a must.</li></ul><p><br></p><strong><u>Essential Skills & Attributes</u></strong><p><br></p><ul><li>Practical experience in delivering ethical hacking services</li><li>Experience in Consulting or in working within multinational environments</li><li>Excellent communication and presentation skills</li><li>High level of customer orientation and a convincing demeanour</li><li>Ability to work within a fast-paced & unstructured environment. Must be able</li></ul><p><br></p>to multi-task and effectively and continually prioritise<p><br></p><ul><li>Excellent oral and written English skills</li></ul><p><br></p><strong><u>Education</u></strong><p><br></p><ul><li>University degree, ideally in the fields of Computer and Information Science,</li></ul><p><br></p>Computer Applications, Computer Engineering, Information CyberSecurity,<p><br></p>Information Technology, Management Information Systems<p><br></p><ul><li>Relevant cyber security certifications (i.e. OSCP) are advantageous</li></ul><p><br></p><strong>Education </strong><em>(if blank, degree and/or field of study not specified)</em><p><br></p><strong><u>Degrees/Field Of Study Required</u></strong><p><br></p>Degrees/Field of Study preferred:<p><br></p><strong>Certifications </strong><em>(if blank, certifications not specified)</em><p><br></p><strong><u>Required Skills</u></strong><p><br></p><strong>Optional Skills</strong><p><br></p><strong>Desired Languages </strong><em>(If blank, desired languages not specified)</em><p><br></p><strong><u>Travel Requirements</u></strong><p><br></p>Not Specified<p><br></p><strong>Available for Work Visa Sponsorship?</strong><p><br></p>Yes<p><br></p><strong>Government Clearance Required?</strong><p><br></p>No<p><br></p><strong>Job Posting End Date</strong>