About the Team
Our Cyber Threat Operations practice is PwC’s front-line technical services group, responsible for the development, management and execution of a portfolio of blue and red team services. We provide subscription and bespoke threat research services, short-term and managed endpoint and network hunting services, incident response and readiness services and adversary emulation.
Are you passionate about investigating state sponsored attacks, data breaches, economic espionage and targeted intrusions? Join the CIR-accredited IR team at PwC responsible for the development and delivery of incident response and threat hunting services provided by PwC across the globe, ranging from single-system analysis to major intrusions on some of the world’s largest corporate networks.
About the Role
The Cyber Security Incident Response Associate role will primarily consist of conducting incident response investigations on behalf of a wide variety of clients across every sector. Within the role you will have scope to be involved in all aspects of incident response activity, as well as to develop specialisms in particular areas.
You will be working within complex security environments and alongside Incident Response Managers to design, communicate and execute incident response, containment and remediation plans.
Plan, organise and devise approaches necessary to respond to incidents and obtain useful forensic information from the evidence collected
Prioritising and differentiating between potential intrusion activity and false alarms
Conduct incident and investigation post-mortem briefings, analysis, and reporting
Conduct forensic investigations including physical/logical disk, network packet capture, memory analysis or malware analysis
Provide technical guidance to investigations to correctly gather, analyse and present digital evidence to both business and legal audiences
Collate conclusions and recommendations and present forensics findings to stakeholders
Contribute to the development of policies, standards and guidelines for incident response
Correlate threat intelligence with active attacks and vulnerabilities within the enterprise
Monitor and analyse security events and identify trends, attacks, and potential threats
Research and test out new DFIR tooling and techniques
Creating and tracking security investigations to resolution; and, Facilitate the integration of threat and data feeds for the purposes of incident response.
Skills and Experience
Experience in forensic capture and investigation tools such as EnCase, X-Ways, SIFT or F-Response
Knowledge of Windows system internals and ability to identify common indicators of compromise from dead or live systems and live memory using tools such as the SysInternals suite, RegRipper, Volatility, or Mandiant Redline
Experience of gleaning and analysing security information from enterprise network and host based sensors, such as IDS/IPS systems, HIDS, SIEMs, AD controllers and firewalls
Expertise analysing raw network traffic captures or deployment and use of network forensics or monitoring devices such as FireEye, Solera, WireShark, SNORT or Netwitness
Consulting experience deploying and using enterprise EDR or investigative products such as Tanium, Carbon Black, Mandiant MIR, CrowdStrike Falcon or EnCase Cybersecurity
Knowledge of scripting languages such as Python, Perl or PowerShell and their use in forensic analysis and live incident response, or experience using other programming languages to develop software for host-centric, network-centric or log-centric security analysis