Description
At PwC, we measure success by our ability to create the value that our clients and our people are looking for. Our reputation lies in building lasting relationships with our clients and a focus on delivering value in all we do. We’re a network of firms in 158 countries with more than 236,000 people who are committed to delivering world-class capabilities and quality in assurance, tax and advisory services.
Established in the region for 40 years, PwC Middle East employs over 4,200 people across 12 countries. Complementing our depth of industry expertise and breadth of skills is our sound knowledge of local business environments across the Middle East region. Our tailored solutions help our clients meet the challenges and opportunities of doing business in the Middle East market and beyond.
Line of Service
Advisory
Industry/Sector
Technology
Specialism
Advisory - Other
Management Level
Senior Associate
Job Description & Summary
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.
Those in application security at PwC will be responsible for providing security services to development teams including code scanning, readiness testing, and penetration testing to enable application teams to build and deploy secure applications in Production. You will utilise a risk-based methodology and "shift-left" approach to engage early in the software development lifecycle.
Position Overview
We are seeking a motivated and detail-oriented Cyber Risk Analyst with a focus on Data Privacy and IT Compliance. The ideal candidate will play a crucial role in identifying, assessing, and mitigating cyber risks while ensuring compliance with relevant data protection regulations and internal policies.
Key Responsibilities
-
Risk Assessment: Conduct comprehensive risk assessments to identify vulnerabilities and threats related to data privacy and IT compliance.
-
Policy Development: Assist in the creation and implementation of data privacy policies and IT compliance frameworks in alignment with industry standards and regulations (e.g., GDPR, CCPA).
-
Monitoring & Reporting: Monitor compliance with data protection regulations and internal policies, preparing regular reports on compliance status and risk exposure.
-
Incident Response: Support the incident response process for data breaches and compliance violations, coordinating with relevant stakeholders to mitigate risks.
-
Training & Awareness: Develop and deliver training programs to enhance awareness of data privacy and IT compliance among employees.
-
Collaboration: Work closely with IT, legal, and other departments to ensure a comprehensive approach to data privacy and compliance.
-
Regulatory Updates: Stay informed on changes to data privacy laws and regulations and assess their impact on the organization's compliance posture.
Qualifications
-
Education: Bachelor’s degree in Cybersecurity, Information Technology, Law, or a related field.
-
Experience: 2+ years of experience in cyber risk management, data privacy, or IT compliance.
-
Certifications: Relevant certifications such as CIPP, CIPM, CISSP, or ISO 27001 are preferred.
-
Knowledge: Strong understanding of data privacy regulations and compliance frameworks.
-
Skills: Excellent analytical, problem-solving, and communication skills.
-
Tools: Familiarity with risk assessment tools and compliance management software is a plus.
Education
(if blank, degree and/or field of study not specified)
Degrees/Field of Study required:Degrees/Field of Study preferred:
Certifications
(if blank, certifications not specified)
Required Skills
Optional Skills
Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Application Security, Application Security Assessment, Azure Data Factory, Cloud Application Development, Cloud Security, Coding Standards, Communication, Creativity, Cybersecurity, DevOps Practices, Embracing Change, Emotional Regulation, Empathy, Endpoint Security, Forensic Investigation, Hosting Controllers, Inclusion, Information Security, Intellectual Curiosity, Learning Agility, LoadRunner (Software Testing Tool) {+ 30 more}
Desired Languages
(If blank, desired languages not specified)
Travel Requirements
Not Specified
Available for Work Visa Sponsorship?
No
Government Clearance Required?
No
Job Posting End Date