{"id":1121,"date":"2025-06-25T23:03:14","date_gmt":"2025-06-25T23:03:14","guid":{"rendered":"https:\/\/www.whitehattoolbox.com\/jobsinindia\/in-associate-network-security-engineer-it-security-ifs-pan-india\/"},"modified":"2025-06-25T23:03:14","modified_gmt":"2025-06-25T23:03:14","slug":"in-associate-network-security-engineer-it-security-ifs-pan-india","status":"publish","type":"post","link":"https:\/\/www.whitehattoolbox.com\/jobsinindia\/in-associate-network-security-engineer-it-security-ifs-pan-india\/","title":{"rendered":"IN-Associate\u2013 Network Security Engineer \u2013 IT Security\u2013 IFS \u2013 PAN India"},"content":{"rendered":"<p>Line of Service Internal Firm Services<span class=\"br\"><\/span>Industry\/Sector Not Applicable<span class=\"br\"><\/span>Specialism Operations<span class=\"br\"><\/span>Management Level Associate<span class=\"br\"><\/span>Job Description &#038; Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.<span class=\"br\"><\/span>In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation&#8217;s security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure.<span class=\"br\"><\/span>*Why PWC<span class=\"br\"><\/span>At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more .<span class=\"br\"><\/span>At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm\u2019s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. &#8220;<span class=\"br\"><\/span>Job Description &#038; Summary:<span class=\"br\"><\/span>PwC is driving major change across information and cyber security by building a centralized model to provide security services across the entire member firm network. The Network Information Security (NIS) organization is tasked with designing, implementing, and maintaining information security capabilities and services for the PwC Network of member firms. As a member of the Firewall Hygiene Team, proactively analyse security gaps to reduce the impact and compromises in PwC infrastructure. If you are seeking an exciting career with the scope to grow your cyber security skills through major change on a global scale, then NIS will empower you to do so<span class=\"br\"><\/span><b>Responsibilities:<\/b><span class=\"br\"><\/span>Demonstrates thorough abilities and\/or a proven record of success as a team player\/individual contributor. Thorough understanding and work exposure in Networking up to L2 Level. Knowledge and understanding of Firewalls (both physical and virtual) and it\u2019s functioning up to L2 level. Work exposure in any vendor firewalls would be given preference. Thorough knowledge of VLAN, VLSM, Routes and basic level understanding of different routing protocols, TCP\/IP, DNS, DHCP etc.<span class=\"br\"><\/span>Skill and Experience: Demonstrates thorough abilities and\/or a proven record of success as a team player\/individual contributor. Thorough understanding and work exposure in Networking up to L2 Level. Knowledge and understanding of Firewalls (both physical and virtual) and it\u2019s functioning up to L2 level. Work exposure in any vendor firewalls would be given preference. Thorough knowledge of VLAN, VLSM, Routes and basic level understanding of different routing protocols, TCP\/IP, DNS, DHCP etc.<span class=\"br\"><\/span>Technical Skills Required: General: \u25cf Thorough understanding of Stateful firewalls and its numerous functions like ACL\u2019s, Types of Firewalls, Spoofing, Digital Signatures Etc. \u25cf Understanding of Zone based firewalls like Cisco, Juniper, Fortinet, Palo Alto (Palo Alto preferred). \u25cf Thorough understanding of Application Layer filtering (Exposure with application layer Firewalls would be preferred). \u25cf Thorough understanding of Encryption, NAT, PAT and its usages in an enterprise environment. \u25cf Knowledge and exposure of configuring an IPSec Tunnel and its associated parameters.<span class=\"br\"><\/span>Information\/Cyber Security preferred skills set: \u25cf Basic understanding and knowledge of Information\/Cyber Security and its best practices. \u25cf Thorough knowledge of Service ports (FW ports) and associated vulnerabilities from a Cyber security POV. \u25cf Knowledge and understanding of RISK. \u25cf Thorough understanding of OS vulnerabilities. Knowledge of IDS and IPS will be added advantage. \u25cf Basic understanding of Endpoint Security, Pen-testing, Scans, and ways of vulnerability mitigations. Note: Knowledge and work experience with Palo Alto Firewalls would be preferred. Certification on the same would be an added advantage.<span class=\"br\"><\/span>Mandatory skill sets:<span class=\"br\"><\/span>Paloalto, Network security<span class=\"br\"><\/span><b>Preferred skill sets:<\/b><span class=\"br\"><\/span>Firewall<span class=\"br\"><\/span>Years of experience required:<span class=\"br\"><\/span>2+ yrs<span class=\"br\"><\/span><b>Education qualification:<\/b><span class=\"br\"><\/span>Bachelors<span class=\"br\"><\/span>Shift Hours<span class=\"br\"><\/span>IST<span class=\"br\"><\/span>Education (if blank, degree and\/or field of study not specified) Degrees\/Field of Study required: Bachelor of Engineering<span class=\"br\"><\/span>Degrees\/Field of Study preferred:<span class=\"br\"><\/span>Certifications (if blank, certifications not specified)<span class=\"br\"><\/span>Required Skills Network Security<span class=\"br\"><\/span>Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Cloud Security, Communication, Conducting Research, Cyber Defense, Cyber Threat Intelligence, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Malware Analysis, Malware Detection Tools, Malware Intelligence Gathering, Malware Research, Malware Reverse Engineering, Malware Sandboxing {+ 11 more}<span class=\"br\"><\/span>Desired Languages (If blank, desired languages not specified)<span class=\"br\"><\/span><b>Travel Requirements<\/b><span class=\"br\"><\/span>Available for Work Visa Sponsorship?<span class=\"br\"><\/span>Government Clearance Required?<span class=\"br\"><\/span>Job Posting End Date<\/p>\n<p><center><b><a rel=\"nofollow noopener\" href=\"https:\/\/www.careerjet.co.in\/jobad\/in16cfdc9fcfb7878c81f65fa81a02339d?affid=0852fd5db5a52cbcd75bf945aa534932\" class=\"button purchase\" target=\"_blank\">Apply Now<\/a> <\/b><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Line of Service Internal Firm Services Industry\/Sector Not Applicable Specialism Operations Management Level Associate Job Description &amp; Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-1121","post","type-post","status-publish","format-standard","hentry","category-it-jobs"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"jetpack_shortlink":"https:\/\/wp.me\/pgs0IK-i5","_links":{"self":[{"href":"https:\/\/www.whitehattoolbox.com\/jobsinindia\/wp-json\/wp\/v2\/posts\/1121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whitehattoolbox.com\/jobsinindia\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whitehattoolbox.com\/jobsinindia\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whitehattoolbox.com\/jobsinindia\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whitehattoolbox.com\/jobsinindia\/wp-json\/wp\/v2\/comments?post=1121"}],"version-history":[{"count":0,"href":"https:\/\/www.whitehattoolbox.com\/jobsinindia\/wp-json\/wp\/v2\/posts\/1121\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.whitehattoolbox.com\/jobsinindia\/wp-json\/wp\/v2\/media?parent=1121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whitehattoolbox.com\/jobsinindia\/wp-json\/wp\/v2\/categories?post=1121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whitehattoolbox.com\/jobsinindia\/wp-json\/wp\/v2\/tags?post=1121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}