Line of Service
AssuranceIndustry/Sector
TMT X-SectorSpecialism
Cybersecurity & PrivacyManagement Level
AssociateJob Description & Summary
We believe that challenges are best solved together. That’s why, when you join us, you become part of a diverse and global community of problem-solvers. You'll find an unexpected mix of people who bring their unique expertise to build trust in society and tackle important issues. Here, we welcome and encourage you to lead with value and inspiration, question and challenge assumptions, as well as embrace new opportunities to deliver quality outcomes in exciting and unexpected ways, all with the support of technology.As an Associate, you’ll be exposed to a diverse scope of work, namely:
Penetration Testing – you'll learn to identify and exploit vulnerabilities, helping clients secure their assets and protect sensitive data, all while gaining hands-on experience and growing professionally.
Red Teaming – Simulate adversary tactics, techniques, and procedures to test organizational defenses, focusing on achieving specific objectives, conducting covert operations, and maintaining long-term access to compromised systems.
Cybersecurity Assessment – Assess clients’ security posture through the performance of host configuration review against industry benchmarks, source code reviews, architecture review and cybersecurity risk assessment.
Requirements
Computer Science, Computer Engineering, and Information Technology students from reputable local and overseas universities
Strong fundamental knowledge of information technology and cyber security
Knowledge of security testing tools (e.g. Kali Linux, Covenant, Metasploit, nmap, burp suite etc.)
Are keen to develop themselves in the profession.
Are highly motivated, enthusiastic, confident, and creative.
Critical thinking & problem solving.
Possess strong interpersonal and communication skills.
Committed to teamwork and excellence.
Knowledge of scripting programming languages (e.g. bash, python )
Penetration testing specific certification such as CEH, CRT, OSCP etc. is an advantage.
Participation in CTF, publicly discovered information security flaws and acknowledged CVE, published research or tool within offensive security domain is an advantage
Note
Please note we accept only one application per candidate. You may indicate your second preference in the same application. We recommend that you apply to your preferred position that closely aligns with your skills, passions and interests.
You can indicate another role in the same application form. Duplicate entries will slow down your application with us.
Kindly upload both your resume and degree audit or transcript in PDF format all under Resume attachment upload
Kindly note only shortlisted candidates will be contacted.
Got a question? Email to sg_graduate_recruitment@pwc.com.
There have been reports of scammers impersonating PwC HR professionals contacting individuals about fraudulent job opportunities using non-PwC domain email addresses and an overseas number. Please note that genuine communications from our HR team will only come from "@pwc.com" email address.
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required:Degrees/Field of Study preferred:Certifications (if blank, certifications not specified)
Required Skills
Optional Skills
Desired Languages (If blank, desired languages not specified)
Travel Requirements
Not SpecifiedAvailable for Work Visa Sponsorship?
YesGovernment Clearance Required?
NoJob Posting End Date