Skip to Main Content

Job Title


Analista de ciberseguridad


Company : PwC Acceleration Centers


Location : Tenochtitlán, Chiapas


Created : 2025-12-27


Job Type : Full Time


Job Description

PwC is looking for an experienced technical candidate to lead, and support, our Cyber Managed Service clients and Security Operations Center Team, an essential part of our world-class managed services portfolio. In this role, you will be part of a team leading client-centric program development, analytics, innovation, response, and delivery. A career in PwC’s rapidly growing Cyber Managed Services practice will provide you the opportunity to help define how we solve our clients’ most critical cyber-related challenges and allow them to thrive and focus on their core business. As a Cyber Ops Sr. Associate, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this level include but are not limited to: ● Invite and provide in-the-moment feedback in a constructive manner. ● Share and collaborate effectively with others, creating a positive team spirit. ● Identify and make suggestions for improvements when problems and/or opportunities arise. ● Validate data and analysis for accuracy and relevance. ● Follow risk management and compliance procedures. ● Keep up-to-date with developments in my area of specialty ● Communicate confidently in a clear, concise and articulate manner - verbally and in written form. ● Seek opportunities to learn about the wider economy alongside the business models/corporate governance and/or regulatory environment of our clients ● Uphold the firm's code of ethics and business conduct Basic Qualifications: Minimum Degree Required: Bachelor’s Degree Minimum Years of Experience: Five (5) or more Certification(s) Preferred: GSEC, GCDA, SEC+, Network+, Certified Incident Handler (GCIH), Certified Intrusion Analyst (GIAC), CCNA-Security, CEH, CISSP,CTIA Preferred Knowledge/Skills: Demonstrates knowledge, leadership, and/or a proven record of success in the following areas: ● Networking and applying Network Principles (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture ● Applying Incident Response Frameworks and Handling Procedures ● Threat Hunting/Threat Intelligence(Hypothesis and IOC) ● SIEM/SOAR Engineering and Administration ● Malware Analysis(Static and Dynamic) ● Fluency with the cyber attack lifecycle and/or the tactics, techniques, and procedures of threat actors ● Information security, compliance, assurance, and/or other security best practices and principles ● Possessing and fostering an inquisitive mindset amongst team members Demonstrates abilities, leadership, and/or a proven record of success in the following areas: ● Working in a global team environment in an assigned shift, ensuring holidays coverage aligns with client schedules ● Leading daily huddles, shift handovers, preparing reports or providing inputs for reports as assigned ● Acting as a shift leader, monitoring and responding to alert queues, distributing alerts to analysts, monitoring SLA adherence, and working in an evolving environment with multiple priorities. ● Acting as the escalation point for Level 1 analysts based on the defined processes; leading investigations into SIEM, EDR, Email Security, DLP and Phishing security issues and determining if a security concern is present, escalating to client security teams or Cyber Ops leadership as appropriate ● Monitoring and analyzing alerts from a wide array of security devices and systems, such as SIEM’s, Firewalls, IDS/IPS systems, network and perimeter devices, Endpoint Detection and Response (EDR) platforms, etc.) ● Applying the security incident response process: identification, containment and remediation on a 24x7 basis as well as maintaining a willingness to provide suggestions for process improvement. ● Applying scripting language skills in Python or PowerShell to investigations or triage workflow ● Preparing materials (reports, presentations, spreadsheets, etc.) to help enable informed decision making ● Acquiring and utilizing knowledge on new technologies and solutions, exploits, attack vectors, emerging threats, and vulnerabilities ● Running and analyzing vulnerability scan per client schedules ● Analyzing and working with SIEMs, proxy tools, network security devices, IAM, DLP, Windows, *NIX, and application logs. and cloud security monitoring tools and services ● Researching and communicating information regarding the security threat landscape to team members, leadership, and clients ● Contributing to an environment of information sharing as well as acting as a coach for lower-level, more junior analysts.