To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be an authentic and inclusive leader, at all grades/levels and in all lines of service. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future.
As an Intern / Trainee, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to:
Job Requirements and Preferences:
Basic Qualifications:
Minimum Degree Required:
Bachelor's Degree
Minimum Year(s) of Experience:
0 year(s)
Preferred Qualifications:
Preferred Fields of Study:
Analytics,Business Analytics,Business Application Programming,Computer and Information Science,Computer and Information Science & Accounting,Computer Systems Analysis,Computer Systems Analysis & Accounting,Computer Engineering,Computer Engineering & Accounting,Computer Programming,Data Processing/Analytics/Science,Information CyberSecurity,Information CyberSecurity & Accounting,Information Technology,Information Technology & Accounting,Management Information Systems,Management Information Systems & Accounting,Internet Technology,Library Science,Management of Technology,Statistics,Risk Management,Software App,Systems Engineering,Systems Engineering & Accounting,Web Design,Webmaster and Web Management,Electrical Engineering,Engineering and Business
Additional Educational Preferences:
Preferred cumulative & major GPA: 3.3Client service intern positions are entry-level & job seekers are traditionally either in their 3rd year of a 4 year degree program or in the 4th year of a 5 year program. Client service interns typically join us during the winter/spring or summer prior to their intended grad year.
Preferred Knowledge/Skills:
Demonstrates some level of knowledge and ability to gather solution or project requirements through interaction with business and technology leaders in the following areas: Cyber Defense & Engineering
- Building solutions & solving technical problems;
- Understanding programming languages (Python, Perl, C++, C#, Java, Javascript);
- Applying technical skills outside the classroom; and,
- Understanding of AWS Cloud Services, Azure, Google Cloud Platform, Cloud Infrastructure/Security, Cloud Infrastructure Entitlement Mgmt, Cloud Security Posture Mgmt, IAM (SailPoint, Saviynt, Ping Identity, ForgeRock, Okta, MSFT Entra/Azure Active Directory, Microsoft Active Directory), Privileged Access Mgmt (CyberArk, Delinea), Disaster Recovery, GRC (ServiceNow, Archer), Incident Response, Kubernetes, HashiCorp, Network Engineering/Security, Operational Technology, Pen Testing Software (metasploit, nmap, Cobalt Strike), Incident Response tools (EnCase & Timesketch, PowerShell, Python, Security Operations, Security Policies, Threat & Vulnerability Mgmt, Threat Detection & Response, Atlassian JIRA, GitHub). Data Risk & Privacy
- Building solutions & solving technical problems;
- Understanding programming languages (Python, Perl, C++, C#, Java, Javascript);
- Applying technical skills outside the classroom; and,
- Understanding of AWS Cloud Services, Azure, Google Cloud Platform, Cloud Infrastructure/Security, Cloud Infrastructure Entitlement Mgmt, Cloud Security Posture Mgmt, IAM (SailPoint, Saviynt, Ping Identity, ForgeRock, Okta, MSFT Entra/Azure Active Directory, Microsoft Active Directory), Privileged Access Mgmt (CyberArk, Delinea), Disaster Recovery, GRC (ServiceNow, Archer), Incident Response, Kubernetes, HashiCorp, Network Engineering/Security, Operational Technology, Pen Testing Software (metasploit, nmap, Cobalt Strike), Incident Response tools (EnCase & Timesketch, PowerShell, Python, Security Operations, Security Policies, Threat & Vulnerability Mgmt, Threat Detection & Response, Atlassian JIRA, GitHub).
- Understanding industry recognized info security, privacy standards & industry leading practices (NIST-P & NIST CSF, AICPA PMF, HIPAA, COBIT, ISO 27001/2);
- Understanding major global data protection & privacy regulations (Europe’s GDPR, California CCPA/CPRA, China PIPL);
- Understanding AI technologies, apps & risks;
- Using Microsoft O365, Azure, Microsoft Purview Info Protection, Microsoft Defender, SQL Server, PostgreSQL, Oracle, MySQL, Snowflake, Amazon RDS, Stardog, SmartLogic, Power BI, Tableau, QlikView, AWS QuickSight, BigID, OneTrust, Securiti.ai;
- Using programming languages (Python, C++, C#, Java, JavaScript, HTML, CSS, Perl, PHP); and,
- Leveraging visualization tools (Power BI, Tableau, QlikView, AWS QuickSight); and,
- Understanding Data Protection capabilities (Database Activity Monitoring (IBM, Imperva), Data Access Governance (SailPoint, Stealthbits, Varonis), Data Classification (BigID, Boldon James, Microsoft Info Protection, TITUS), Data Loss Prevention (Forcepoint, McAfee, Symantec), Info Rights Mgmt (Microsoft Info Protection, Seclore, Vera)). Strategy Risk & Compliance
- Building solutions & solving technical problems;
- Understanding programming languages (Python, Perl, C++, C#, Java, Javascript);
- Applying technical skills outside the classroom; and,
- Understanding of AWS Cloud Services, Azure, Google Cloud Platform, Cloud Infrastructure/Security, Cloud Infrastructure Entitlement Mgmt, Cloud Security Posture Mgmt, IAM (SailPoint, Saviynt, Ping Identity, ForgeRock, Okta, MSFT Entra/Azure Active Directory, Microsoft Active Directory), Privileged Access Mgmt (CyberArk, Delinea), Disaster Recovery, GRC (ServiceNow, Archer), Incident Response, Kubernetes, HashiCorp, Network Engineering/Security, Operational Technology, Pen Testing Software (metasploit, nmap, Cobalt Strike), Incident Response tools (EnCase & Timesketch, PowerShell, Python, Security Operations, Security Policies, Threat & Vulnerability Mgmt, Threat Detection & Response, Atlassian JIRA, GitHub).
- Understanding industry recognized info security, privacy standards & industry leading practices (NIST-P & NIST CSF, AICPA PMF, HIPAA, COBIT, ISO 27001/2);
- Understanding major global data protection & privacy regulations (Europe’s GDPR, California CCPA/CPRA, China PIPL);
- Understanding AI technologies, apps & risks;
- Using Microsoft O365, Azure, Microsoft Purview Info Protection, Microsoft Defender, SQL Server, PostgreSQL, Oracle, MySQL, Snowflake, Amazon RDS, Stardog, SmartLogic, Power BI, Tableau, QlikView, AWS QuickSight, BigID, OneTrust, Securiti.ai;
- Using programming languages (Python, C++, C#, Java, JavaScript, HTML, CSS, Perl, PHP); and,
- Leveraging visualization tools (Power BI, Tableau, QlikView, AWS QuickSight); and,
- Understanding Data Protection capabilities (Database Activity Monitoring (IBM, Imperva), Data Access Governance (SailPoint, Stealthbits, Varonis), Data Classification (BigID, Boldon James, Microsoft Info Protection, TITUS), Data Loss Prevention (Forcepoint, McAfee, Symantec), Info Rights Mgmt (Microsoft Info Protection, Seclore, Vera)).
- Understanding of industry standard frameworks (NIST CSF, FedRamp, CMMC, ISO27k), GRC Technology, Cloud Security;
- Creating digitally-enabled reporting with data visualization; and,
- Understanding of Cyber Metrics & Reporting, InfoTechnology Mgmt, Resilience, Software Development, App Security, Cloud Computing, Cyber Standards (NIST 800-53, NIST CSF), Cyber Regulatory/Compliance Frameworks (ISO27001, PCI DSS, HIPAA), Data Protection, Threat & Vulnerability Mgmt, Cyber Threat Analysis, Security Operations, GRC, Security Infrastructure/Architecture, Network Security Architecture, Cloud Security Models, AWS, Azure, GCP, PCI, DevSecOps, Pen Testing, TPRM, Info Security/Cyber Risk Assessments, Maturity Assessments, Risk Mgmt, Strategy Development, Controls, & Info Technology General Controls, Cloud Computing, Endpoint Security, Operational Technology Security, IAM, Program Level Analytics/Control Monitoring, AppSec, OT, SIEM/SOC, Data Security, ERP, NetSec/Zero Trust, Asset Mgmt.
...of basic computer hardware, software, and networks. ~ Detail-oriented and self-motivated. ~ Ability to build and maintain good rapport... ...choices. Avail discounts on Phone Services, Supplier Vehicles, Mobile Detailing, and Tool & Equipment purchases, among other...
...it concerns paid study: you can either take part in person or online (remote). This is an excellent method for you to make additional... ...alternatives, including PayPal, direct checks, as well as online virtual gift cards codes. Opportunities to earn rewards....
...Requisition Number: 63917 Corning is vital to progress in the industries we help shape and in the world we share. We invent life-changing technologies using materials science. Our scientific and manufacturing expertise, boundless curiosity, and commitment to purposeful...
...EMPLOYMENT OPPORTUNITY ARCHITECTURAL DESIGNER Tecton Architects has an immediate opening in our Hartford, CT studio for an Architectural Designer. The ideal candidate would be an emerging professional with a background in architecture who is passionate about creating...
...public infrastructure, and commercial and residential development. We work hard. We play hard. We have fun. JOIN CANNON as a CONSTRUCTION INSPECTOR in the VENTURA, CALIFORNIA area. Ventura is located 30 miles south of Santa Barbara, with a backdrop of the Los...