Eligibility / Qualification Required:
Please refer to the job requirements on the official PWC careers page.
Industry/SectorNot Applicable
SpecialismCybersecurity & Privacy
Management LevelAssociate
Job Description & SummaryAt PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.
As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively.
The OT Cybersecurity & Infrastructure Experienced Associate contributes to the design, implementation, security, and operation of IT‑OT infrastructures that support safe, reliable, and efficient industrial operations. The role focuses on applying
secure‑by‑design principles,
Purdue Model segmentation, and
OT visibility and monitoring solutions, working with a moderate level of autonomy and under the guidance of senior specialists.
This role is intended for professionals with solid hands‑on exposure to
ICS/SCADA environments, industrial networking, and OT cybersecurity, who actively participate in
greenfield and brownfield projects, OT modernization initiatives, and cybersecurity integration efforts.
1. IT‑OT Infrastructure & Operations- Implement and support secure IT‑OT infrastructure ensuring availability, performance, and cyber resilience.
- Troubleshoot and resolve recurring IT‑OT integration and security issues, escalating complex problems when required.
- Maintain and validate OT asset inventories (wired, wireless, and IIoT) to support visibility, lifecycle management, and monitoring.
- Contribute to technical documentation, standards, and operational procedures.
- Support infrastructure lifecycle activities across multiple client or internal engagements.
2. OT Cybersecurity Governance & Implementation- Apply cybersecurity controls and standards aligned with SANS ICS, IEC 62443, NIST 800‑82, and CIS Controls.
- Participate actively in OT security assessments, gap analyses, and compliance reviews.
- Support deployment and tuning of IDS/IPS and SIEM solutions for OT environments.
- Analyze alerts and events generated by OT cybersecurity platforms (e.g., Dragos, Nozomi, Claroty, Armis) and assist in investigation activities.
- Prepare inputs for security posture, risk, and compliance reporting.
3. Secure OT Migration & Deployment (Greenfield / Brownfield)- Participate in OT migration and modernization initiatives, supporting secure design and implementation.
- Implement security controls in greenfield OT environments following defined architectures.
- Assess brownfield environments to identify vulnerabilities, legacy constraints, and remediation opportunities.
- Support network segregation initiatives aligned with the Purdue Model (Levels 0–5).
- Coordinate with engineering, IT, and operations teams during deployment and testing phases.
4. OT Network Architecture & Segmentation- Implement OT network segmentation (zones and conduits) in alignment with IEC 62443 and enterprise standards.
- Configure and support firewalls, VLANs, routers, and switches under defined architectures.
- Participate in segmentation reviews, firewall rule validation, and access control remediation.
- Maintain and update OT network diagrams, zoning documentation, and technical controls.
5. Wireless and IIoT Security- Support deployment and security configuration of wireless OT technologies (Wi‑Fi, Bluetooth, LoRa, Zigbee, 4G/5G).
- Implement wireless security controls such as 802.1X, WPA2/WPA3‑Enterprise, and NAC.
- Assist in identifying wireless vulnerabilities, rogue devices, and misconfigurations.
- Support integration of IIoT and wireless telemetry into OT security and monitoring platforms.
6. Threat, Risk, and Control Support- Identify and support analysis of threats and vulnerabilities affecting OT assets and industrial networks.
- Participate in OT risk assessments and control mapping exercises.
- Support development and documentation of security controls, configuration baselines, and playbooks.
- Assist in OT incident response activities and lessons‑learned reviews.
7. Collaboration & Professional Development- Collaborate with OT, IT, cybersecurity, and engineering teams across engagements.
- Support remediation of identified security gaps in solution designs or operational environments.
- Demonstrate growing technical independence and accountability for assigned tasks.
- Contribute to continuous improvement through documentation, knowledge sharing, and skills development.
Qualifications & SkillsEducation- Bachelor’s degree in Computer Science, Electrical, Electronics, Telecommunications, or Industrial Engineering, or related fields.
Experience- 2–4 years of experience in OT/ICS cybersecurity, industrial networking, IT infrastructure, or industrial automation.
- Practical exposure to ICS/SCADA environments, critical infrastructure, or industrial cybersecurity projects.
Certifications (Preferred)- CompTIA Security+, CySA+
- SANS GICSP (or actively pursuing)
- ISA/IEC 62443 Fundamentals or Practitioner
- Cisco CCNA / CCNP (or equivalent knowledge)
Technical Competencies- Working knowledge of ICS/SCADA, PLCs, and DCS (e.g., Siemens, Rockwell, Schneider).
- Familiarity with industrial protocols (Modbus, DNP3, OPC‑UA, Profinet, EtherNet/IP).
- Hands‑on experience with Purdue Model segmentation concepts.
- Exposure to OT security and visibility tools (Dragos, Nozomi, Claroty, Armis).
- Experience supporting firewalls, IDS/IPS, SIEM, NAC, and VPNs in industrial environments.
- Knowledge of information security principles, OT risk management, and data protection.
Soft Skills- Strong analytical and troubleshooting skills.
- Ability to work independently on defined tasks while collaborating with senior team members.
- Clear communication and documentation skills.
- Awareness of the balance between cybersecurity controls and operational continuity.
- Attention to information management and security best practices.
- Understand the importance of have a correct information management
- Knowledge of Information Security and Data Protection
- Correct Information Security Management
All qualified applicants will receive consideration for employment at PwC without regard to ethnicity; creed; color; religion; national origin; age; disability; neurodiversity; sexual orientation; gender identity or expression; marital; or any other status protected by law. PwC is proud to be an inclusive organization and equal opportunity employer.
Travel RequirementsNot Specified
Job Posting End DateHow to Apply:
Apply online through the PWC portal.
Apply Now