Digital Forensics & eDiscovery
This team solves complex data and big data issues, both Dutch and international. It does this by utilising structured, unstructured and system data. For example, an issue of a well-known magazine was leaked before the official release date and the publisher wanted to know who was responsible for the hack. In only 20 days, our team conducted a structured secret data review and solved the case with the help of special high-tech tools.
As a member of this team, you will be flown in to help clients that have suffered an incident, like a data breach. For example, one client lost €300,000 because hackers had transferred the money to their own account. Our investigation showed that the hackers had had access to internal communications for several months and were able to modify transactions. This meant that they could transfer money to their own accounts. Your job in this situation is to prevent matters from getting worse and to analyse the damage.
Forensic Data Analytics
The Forensics team uses data analysis to search for electronic traces of fraud, corruption and legal infractions and to conduct cyber security investigations. You might, for example, work on projects that involve tracking down terrorists or criminals. The team does this by monitoring and analysing vast amounts of data (from artificial intelligence to real-time analytics in the cloud) to pinpoint the responsible criminals. You will be intrigued by the story behind the data. Are you eager to make an impact in this area?
Identity & Access Management
Especially in the Fasttrack Identity & Access Management (IAM or Digital Identity) we require ICT skills from our candidates and herefore the typical applicant is a computer science graduate with software development / engineering skills. We work a lot with IAM technologies such as SailPoint, ForgeRock and CyberArk and it is likely that you will be educated to work with one or more of these leading IAM solutions. We can guarantee you will be entering a fascinating world where you can exploit all of your ICT talent in a very fast-growing segment of the market where PwC holds a unique position. Specifically, the PwC Amsterdam Digital Identity team is part of the largest European Digital Identity Team there is around, creating the opportunity to learn continuously in this challenging field besides taking part in international projects.
The team builds new, state-of-the-art forms of authentication. We all have an online banking app, but do you dare to log in using facial recognition? Here, you’ll develop, advise on and implement the future of IAM. Our solutions play a critical role in cybersecurity and are inseparably linked to the security and productivity of the clients you work for.
Everyone has an online identity, and everything is connected to everyone. In this team, you will be creating a personal, seamless and secure user experience across online and physical touch points for customers and partners of our clients. You will also be on a variety of projects where you improve the time to service and usability for employees to get access to critical data and systems. Last but not least, you will be controlling access to company sensitive data to prevent fraud and protect intellectual property. You are the spider in the web whom connects everything for everyone and who makes organizations cyber secure, leaving no chance for hackers to enter in the first place.
Ready to make an impact? We look forward to receive your application.
Cyber Security Consulting
We are looking for cyber security all-rounders to join this team. Are you eager to know everything there is to know about cyber security, and would you like to have training in a wide range of disciplines? As a member of the Security Network Engineering team, you’ll become an expert in cloud engineering, cyber security analytics, offensive security, security engineering and network engineering.
Offensive Security Services & Ethical Hacking
In this team, you'll try break into a client’s security system, for example by hacking it, so that they can validate and improve their security. The team might, for example, be sent to a major beverages company that is having issues with security. Your job will be to gain physical access to the premises and, once inside, to hack into their IT structure and shut down production. You’ll then work with the client to improve security.