Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: ETIC, Cybersecurity Ethical Hacking Associate.
Cairo Jobs | Expertini

Urgent! ETIC, Cybersecurity Ethical Hacking Associate - Local Job Opening in Cairo

ETIC, Cybersecurity Ethical Hacking Associate



Job description

Description

& SummaryAt PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies.

They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.

As a security engineer at PwC you will design, implement, and maintain security systems to protect an organisation's digital assets.

You will analyse potential vulnerabilities, develop strategies to mitigate risks, and confirm compliance with industry standards and regulations.

Additionally, you will conduct security audits and provide recommendations for enhancing the overall security posture.

Driven by curiosity, you are a reliable, contributing member of a team.

In our fast-paced environment, you are expected to adapt to working with a variety of clients and team members, each presenting varying challenges and scope.

Every experience is an opportunity to learn and grow.

You are expected to take ownership and consistently deliver quality work that drives value for our clients and success as a team.

As you navigate through the Firm, you build a brand for yourself, opening doors to more opportunities.

We are seeking a highly skilled Ethical Hacker to join our cybersecurity team.

The ideal candidate will use advanced tools and techniques to simulate cyberattacks on our systems, identify vulnerabilities, and work with IT teams to implement corrective measures.

Your mission is to think like a malicious hacker—but act to strengthen our defenses.

Key Responsibilities:

  • Perform penetration testing on networks, applications, and systems to discover vulnerabilities.

  • Use a variety of tools (e.g., Kali Linux, Burp Suite, Metasploit, Nmap) to simulate real-world attacks.

  • Analyze security systems and architecture to recommend improvements.

  • Report and document security issues and the steps to reproduce and mitigate them.

  • Conduct social engineering tests (e.g., phishing simulations) when applicable.

  • Stay current on emerging threats, vulnerabilities, and best practices.

  • Collaborate with IT, DevOps, and compliance teams to ensure secure configurations and deployments.

  • Provide technical advice and training to stakeholders regarding security practices.

  • Required Qualifications:

  • Bachelor's degree in Cybersecurity, Information Technology, or related field (or equivalent experience).

  • Proven experience as an Ethical Hacker, Penetration Tester, or Security Analyst.

  • In-depth understanding of network protocols, operating systems, and software security.

  • Strong scripting and programming knowledge (e.g., Python, Bash, PowerShell).

  • Familiarity with compliance standards (e.g., ISO 27001, NIST, GDPR, PCI-DSS).

  • Preferred Certifications:

  • CEH (Certified Ethical Hacker)

  • OSCP (Offensive Security Certified Professional)

  • CISSP, GPEN, or other relevant cybersecurity certifications

  • Soft Skills:

  • Strong analytical and problem-solving skills.

  • Excellent communication and documentation abilities.

  • Ethical mindset and commitment to confidentiality.

  • Ability to work independently and in a team environment.

  • Education

    Degrees/Field of Study required:Degrees/Field of Study preferred:

    Certifications

    Required Skills

    Optional Skills

    Accepting Feedback, Accepting Feedback, Active Listening, Automation Best Practices, Cloud Engineering, Communication, Compliance and Standards, Compliance Frameworks, Cyber Defense, Cyber Engineering, Cybersecurity, Cybersecurity Requirements, Cyber Threat Intelligence, Digital Rights Security, Emotional Regulation, Empathy, Forensic Investigation, Inclusion, Information Security Management System (ISMS), Intellectual Curiosity, Internet Protocol Security (IPsec), Network Security Design, Network Security Maintenance, Network Security Troubleshooting and Resolution, Optimism {+ 15 more}

    Desired Languages

    Travel Requirements

    Not Specified

    Available for Work Visa Sponsorship?

    Yes

    Government Clearance Required?

    No

    Job Posting End Date


    Required Skill Profession

    Computer Occupations



    Your Complete Job Search Toolkit

    ✨ Smart • Intelligent • Private • Secure

    Start Using Our Tools

    Join thousands of professionals who've advanced their careers with our platform

    Rate or Report This Job
    If you feel this job is inaccurate or spam kindly report to us using below form.
    Please Note: This is NOT a job application form.


      Unlock Your ETIC Cybersecurity Potential: Insight & Career Growth Guide