Associate Director Ddit Isc Detection & Response

Detalles de la oferta

Job ID: REQ-10022170
Date: Sep 26, 2024
Location: Mexico
SummaryThe Threat Detection and Response Associate Director will be an integral part of the Novartis Cyber Security Operations Center (CSOC). The CSOC is an advanced global team passionate about the active defense against the most sophisticated cyber threats and attacks. The Threat Detection and Response Associate Director will leverage a variety of tools and resources to proactively detect, investigate, and mitigate threats impacting Novartis' networks, systems, users, and applications. This role will involve coordination and communication with technical and non-technical teams, including security leadership and business stakeholders. As an experienced skilled analyst, this role will also involve supervising, coaching, and mentoring a team of junior and senior analysts.
About the RoleMAJOR ACCOUNTABILITIES Security Monitoring and Triage:Monitor in real time security controls and consoles from across the Novartis IT ecosystem.Communicate with technical and non-technical end users who report suspicious activity.Forensics and Incident Response:Conduct initial investigations into security incidents involving a variety of threats.Gather live evidence from endpoint devices and log sources from a variety of systems and applications.Support incident response activities including scoping, communication, reporting, and long term remediation planning.Review technical reports and escalations for completeness and accuracy.Big Data analysis and reporting:Utilizing SIEM/Big data to identify abnormal activity and extract meaningful insights.Research, develop, and enhance content within SIEM and other tools.Technologies and Automation:Interface with engineering teams to design, test, and implement playbooks, orchestration workflows and automations.Research and test new technologies and platforms; develop recommendations and improvement plans.Day to day:Perform host based analysis, artifact analysis, network packet analysis, and malware analysis in support of security investigations and incident response.Coordinate investigation, containment, and other response activities with business stakeholders and groups.Develop and maintain effective documentation; including response playbooks, processes, and other supporting operational material.Perform quality assurance review of analyst investigations and work product; develop feedback and development reports.Provide mentoring of junior staff and serve as point of escalation for higher severity incidents.Develop incident analysis and findings reports for management, including gap identification and recommendations for improvement.Recommend or develop new detection logic and tune existing sensors/security controls.Work with security solutions owners to assess existing security solutions array ability to detect/mitigate the abovementioned TTPs.Create custom SIEM queries and dashboards to support the monitoring and detection of advanced TTPs against Novartis network.Minimum Requirements5+ years of experience in Incident Response / Computer Forensics / CSOC team / Threat Hunting or related fields.Experience in reporting to and communicating with senior level management (with and without IT background, with and without in-depth risk management background) on incident response topics.Excellent written and verbal communication and presentation skills; interpersonal and collaborative skills; and the ability to communicate information risk-related and incident response concepts to technical as well as non-technical audiences.Excellent understanding and knowledge of general IT infrastructure technology and systems.Proven experience to initiate and manage projects that will affect CSOC services and technologies.Experienced IT administration with broad and in-depth technical, analytical and conceptual skills.Skills:Good mediation and facilitation skills.Good knowledge of IT Security Project Management.Experience with security incident monitoring and response related to medical devices.Knowledge of (information) risk management related standards or frameworks such as COSO, ISO 2700x, CobiT, ISO 24762, BS 25999, NIST, ISF Standard of Good Practice and ITIL.Knowledge of security frameworks such as Hitrust.Host and network based forensic collection and analysis.Dynamic malware analysis, reverse engineering, and/or scripting abilities.Proficient with Encase, Responder, X-Ways, Volatility, FTK, Axiom, Splunk, Wireshark, and other forensic tools.Understanding of Advanced Persistent Threat (APT) and associated tactics.Research, enrichment, and searching of indicators of compromise.Very strong team and interpersonal skills along with the ability to work independently and achieve individual goals.Coordinate with other team members to achieve the specified objectives.Effective oral and written communication skills.
#J-18808-Ljbffr


Salario Nominal: A convenir

Fuente: Jobleads

Requisitos

Inplarsa Está Buscando Tu Talento Como Técnico

¡¡INPLARSA ESTÁ BUSCANDO TU TALENTO COMO TÉCNICO ELECTROMECÁNICO!!Objetivo del puesto: Brindar soporte técnico al personal y áreas de trabajo, llevar a cabo ...


Durango

Publicado 9 days ago

Técnico De Servicio/Soporte Técnico

**Interlogic®, empresa mexicana líder en tecnologías de auto atención solicitamos**:**TÉCNICO **_**DE SERVICIO- DURANGO**_**Requisitos**:- Experiência de 2 a...


Interlogic - Durango

Publicado 9 days ago

Zillow | Technical Lead Ios (Platform) | Santa Clara

About the teamZillow started in 2006 and is the most visited real estate website in the United States with over 10.5 billion visits in 2022, and an average o...


Zillow - Durango

Publicado 9 days ago

Zillow | Senior Network Engineer | Santa Clara

About the teamJoin our dynamic network engineering team, a pivotal force behind Zillow Network's automation, maintenance, and management. This team ensures t...


Zillow - Durango

Publicado 9 days ago

Built at: 2024-12-12T17:02:58.695Z