Job Description Summary The Threat Detection and Response Associate Director will be an integral part of the Novartis Cyber Security Operations Center (CSOC). The CSOC is an advanced global team passionate about the active defense against the most sophisticated cyber threats and attacks. The Threat Detection and Response Associate Director will leverage a variety of tools and resources to proactively detect, investigate, and mitigate threats impacting Novartis' networks, systems, users, and applications. This role will involve coordination and communication with technical and nontechnical teams, including security leadership and business stakeholders. As an experienced skilled analyst, this role will also involve supervising, coaching, and mentoring a team of junior and senior analysts.
Job Description MAJOR ACCOUNTABILITIES In addition to accountabilities listed above in Job Purpose:
Security Monitoring and TriageMonitor in real time security controls and consoles from across the Novartis IT ecosystemCommunicate with technical and non-technical end users who report suspicious activityForensics and Incident ResponseConduct initial investigations into security incidents involving a variety of threatsGather live evidence from endpoint devices and log sources from a variety of systems and applicationsSupport incident response activities including scoping, communication, reporting, and long term remediation planningReview technical reports and escalations for completeness and accuracyBig Data analysis and reportingUtilizing SIEM/Big data to identify abnormal activity and extract meaningful insights.Research, develop, and enhance content within SIEM and other toolsTechnologies and AutomationInterface with engineering teams to design, test, and implement playbooks, orchestration workflows and automationsResearch and test new technologies and platforms; develop recommendations and improvement plansDay to dayPerform host based analysis, artifact analysis, network packet analysis, and malware analysis in support of security investigations and incident responseCoordinate investigation, containment, and other response activities with business stakeholders and groupsDevelop and maintain effective documentation; including response playbooks, processes, and other supporting operational materialPerform quality assurance review of analyst investigations and work product; develop feedback and development reportsProvide mentoring of junior staff and serve as point of escalation for higher severity incidentsDevelop incident analysis and findings reports for management, including gap identification and recommendations for improvementRecommend or develop new detection logic and tune existing sensors / security controlsWork with security solutions owners to assess existing security solutions array ability to detect / mitigate the abovementioned TTPsCreating custom SIEM queries and dashboards to support the monitoring and detection of advanced TTPs against Novartis networkMinimum Requirements: 5+ years of experience in Incident Response / Computer Forensics / CSOC team / Threat Hunting or related fieldsExperience in reporting to and communicating with senior level management (with and without IT background, with and without in depth risk management background) on incident response topicsExcellent written and verbal communication and presentation skills; interpersonal and collaborative skills; and the ability to communicate information risk-related and incident response concepts to technical as well as nontechnical audiencesExcellent understanding and knowledge of general IT infrastructure technology and systemsProven experience to initiate and manage projects that will affect CSOC services and technologiesExperienced IT administration with broad and in-depth technical, analytical and conceptual skillsSkills: Good mediation and facilitation skillsGood knowledge of IT Security Project ManagementExperience with security incident monitoring and response related to medical devicesKnowledge of (information) risk management related standards or frameworks such as COSO, ISO 2700x, CobiT, ISO 24762, BS 25999, NIST, ISF Standard of Good Practice and ITILKnowledge of security frameworks such as HitrustHost and network based forensic collection and analysisDynamic malware analysis, reverse engineering, and/or scripting abilitiesProficient with Encase, Responder, X-Ways, Volatility, FTK, Axiom, Splunk, Wireshark, and other forensic toolsUnderstanding of Advanced Persistent Threat (APT) and associated tactics.Research, enrichment, and searching of indicators of compromiseVery strong team and interpersonal skills along with the ability to work independently and achieve individual goals.Coordinate with other team members to achieve the specified objectives.Effective oral and written communication skillsSkills Desired: Communication Skills, Cyber-Security Regulation, Cyber Threat Hunting, Cyber Threat Intelligence (Cti), Cyber Threat Management, Cyber Vulnerabilities, Decision Making Skills, Influencing Skills, Information Security Risk Management
#J-18808-Ljbffr