Senior Specialist DDIT ISC Detection & Response

INSURGENTES

Applications have closed

Novartis

Working together, we can reimagine medicine to improve and extend people’s lives.

View all jobs at Novartis

Job Description Summary

The Detection and Response Analyst will be an integral part of the Novartis Cyber Security Operations Center (CSOC). The CSOC is an advanced global team passionate about the active defense against the modern and sophisticated IT security threats and attacks. The Detection and Response Analyst will leverage a variety of tools and resources to detect, investigate, and mitigate threats impacting Novartis’ networks, systems, users, and applications. This role will involve coordination and communication with technical and nontechnical teams, including security leadership and business stakeholders. This is an entry level position intended to challenge and grow technical investigation and IT security skillsets


 

Job Description

MAJOR ACCOUNTABILITIES

In addition to accountabilities listed above in Job Description:

·         Security Monitoring and Triage

o   Monitor in real time security controls and consoles from across the Novartis IT ecosystem

o   Communicate with technical and non-technical end users who report suspicious activity

·         Forensics and Incident Response

o   Conduct initial investigations into security incidents involving a variety of threats

o   Gather live evidence from endpoint devices and log sources from a variety of systems and applications

o   Support incident response activities including scoping, communication, reporting, and long term remediation planning

o   Prepare technical reports for business stakeholders and IT leadership

·         Big Data analysis and reporting:

o   Utilizing SIEM/Big data to identify abnormal activity and extract meaningful insights.

o   Research, develop, and enhance content within SIEM and other tools

·         Technologies and Automation:

o   Interface with engineering teams to design, test, and implement playbooks, orchestration workflows and automations

o   Research and test new technologies and platforms; develop recommendations and improvement plans

·         Day to day:

o   Perform host based analysis, artifact analysis, network packet analysis, and malware analysis in support of security investigations and incident response

o   Coordinate investigation, containment, and other response activities with business stakeholders and groups

o   Develop and maintain effective documentation; including response playbooks, processes, and other supporting operational material

o   Perform quality assurance review of analyst investigations and work product; develop feedback and development reports

o   Provide mentoring of junior staff and serve as point of escalation for higher severity incidents

o   Develop incident analysis and findings reports for management, including gap identification and recommendations for improvement

o   Recommend or develop new detection logic and tune existing sensors / security controls

o   Work with security solutions owners to assess existing security solutions array ability to detect / mitigate the abovementioned TTPs

o   Creating custom SIEM queries and dashboards to support the monitoring and detection of advanced TTPs against Novartis network


 

Skills Desired

Communication, Cyber-Security Regulation, Cyber Threat Hunting, Cyber Threat Intelligence (Cti), Cyber Threat Management, Cyber Vulnerabilities, Decision Making Skills, Influencing Skills, Information Security Risk Management

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Automation Big Data CSOC Forensics Incident response Malware Monitoring Risk management SIEM SOC Threat intelligence TTPs Vulnerabilities

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.