The Detection and Response Senior Specialist will be an integral part of the Novartis Cyber Security Operations Center (CSOC). The Novartis CSOC is an advanced security team that has reinvented Security Operations. It is comprised of a global team passionate about defending Novartis against modern and sophisticated IT security threats and attacks. The Detection and Response Senior Specialist will leverage a variety of tools and resources to detect, investigate, and mitigate threats impacting Novartis’ networks, systems, users, and applications. This role will involve coordination and communication with technical and nontechnical teams, including security leadership and business stakeholders. This is a position intended for a professional with a few years of experience, and will challenge and grow their technical investigation and IT security skillsets.
About the Role
MAJOR ACCOUNTABILITIES
Technical Team Lead
Supervise and manage a team of diverse skillsets and personalities
Evaluate and review performance; provide coaching and mentoring; develop and track career improvement goals
Instill and maintain cohesiveness and positive working culture
Accountable for regional delivery around monitoring and incident response
Security Monitoring and Triage
Monitor in real time security controls and consoles from across the Novartis IT ecosystem
Communicate with technical and non-technical end users who report suspicious activity
Forensics and Incident Response
Serve as escalation point for conducting investigations into security incidents involving advanced and sophisticated threat actors and TTPs
Perform forensic collection and analysis of electronic assets and devices, scripts and malicious software, and log sources from a variety of systems and applications
Manage incident response activities including scoping, communication, reporting, and long term remediation planning
Respond to major incidents as part of larger major incident response team
Big Data analysis and reporting
Utilizing SIEM/Big data to identify abnormal activity and extract meaningful insights.
Research, develop, and enhance content within SIEM and other tools
Technologies and Automation
Interface with engineering teams to design, test, and implement playbooks, orchestration workflows and automations
Research and test new technologies and platforms; develop recommendations and improvement plans
Day to day
Perform host based analysis, artifact analysis, network packet analysis, and malware analysis in support of security investigations and incident response
Coordinate investigation, containment, and other response activities with business stakeholders and groups
Develop and maintain effective documentation; including response playbooks, processes, and other supporting operational material
Perform quality assurance review of analyst investigations and work product; develop feedback and development reports
Provide mentoring of junior staff and serve as point of escalation for higher difficulty incidents
Develop incident analysis and findings reports for management, including gap identification and recommendations for improvement
Recommend or develop new detection logic and tune existing sensors / security controls
Work with security solutions owners to assess existing security solutions array ability to detect / mitigate the abovementioned TTPs
Creating custom SIEM queries and dashboards to support the monitoring and detection of advanced TTPs against Novartis network
Participate in weekend/after hour on-call rotation to triage and/or respond to major incidents
EDUCATION
University working and thinking level, degree in business/technical/scientific area or comparable education/experience
Professional information security certification, such as CISSP, CISM or ISO 27001 auditor / practitioner is preferred. Professional (information system) risk or audit certification such as CIA, CISA or CRISC is preferred
EXPERIENCE
6+ years of experience in Incident Response / Computer Forensics / CSOC team / Threat Hunting or related fields
Experienced IT administration with broad and in-depth technical, analytical and conceptual skills
Experience in reporting to and communicating with senior level management (with and without IT background, with and without in depth risk management background) on incident response topics
Excellent written and verbal communication and presentation skills; interpersonal and collaborative skills; and the ability to communicate information risk-related and incident response concepts to technical as well as nontechnical audiences
Excellent understanding and knowledge of general IT infrastructure technology and systems
Proven experience to initiate and manage projects that will affect CSOC services and technologies
PRODUCT/MARKET/CUSTOMER KNOWLEDGE
Good understanding of pharmaceutical industry. Good understanding and knowledge of business processes in a global pharmaceutical industry
SKILLS/JOB RELATED KNOWLEDGE
Good mediation and facilitation skills
Good knowledge of IT Security Project Management
Experience with security incident monitoring and response related to medical devices
Knowledge of (information) risk management related standards or frameworks such as COSO, ISO 2700x, CobiT, ISO 24762, BS 25999, NIST, ISF Standard of Good Practice and ITIL
Knowledge of security frameworks such as Hitrust
Host and network based forensic collection and analysis
Proficient with Encase, Responder, X-Ways, Volatility, FTK, Axiom, Splunk, Wireshark, and other forensic tools
Understanding of Advanced Persistent Threat (APT) and associated tactics.
Research, enrichment, and searching of indicators of compromise
Very strong team and interpersonal skills along with the ability to work independently and achieve individual goals.
Coordinate with other team members to achieve the specified objectives.
Effective oral and written communication skills
NETWORKS
High level of personal integrity, and the ability to professionally handle confidential matters and exude the appropriate level of judgment and maturity
Ability to handle competing priorities, and seeking consensus when stakeholders have different or even contradicting opinions