Summary
Internal job title: Sr. Spec. DDIT ISC Threat Detection & Response
The Threat Detection and Response Senior Specialist will be an integral part of the Novartis Cyber Security Operations Center (CSOC). The CSOC is an advanced global team passionate about the active defence against the modern and sophisticated IT security threats and attacks.
The Threat Detection and Response Analyst will leverage a variety of tools and resources to detect, investigate, and mitigate threats impacting Novartis’ networks, systems, users, and applications. This role will involve coordination and communication with technical and nontechnical teams, including security leadership and business stakeholders.
About the Role
Key Responsibilities:
- Security Monitoring and Triage: monitor in real time security controls and consoles from across the Novartis IT ecosystem
- Forensics and Incident Response: support incident response activities including scoping, communication, reporting, and long term remediation planning, conduct initial investigations into security incidents involving a variety of threats
- Communicate with technical and non-technical end users who report suspicious activity, prepare technical reports for business stakeholders and IT leadership
- Gather live evidence from endpoint devices and log sources from a variety of systems and applications
- Big Data analysis and reporting: Utilizing SIEM/Big data to identify abnormal activity and extract meaningful insights; Research, develop, and enhance content within SIEM and other tools
- Technologies and Automation: Interface with engineering teams to design, test, and implement playbooks, orchestration workflows and automations; Research and test new technologies and platforms; develop recommendations and improvement plans
- Day to day: Perform host based analysis, artifact analysis, network packet analysis, and malware analysis in support of security investigations and incident response; Coordinate investigation, containment, and other response activities with business stakeholders and groups; Develop and maintain effective documentation; including response playbooks, processes, and other supporting operational material
- Perform quality assurance review of analyst investigations and work product; develop feedback and development reports; Develop incident analysis and findings reports for management, including gap identification and recommendations for improvement; Recommend or develop new detection logic and tune existing sensors / security controls
- Provide mentoring of junior staff and serve as point of escalation for higher severity incidents
- Work with security solutions owners to assess existing security solutions array ability to detect / mitigate the abovementioned TTPs
Essential Requirements:
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent practical experience.
- 3+ years of experience in cybersecurity, with significant experience in incident response, threat detection, or security operations.
- Strong hands-on experience investigating and responding to security incidents in enterprise environments.
- Deep understanding of attacker techniques across endpoint, identity, network, cloud, and email attack surfaces.
- Experience working in a CSOC, SOC, or incident response function in a large, complex organization.
- Strong knowledge of security operations workflows, alert triage, escalation management, and response coordination.
- Experience with SIEM, EDR/XDR, email security, identity monitoring, case management, and other security operations technologies.
- Ability to analyze logs, alerts, and forensic artifacts to determine scope, impact, and response actions.
- Strong written and verbal communication skills, with the ability to clearly brief both technical teams and senior stakeholders.
- Proven ability to identify operational improvement opportunities and drive meaningful enhancements without direct people management responsibility.
Desirable Requirements:
- Scripting experience with Python, PowerShell, Bash, or similar languages
- Experience with malware analysis or basic reverse
Commitment to Diversity & Inclusion:
We are committed to building an outstanding, inclusive work environment and diverse teams representative of the patients and communities we serve.
Why Novartis?
Our purpose is to reimagine medicine to improve and extend people’s lives and our vision is to become the most valued and trusted medicines company in the world. How can we achieve this? With our people. It is our associates that drive us each day to reach our ambitions. Be a part of this mission and join us! Learn more here: https://www.novartis.com/about/strategy/people-and-culture
Join our Novartis Network: If this role is not suitable to your experience or career goals but you wish to stay connected to learn more about Novartis and our career opportunities, join the Novartis Network here: https://talentnetwork.novartis.com/network
Why Novartis: Helping people with disease and their families takes more than innovative science. It takes a community of smart, passionate people like you. Collaborating, supporting and inspiring each other. Combining to achieve breakthroughs that change patients’ lives. Ready to create a brighter future together? https://www.novartis.com/about/strategy/people-and-culture
Benefits and Rewards: Learn about all the ways we’ll help you thrive personally and professionally.
Read our handbook (PDF 30 MB)