Director Threat Hunting And Response

Year    Hyderabad, Telangana, India

Job Description



15 Petabyte of data hosted, 49 countries supported, 15000 servers and thousands of devices to connect locations and businesses.

Information is clearly one of Novartis` most valuable asset. In ISRM (Information Security and Risk Management), we implement and maintain solutions that secure the Novartis environment, protect our data and provide the necessary control framework to enable compliance with the various regulations associated with the healthcare industry.

The Director Threat Hunting and Response will be an integral part of the Novartis Cyber Security Operations Center (CSOC). The CSOC is an advanced global team passionate about the active defense against the most sophisticated cyber threats and attacks. The Director Threat Hunting and Response will use a variety of tools and resources to proactively detect, investigate, and mitigate emerging and persistent threats impacting Novartis' networks, systems, users, and applications. This role will involve coordination and communication with technical and nontechnical teams, including security leadership and business stakeholders. As an experienced skilled analyst, the role will also involve supervising, coaching, and mentoring a team of junior and senior analysts.

Your responsibilities include, but are not limited to:

TECHNICAL TEAM MANAGER:

  • Supervise and handle a team of diverse skillsets and personalities
  • Evaluate and review performance; provide coaching and mentoring; develop and track career improvement goals
  • Instill and maintain cohesiveness and positive working culture
  • Accountable for regional delivery around incident response and hunting team activities
FORENSICS AND INCIDENT RESPONSE:
  • Serve as escalation point for conducting investigations into security incidents involving advanced and sophisticated threat actors and TTPs
  • Perform forensic collection and analysis of electronic assets and devices, scripts and malicious software, and log sources from a variety of systems and applications
  • Manage incident response activities including scoping, communication, reporting, and long term remediation planning
THREAT HUNTING:
  • Review incident and intelligence reports from a variety of internal and external sources and teams
  • Develop hypotheses, analyze techniques, and implement hunts to identify threats across the environment
  • Collaborate with security teams and business stakeholders to implement countermeasures and improve defenses
BIG DATA ANALYSIS AND REPORTING:
  • Using SIEM/Big data to identify abnormal activity and extract meaningful insights.
  • Research, develop, and enhance content within SIEM and other tools
TECHNOLOGIES AND AUTOMATION:
  • Work with engineering teams to design, test, and implement playbooks, orchestration workflows and automations
  • Research and test new technologies and platforms; develop recommendations and improvement plans
DAY TO DAY:
  • Perform host based analysis, artifact analysis, network packet analysis, and malware analysis in support of security investigations and incident response
  • Coordinate investigation, containment, and other response activities with business stakeholders and groups
  • Develop and maintain effective documentation; including response playbooks, processes, and other supporting operational material
  • Perform quality assurance review of analyst investigations and work product; develop feedback and development reports
  • Provide mentoring of junior staff and serve as point of escalation for higher severity incidents
  • Develop incident analysis and findings reports for management, including gap identification and recommendations for improvement
  • Recommend or develop new detection logic and tune existing sensors / security controls
  • Work with security solutions owners to assess existing security solutions array ability to detect / mitigate the abovementioned TTPs
  • Creating custom SIEM queries and dashboards to support the monitoring and detection of advanced TTPs against Novartis network.
Minimum requirements

What you'll bring to the role:
  • University working and thinking level, degree in business/technical/scientific area or comparable education/experience with 8+ years of experience in Incident Response / Computer Forensics / CSOC team / Threat Hunting or related fields.
  • Good knowledge of IT Security Project Management with experience in security incident monitoring and response related to medical devices
  • Knowledge of (information) risk management related standards or frameworks such as COSO, ISO 2700x, CobiT, ISO 24762, BS 25999, NIST, ISF Standard of good practice and ITIL
  • Knowledge of security frameworks such as Hitrust. Host and network based forensic collection and analysis
  • Dynamic malware analysis, reverse engineering, and/or scripting abilities
  • Proficient with Encase, Responder, X-Ways, Volatility, FTK, Axiom, Splunk, Wireshark, and other forensic tools with understanding of Advanced Persistent Threat (APT) and associated tactics.
  • Excellent understanding of general IT infrastructure technology and systems with proven experience to initiate and manage projects that will affect CSOC services and technologies
  • Good understanding and knowledge of business processes in a global pharmaceutical industry.
Why consider Novartis?
766 million lives were touched by Novartis medicines in 2021, and while we're proud of this, we know there is so much more we could do to help improve and extend people's lives.

We believe new insights, perspectives and ground-breaking solutions can be found at the intersection of medical science and digital innovation. That a diverse, equitable and inclusive environment inspires new ways of working.

We believe our potential can thrive and grow in an unbossed culture underpinned by integrity, curiosity and flexibility. And we can reinvent what's possible, when we collaborate with courage to aggressively and ambitiously tackle the world's toughest medical challenges. Because the greatest risk in life, is the risk of never trying!

Imagine what you could do here at Novartis!

Join our Novartis Network:
If this role is not suitable to your experience or career goals but you wish to stay connected to hear more about Novartis and our career opportunities, join the Novartis Network here: https://talentnetwork.novartis.com/network

Functional Area

Technology Transformation

Division

CTS

Business Unit

TT CTS

Employment Type

Regular

Commitment to Diversity & Inclusion:

Novartis is committed to building an outstanding, inclusive work environment and diverse teams representative of the patients and communities we serve.

Shift Work

No

Early Talent

No

Beware of fraud agents! do not pay money to get a job

MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Job Detail

  • Job Id
    JD2962101
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Permanent
  • Job Location
    Hyderabad, Telangana, India
  • Education
    Not mentioned
  • Experience
    Year