Novartis Working together, we can reimagine medicine to improve and extend peoples lives. Location: Prague, Czech Republic; Barcelona, Spain The Detection and Response Associate Director will be an integral part of the Novartis Cyber Security Operations Center (CSOC). The Novartis CSOC is an advanced security team that has reinvented Security Operations. It is comprised of a global team passionate about defending Novartis against modern and sophisticated IT security threats and attacks. The Detection and Response Associate Director will leverage a variety of tools and resources to detect, investigate, and mitigate threats impacting Novartis networks, systems, users, and applications. This role will involve coordination and communication with technical and nontechnical teams, including security leadership and business stakeholders. This is a position intended for an experienced professional, and will challenge and grow their technical investigation, IT security, and leadership skillsets. Your key responsibilities: Technical Team Manager: Supervise and manage a team of diverse skillsets and personalities, evaluate and review performance, provide coaching and mentoring; develop and track career improvement goals; instill and maintain cohesiveness and positive working culture, be accountable for regional delivery around monitoring and incident response. Security Monitoring and Triage: Monitor in real time security controls and consoles from across the Novartis IT ecosystem, and communicate with technical and non technical end users who report suspicious activity. Forensics and Incident Response: Serve as escalation point for conducting investigations into security incidents involving advanced and sophisticated threat actors and TTPs; perform forensic collection and analysis of electronic assets and devices, scripts and malicious software, and log sources from a variety of systems and applications; manage incident response activities including scoping, communication, reporting, and long term remediation planning. Big Data analysis and reporting: Utilizing SIEM /Big data to identify abnormal activity and extract meaningful insights; research, develop, and enhance content within SIEM and other tools. Technologies and Automation: Interface with engineering teams to design, test, and implement playbooks, orchestration workflows and automations; research and test new technologies and platforms; develop recommendations and improvement plans. Day to day: Perform host based analysis, artifact analysis, network packet analysis, and malware analysis in support of security investigations and incident response; coordinate investigation, containment, and other response activities with business stakeholders and groups; develop and maintain effective documentation; including response playbooks, processes, and other supporting operational material; perform quality assurance review of analyst investigations and work product; develop feedback and development reports;