Sr. Specialist SOC Engineer at Novartis responsible for designing and implementing security measures. Collaborate with teams to identify risks and enhance detection strategies in cybersecurity operations.
Responsibilities
Evaluate and onboard new data sources, performing data analysis for identifying anomalies and trends, and developing dashboards and visualizations for data reporting; troubleshoot and provide support for onboarding issues with platforms like Sentinel, and Cribl
Collaborate with CSOC engineers, Threat Hunters, and CSOC Analysts to gather requirements and develop solutions, working with cross-functional teams to understand risks and develop effective detection strategies that align with organizational security goals
Validate and ensure proper configuration and implementation of new logics with security system and application owners; perform data normalization, establish datasets, and develop data models; Manage backlog of customer requests for onboarding new data sources
Detect and resolve issues in various data sources, implementing health monitoring for data sources and feeds
Provide 24x7 on-call support on a rotational basis, including weekends, to ensure system stability and incident response readiness
Design and create security detection rules, alerts, and Use Cases utilizing platforms such as SIEM, DLP, EDR, and WAF
Develop robust detection mechanisms to identify and respond to potential security threats across various security technologies
Regularly review and enhance existing detection rules and Use Cases to ensure their effectiveness and alignment with emerging threats and vulnerabilities
Requirements
University working and thinking level, degree in business/technical/scientific area or comparable education/experience
3-5 years experience in the field, with good general security knowledge
Strong expertise in Sentinel and Direct experience managing Data ingestion pipeline through Cribl
Hands on experience and knowledge of security tools (DLP, XDR, SIEM, Firewalls) and experience in Security Engineering tasks such as SIEM alert creation, SOAR playbook development
Experience in IT administration with broad and in-depth technical, analytical and conceptual skills, and exceptional understanding and knowledge of general IT infrastructure technology and systems
Experience in configuring Data collection Endpoints, connectors and parsers
Good knowledge of collectors/forwarder components, integrating Security tools using API, syslog, cloud etc
Experience in scripting and Automation for Security tools, with development experience in Python (SDKs)
Excellent communication and collaborative skills cross functionally and in global teams, with good experience in reporting to and communicating with senior level management (with and without IT background, with and without in-depth risk management background) on incident response topics.
Benefits
Monthly pension contribution matching your individual contribution up to 3% of your gross monthly base salary
Risk Life Insurance (full cost covered by Novartis)
5-week holiday per year (1 week above the Labour Law requirement)
4 paid sick days within one calendar year in case of absence due to sickness without a medical sickness report
Cafeteria employee benefit program – choice of benefits from Benefit Plus Cafeteria in the amount of 12,500 CZK per year
Meal vouchers in amount of 105 CZK for each working day (full tax covered by company)
Director leading security operations strategy and overseeing investigations at Ford Motor Company. Responsible for global investigations, crisis management, and team leadership.
Lead global Cyber Detect and Respond team at Assa Abloy, ensuring timely incident response and security compliance. Oversee operations while collaborating across IT and business functions for effective threat management.
Lead Cybersecurity Analyst responsible for technical leadership of a 24x7 SOC team at AT&T. Drive operational standards, incident response, and continuous improvement initiatives.
Senior Security Operations Center Analyst protecting computer systems and data through investigation and incident response. Collaborating with IT leaders and mentoring junior analysts in security operations.
Security Operations Engineer creating automations and detection strategies for security infrastructure. Collaborating across teams to enhance security measures and protect organizational assets.
Solution Sales Manager driving revenue growth in Austria and Switzerland's financial sector. Collaborating with teams and managing sales cycles for ServiceNow and Tanium - related services.
Lead SOC Analyst responsible for monitoring and controlling OCLC services. Providing leadership and mentorship while ensuring service delivery and incident management in a hybrid work environment.
Technical Writer supporting Cyber Security Operations Center, documenting processes and workflows for incident response. Collaborating with analysts and engineering teams to create actionable documentation.