Sr. Specialist SOC Engineer at Novartis responsible for designing and implementing security measures. Collaborate with teams to identify risks and enhance detection strategies in cybersecurity operations.
Responsibilities
Evaluate and onboard new data sources, performing data analysis for identifying anomalies and trends, and developing dashboards and visualizations for data reporting; troubleshoot and provide support for onboarding issues with platforms like Sentinel, and Cribl
Collaborate with CSOC engineers, Threat Hunters, and CSOC Analysts to gather requirements and develop solutions, working with cross-functional teams to understand risks and develop effective detection strategies that align with organizational security goals
Validate and ensure proper configuration and implementation of new logics with security system and application owners; perform data normalization, establish datasets, and develop data models; Manage backlog of customer requests for onboarding new data sources
Detect and resolve issues in various data sources, implementing health monitoring for data sources and feeds
Provide 24x7 on-call support on a rotational basis, including weekends, to ensure system stability and incident response readiness
Design and create security detection rules, alerts, and Use Cases utilizing platforms such as SIEM, DLP, EDR, and WAF
Develop robust detection mechanisms to identify and respond to potential security threats across various security technologies
Regularly review and enhance existing detection rules and Use Cases to ensure their effectiveness and alignment with emerging threats and vulnerabilities
Requirements
University working and thinking level, degree in business/technical/scientific area or comparable education/experience
3-5 years experience in the field, with good general security knowledge
Strong expertise in Sentinel and Direct experience managing Data ingestion pipeline through Cribl
Hands on experience and knowledge of security tools (DLP, XDR, SIEM, Firewalls) and experience in Security Engineering tasks such as SIEM alert creation, SOAR playbook development
Experience in IT administration with broad and in-depth technical, analytical and conceptual skills, and exceptional understanding and knowledge of general IT infrastructure technology and systems
Experience in configuring Data collection Endpoints, connectors and parsers
Good knowledge of collectors/forwarder components, integrating Security tools using API, syslog, cloud etc
Experience in scripting and Automation for Security tools, with development experience in Python (SDKs)
Excellent communication and collaborative skills cross functionally and in global teams, with good experience in reporting to and communicating with senior level management (with and without IT background, with and without in-depth risk management background) on incident response topics.
Benefits
Monthly pension contribution matching your individual contribution up to 3% of your gross monthly base salary
Risk Life Insurance (full cost covered by Novartis)
5-week holiday per year (1 week above the Labour Law requirement)
4 paid sick days within one calendar year in case of absence due to sickness without a medical sickness report
Cafeteria employee benefit program – choice of benefits from Benefit Plus Cafeteria in the amount of 12,500 CZK per year
Meal vouchers in amount of 105 CZK for each working day (full tax covered by company)
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.
Senior Manager leading global IT security operations to protect company data and assets at Keenova. Overseeing incident response, monitoring, and cybersecurity capabilities with strategic oversight.
Security Operations Center leader at Woven by Toyota, managing triage and response to security alerts in Japan. Collaborating with global SOCs to ensure 24/7 operations.
GSOC Analyst responsible for security operations at Paramount Studios. Developing workflows, incident response, and risk monitoring in a dynamic team environment.
Security Operations Analyst at Orion Health focusing on monitoring and maintaining security tools while collaborating with teams. Engaging with real - world threats and enhancing operational security processes.