.Novartis Working together, we can reimagine medicine to improve and extend people's lives.Location: Prague, Czech Republic; Barcelona, Spain The Detection and Response Associate Director will be an integral part of the Novartis Cyber Security Operations Center (CSOC). The Novartis CSOC is an advanced security team that has reinvented Security Operations. It is comprised of a global team passionate about defending Novartis against modern and sophisticated IT security threats and attacks. The Detection and Response Associate Director will leverage a variety of tools and resources to detect, investigate, and mitigate threats impacting Novartis' networks, systems, users, and applications. This role will involve coordination and communication with technical and nontechnical teams, including security leadership and business stakeholders. This is a position intended for an experienced professional, and will challenge and grow their technical investigation, IT security, and leadership skillsets. Your key responsibilities: Technical Team Manager: Supervise and manage a team of diverse skillsets and personalities, evaluate and review performance, provide coaching and mentoring; develop and track career improvement goals; instill and maintain cohesiveness and positive working culture, be accountable for regional delivery around monitoring and incident response. Security Monitoring and Triage: Monitor in real time security controls and consoles from across the Novartis IT ecosystem, and communicate with technical and non-technical end users who report suspicious activity. Forensics and Incident Response: Serve as escalation point for conducting investigations into security incidents involving advanced and sophisticated threat actors and TTPs; perform forensic collection and analysis of electronic assets and devices, scripts and malicious software, and log sources from a variety of systems and applications; manage incident response activities including scoping, communication, reporting, and long term remediation planning. Big Data analysis and reporting: Utilizing SIEM /Big data to identify abnormal activity and extract meaningful insights; research, develop, and enhance content within SIEM and other tools. Technologies and Automation: Interface with engineering teams to design, test, and implement playbooks, orchestration workflows and automations; research and test new technologies and platforms; develop recommendationsand improvement plans