cover
Full Time

Senior Manager Threat Detection & Response/ 1 week ago

Application ends: 2026-03-22

Quick Summary

Lead global cybersecurity incident response and threat detection efforts, commanding technical teams through validation, containment, and recovery. This people-leader role requires deep expertise in digital forensics, SIEM tools like Splunk or Sentinel, and programming in Python, PHP, or JavaScript. Candidates must be familiar with AI/ML-based threat detection and cyber defense frameworks such as NIST or ISO to drive strategic security initiatives.

At Johnson & Johnson, we believe health is everything. Our strength in healthcare innovation empowers us to build a world where complex diseases are prevented, treated, and cured, where treatments are smarter and less invasive, and solutions are personal. Through our expertise in Innovative Medicine and MedTech, we are uniquely positioned to innovate across the full spectrum of healthcare solutions today to deliver the breakthroughs of tomorrow, and profoundly impact health for humanity. Learn more at jnj.com.

As guided by Our Credo, Johnson & Johnson is responsible to our employees who work with us throughout the world. We provide an inclusive work environment where each person is considered as an individual. At Johnson & Johnson, we respect the diversity and dignity of our employees and recognize their merit.

Job Function: Technology Enterprise Strategy & Security

Job Sub Function: Security & Controls

Job Category: People Leader

All Job Posting Locations: Warsaw, Masovian, Poland

Job Description

We are seeking a dynamic and experienced Senior Manager of Threat Detection & Incident Response to join our global efforts in enhancing our cybersecurity posture through innovative services and technology solutions. The ideal candidate will possess a deep understanding of cybersecurity principles, extensive experience in cyber defense technologies, and the ability to drive strategic initiatives in a fast-paced environment. The primary responsibility is to investigate and respond to business impacting IT Security incidents; ensuring timely and accurate incident validation, containment, and recovery.

This role will interface with many stakeholders inside and outside of ISRM to ensure alignment and readiness to respond to IT Security incidents, evaluate tools and procedures, and provide guidance and direction as a top subject matter expert on digital forensics and incident response.

Main Responsibilities

  • Leadership and Strategy: Provide subject matter expertise and participate in performing continuous monitoring of suspicious activity and alerts, triage and diagnosis of threats, and root cause analysis and remediation of incidents. Review and accept escalations for business impacting incidents and command a technical investigation team to respond through containment and recovery.
  • Digital Forensics and Incident Response: Collect and analyze electronic devices, logs, malware, and other digital artifacts in support of security investigations and response.
  • Incident Reporting and Stakeholder Management: Prepare and present regular reports and updates to senior management on the status and impact of incident response efforts.

Other Duties

  • Team Development: Mentor and develop team members, fostering a culture of innovation and continuous improvement.
  • Tool Evaluation and Selection: Evaluate and recommend cybersecurity tools and technologies that enhance response capabilities.
  • Risk Management: Identify potential risks and vulnerabilities in systems and processes and coordinate mitigation of them.
  • Threat Intelligence and Analysis: Utilize threat intelligence to inform response efforts and to bolster proactive defense measures.
  • Metrics: Establish key performance indicators (KPIs) to measure the effectiveness of incident response services and initiatives.

Key Skills and Knowledge

  • Digital forensics tools and techniques
  • Incident response including major incident response leadership
  • Technical writing and communication
  • Cyber defense frameworks (NIST, ISO, CIS)
  • SIEM tools (Splunk, Sentinel)
  • Programming or scripting (PHP, Python, Javascript) including experience with automation platforms, SOAR, and data enrichment pipelines
  • Familiarity with Artificial Intelligence and ML‑based threat detection and automation tools and how to govern their use in a SOC/TDR context
  • Understanding of ML model behavior, false‑positive reduction, and ethical governance
  • Data interpretation and feature‑analysis capabilities for threat‑analytics models

Required Skills

Preferred Skills

  • Business Process Design
  • Collaborating
  • Crisis Management
  • Critical Thinking
  • Cyber Threat Intelligence
  • Developing Others
  • Inclusive Leadership
  • Information Security Auditing
  • Information Security Management System (ISMS)
  • Information Technology (IT) Security Assessments
  • Information Technology Strategies
  • Leadership
  • Managing Managers
  • People Performance Management
  • Presentation Design
  • Process Optimization
  • Security Architecture Design
  • Security Policies

Share

Johnson & Johnson

Johnson & Johnson

  • Address
    Raritan, New Jersey
View Profile
Your experience on this site will be improved by allowing cookies Cookie Policy