40 Cybersecurity Consultant jobs in Ireland
Networking and Cybersecurity Consultant
Posted today
Job Viewed
Job Description
Role:
ICT Technical Resource – Networking and Cybersecurity
Location: Dublin 4, (Remote working may be agreed for part of the engagement, subject to operational requirements)
Contract / Permanent: 6 Months, with further extension.
Start date: January 2026
Experience Level Required:
- It is a mandatory requirement that the Resource proposed has the equivalent of Grade 2 Intermediate Resource.
- It is a mandatory requirement that the Resource proposed hold the following qualifications or equivalents:
o Have a degree equivalent to level 8 or higher on the National Framework of Qualifications in a relevant discipline, as may be considered appropriate in the discretion ofthe Client.
Key Deliverable:
The following non-exhaustive list of Key Deliverables are applicable to this Role.
- Current Network Assessment: Topology diagrams, IP/VLAN schema, device inventory, and configuration baseline with risk-ranked findings.
- Risk & Gap Analysis: Network-centric security risks and gaps vs best practice; prioritised remediation items.
- Best-Practice Standards: Firewall, switching, WLAN, NAC configuration standards; naming/IPAM standards; change-control templates.
- Standardisation Pack: Repeatable templates (e.g., switch port profiles, firewall rule taxonomy), golden configs, and as-built documentation.
- Remediation Plan: Sequenced plan with timelines, dependencies, and required maintenance windows.
- Playbooks & Runbooks: Incident response for network threats; routine operations (backup/restore, change, DR failover tests).
- Monitoring & Logging Plan: Telemetry sources, thresholds, log routing/retention, and health dashboards.
- Weekly Status Reports: Progress, risks/issues, metrics, and next steps.
- Cloud Readiness Assessment: Inventory of infrastructure, dependencies, compliance, risks, and workload readiness scoring.
- Digital strategy enablement: Contribute to the CLIENT's digital transformation by ensuring network and security practices extend seamlessly to SaaS, IaaS, and PaaS environments, enabling scalable, cloud-first services.
Key Experience/Competencies/Skillsets:
The following Experience/Competencies/Skillsets apply to this Role.
The Client IT Department is looking for a dedicated resource with strong network cybersecurity and networking skills. The emphasis is on protecting and operating the network (WAN/LAN/WLAN and perimeter). Specifically focusing on the following:
1. Core Network Design & Operations (WAN / LAN / WLAN)
- Strong experience with Cisco (IOS/NX-OS) and Meraki; strong CLI skills and template-driven configs.
- Familiarity with core routing and switching protocols (e.g., OSPF, BGP, STP, VLANs, EtherChannel, QoS) and scalable enterprise design principles.
- Experience designing and operating wireless networks, including capacity planning, authentication, and guest access controls (e.g., WPA2/WPA3-Enterprise with RADIUS).
- Provider interaction & WAN management (e.g., Virgin Media): SLAs, QoS, failover behaviour, performance troubleshooting.
- Understanding of IP addressing, subnetting, and integration of core IP services (DNS, DHCP, IPAM).
2. Perimeter & Edge Security (Firewalls, VPN, DDoS)
- Strong knowledge of next-generation firewalls administration (e.g., Cisco & Palo Alto) and security policy lifecycle (design, hygiene, review).
- Experience with high-availability firewall designs, upgrade strategies, and deterministic failover for predictable resilience.
- Proficiency with remote access and site-to-site VPNs using robust authentication (RADIUS/Entra ID), posture checks, and split-tunnel design.
- Competence in secure service publication, minimal/auditable exceptions, egress controls, and GEO / IP reputation use.
- Awareness of DDoS exposure and layered mitigations across provider, edge, and on-premise controls.
3. Secure Architecture & Network Segmentation
- Ability to design outcome-driven segmentation aligned to Zero-Trust principles (VLANs, ACLs, firewalled inter-segment flows).
- Experience implementing Layer-2 protections (e.g., DHCP snooping, Dynamic ARP Inspection, IP source guard, port security).
- Clean IP plan and deterministic routing between segments policy enforcement tied to identity and roles.
- Safe patterns for guest/BYOD and third-party connectivity with appropriate isolation and controls.
- Ability to review current design architectures, articulate risks/trade-offs, and recommend pragmatic improvements.
4. Configuration Management & System Hardening
- Experienced in maintaining network equipment, servers, and Dell SAN infrastructure, ensuring secure configuration, consistent baselines, and optimal performance across environments.
- Skilled in virtual machine lifecycle management, provisioning, tuning, and securing guest/host systems within VMware and Hyper-V platforms.
- Implemented standardised configuration management practices, including RBAC enforcement, encrypted management access (SSH/TLS), automated configuration backups, and drift detection across infrastructure layers.
- Proficient in implementing configuration validation and version control, ensuring traceability, compliance, and rapid recovery from misconfiguration without service disruption.
5. Monitoring, Telemetry & Incident Response (SOC/SIEM & Threat Intel)
- Proven experience in real-time security monitoring and incident response within SOC/SIEM environments, including alert triage, correlation, enrichment, and continuous rule tuning.
- Skilled in investigating security incidents using logs, network telemetry, and packet captures to identify root causes, scope impact, and execute effective containment and remediation.
- Strong understanding of network observability sources (NetFlow/sFlow, syslog, SNMP, SPAN/ERSPAN) and their role in threat detection and investigations.
- Proficient in threat intelligence integration (STIX/TAXII, vendor feeds) and transforming intelligence into actionable detections and control improvements.
- Experienced in developing and maintaining incident response playbooks, managing evidence, and conducting post-incident reviews to enhance detection and response maturity.
6. Vulnerability, Patch & Platform Lifecycle Management
- Strong experience in vulnerability assessment and remediation, performing regular scans of network, server, and application layers with CVSS- and risk-based prioritisation.
- Experienced in coordinating and tracking patch compliance across firewalls, routers, switches, servers, and virtual environments, ensuring timely updates and controlled rollout of changes.
- Skilled in hardware and software lifecycle governance, maintaining EOS/EOL visibility, upgrade scheduling, and clear communication of operational risk to support replacement planning.
- Proficient in applying secure configuration benchmarks (vendor/CIS) and tracking variance to maintain compliance and reduce attack surface.
- Experienced in exception and risk acceptance management, documenting compensating controls and defined remediation timelines to uphold governance integrity.
7. Resilience, Backup & Disaster Recovery Readiness
· Strong knowledge and practical experience in designing resilient network and system architectures, implementing HSRP/VRRP, ECMP, dual-homing, and redundant wireless designs for high availability.
· Experienced in failover and recovery validation, conducting scheduled failover/failback testing, verifying expected behaviours, and documenting outcomes for operational assurance.
· Skilled in backup and recovery integration, aligning network paths, authentication, and topology awareness to ensure backup reliability across servers, applications, and databases.
· Experienced in cyber-resilient backup strategies, maintaining immutable and off-site copies, secure "break-glass" access, and minimal viable connectivity for disaster recovery and incident response.
8. Cloud Foundations & Hybrid Connectivity (Azure)
- Experienced in designing and establishing foundational Azure environments, including initial network design, identity integration, and governance setup for secure cloud adoption.
- Strong knowledge of Azure networking components such as VNets, subnets, NSGs/ASGs, Azure Firewall, and Virtual WAN (vWAN), and Private DNS/Private Link for building resilient and secure connectivity frameworks.
- Skilled in designing and implementing hybrid connectivity, including IPSec VPN and ExpressRoute configurations, BGP routing, and split-horizon DNS for seamless on-premises integration.
- Familiar with cloud governance and cost management practices, incorporating tagging, budgets, and compliance controls within early-stage network and policy designs.
9. Governance, Change Control, Documentation & Risk
- Experienced in establishing and maintaining structured technical governance, ensuring all network, security, and cloud activities align with organisational policies, compliance standards, and risk frameworks.
- Skilled in developing and maintaining comprehensive, version-controlled documentation, including network diagrams, configurations, inventories, and design records that accurately represent live environments.
- Strong background in risk identification and management, maintaining an actionable risk register that prioritises operational and security risks with clear ownership, tracking, and mitigation measures.
- Experienced in disciplined change control, implementing peer-reviewed, auditable change processes with verification, rollback readiness, and full traceability for production modifications.
- Promotes a knowledge-sharing and foster mentoring, cross-team collaboration, and post-incident or post-change reviews to strengthen organisational capability and resilience
.
Senior Cybersecurity Consultant 3
Posted today
Job Viewed
Job Description
Senior Cybersecurity Consultant 3 / Concierge Security Engineer 3 (m/f/d)
Cork, Ireland
About Arctic Wolf:
At Arctic Wolf, we're on a mission to end cyber risk. As a leader in security operations, we're looking for a skilled and motivated Senior Cybersecurity Consultant (m/f/d) to join our team in Germany. This is your chance to make a real impact in the world of cybersecurity.
Your responsibilites:
- Serve as a trusted security advisor for assigned customers, acting as the key technical point of contact
- Manage and clearly explain security incidents identified by our Security Operations Center (SOC)
- Provide timely and effective incident response support during cybersecurity events (no on-call duty)
- Deliver cybersecurity best practices to both technical and non-technical stakeholders
- Troubleshoot security and technical issues across diverse environments.
- Analyze logs and security events to identify patterns, vulnerabilities, and threats
- Lead technical reporting, documentation, and customer-facing security reports
- Create and deliver workshops, guides, and training content to improve customer security posture
- Mentor junior analysts and engineers, sharing both technical and soft skills.
- Support the continuous improvement of Arctic Wolf's Managed Detection and Response (MDR) services
What We're Looking For:
Experience:
- 5+ years of experience in cybersecurity
- 3+ years of experience in systems, network, or cloud administration
- Proven track record in IT networking, network security, cloud infrastructure, and SaaS tools
- Background in risk and vulnerability management
- Strong written and verbal communication skills in English
- Experience building relationships in a professional, client-facing context
Technical Skills:
- Network Security:
Deep knowledge of network architectures, firewalls, IDS/IPS, and VPN technologies - Operating Systems:
Advanced hardening expertise for Windows, Linux, and Unix environments - Encryption:
Familiarity with encryption protocols and technologies - Penetration Testing:
Ability to assess and interpret penetration test results to guide remediation - Security Tools:
Hands-on with SIEM, SOAR, EDR, UTM, and honeypots. - Cloud Security:
Understanding of cloud platform security measures (AWS, Azure, etc.) - Security Frameworks:
Advanced knowledge of frameworks such as MITRE ATT&CK, NIST, etc.
Consulting Skills:
- Risk Management:
Ability to assess, prioritize, and manage security risks aligned with client needs - Strategic Planning:
Capable of developing and executing end-to-end security strategies - Communication:
Strong ability to convey complex security concepts to non-technical audiences - Problem-Solving:
Analytical mindset with a proactive approach to identifying and resolving issues - Project Management:
Skilled in managing and delivering on technical security projects - Client Relationship Management:
Adept at maintaining long-term client partnerships through trust and value delivery - Training & Mentoring:
Able to educate junior staff and clients on cybersecurity best practices
Ready to Make an Impact?
Apply now with your resume—and if available, your references or work samples. Join one of the fastest-growing and most innovative cybersecurity companies in the world.
Senior Information Risk Consultant- Cybersecurity Assurance
Posted today
Job Viewed
Job Description
Job Title: Senior Information Risk Consultant -Cybersecurity Assurance
Location: Ireland/Remote
Job Type: Contract-US Shift
Client Overview:
Our client is a major financial agency of the United Nations, and an international financial institution funded by 191 member countries, with headquarters in Washington, D.C
Overview:
The Senior Information Risk Consultant (Cybersecurity Assurance) will provide expertise with definition, design, engineering, and validation of security configuration of technology platforms in the cloud and on-premises.
The candidate will be required to work with project teams, service providers, and business units internal and external to the Fund's IT function. The candidate is expected to bring pragmatic cloud security and risk management experience allowing for the Fund to meet its present and emergent business needs. The candidate is expected to advise and influence technology and business personnel regarding the value and methods of safeguarding information, applications, systems, infrastructure, and activities to help ensure that technologies function optimally; work practices are optimized so that the information risks are managed.
Responsibilities
1.Senior individual contributor to provide cybersecurity assurance expertise for a broad range of IT initiatives. This includes but is not limited to defining, guiding the engineering and validating implementation of technology agnostic security control standards, technology-specific configuration baselines and implementation guidelines for technology platforms (both cloud and on-prem) and services.
2.Maintain impartiality around IT systems to produce unbiased reports on information security risk.
3.Conducts quality assurance reviews of security requirements and audit recommendations for the implementation of identified solutions.
4.Effectively communicates requirements and educates stakeholders in IT divisions on appropriate security design and technical configuration of related controls on IT platforms throughout their lifecycle.
5.Works closely with IT project teams to develop implementation plans for new security-related products and services.
6.As an advocate of information security, works closely and proactively with IT stakeholders, service providers, and business units to provide security-related technical solutions. Identifies opportunities to improve business practices or IT security-related processes.
7.Prioritizes, monitors, and assesses compliance and audit recommendation results to ensure they are comprehensive, robust, and of high quality.
8.Support the information security assurance manager in maintaining the Fund's ISO 27001 certification by promoting self-compliance to policies and standards by IT staff and managers. 9.Keeps abreast of international information security codes of practice such as ISO 27001/27002, information security and privacy regulations and how these measures could affect information assets owned by, or administered.
10.Analyzes, recommends, and implements process improvements within the context of information security.
Experience:
1.Prior work in a technical security assurance/engineering function at organizations with security related regulatory requirements.
2.Technical security working experience with a broad range of Azure services.
3.Advanced working knowledge of:
a) Azure Cloud and Microsoft 365 security controls, solutions, and future roadmaps.
b) Microsoft Entra, Azure Key Vault, Microsoft Defender for Cloud/O365, Azure monitor, Azure API Management, Azure Network Security, Azure Policy, Microsoft Defender External Attack Surface Management and Azure Kubernetes Service.
c)Security configuration of Microsoft Purview to ensure principle of least privileged for complex use-cases is a significant plus.
4.Demonstrated cybersecurity expertise with infrastructure, applications, and database system technologies.
5.Hands -on security configuration of platforms (cloud and non-cloud).
6.Basic IT consultancy skills. Ability to consult and deliver on the security hardening of application and infrastructure components, including tools, and techniques to ensure the security of application, database, and infrastructure components.
7.Pragmatic security expert with an inherent ability to balance security demands with business reality. Ability to quickly grasp how new technologies work and how security controls should be applied to achieve business goals.
8.Knowledge of security solutions, latest threats, and countermeasures.
Required Soft Skills:
1. Analytical skills that enable synthesis of inputs from many sources and allow for strategic thinking and tactical implementation.
2.Spoken and written communications that are compelling, convincing, and reassuring, and skills to articulate complex technical ideas to non-technical stakeholders.
- Ability to think laterally and to have input to / propose detailed, complex solutions to technical issues.
4.Interpersonal skills that create openness and trust among colleagues.
5.Ability to work well under pressure and to meet tight deadlines. Demonstrates a high level of motivation, confidence, integrity, and responsibility.
6.Ability to be organized, responsive and to be able to effectively multi-task with a focus on driving results.
7.Demonstrate excellent interpersonal and relationship management skills. This includes the ability to work independently, effectively in a team/task force as a team member or leader, and with senior staff and managers.
Ability to work well under pressure and to meet tight deadlines, whilst demonstrating a high level of motivation, confidence, integrity, and responsibility.
Excellent relationship management skills. Facilitation and conflict management skills that enable effective working relationships.
Education:
1.Bachelor's degree in information security, computer science, engineering, mathematics, business, or related field of study plus a minimum of 12 years of relevant experience in regulated industries working as an information risk manager or IT security architect; OR
- Advanced degree in Information Security, computer science, engineering, mathematics, business, or related field of study plus a minimum of 6 years of relevant experience in regulated industries working as an information risk manager or IT security architect.
Certifications: (Minimum plus at least 2 preferred)
1.CISSP or CISM (minimum required)
2.CCSP (preferred)
3.Microsoft Certified: Cybersecurity Architect Expert (preferred)
4.Microsoft Certified: Azure Solutions Architect Expert (preferred)
5.Other Microsoft cloud security related certifications at the Expert level (preferred)
6.GIAC certifications (preferred)
7.Offensive security related certifications (preferred)
If you are interested in this role or would like to discuss further, please call Nidhi on or email
Candidate must have valid visa to work in Ireland (Stamp 1G/Stamp 4/EU Passport)
Information Security Officer
Posted today
Job Viewed
Job Description
The Information Security Officer will play a key role in promoting cybersecurity best practices and ensuring regulatory compliance across two closely aligned business units. The position focuses on IT risk management, policy alignment, security operations, and user access governance, helping to protect systems, data, and users while enhancing the overall security posture. This is a mid level role.
Key Responsibilities:
IT Risk Management
- Identify, assess, document, and treat IT risks across systems, infrastructure, and processes.
- Maintain and update risk registers and Level 1 controls.
- Lead risk assessments, remediation efforts, and control improvement.
Policy & Compliance
- Ensure alignment with global and regulatory security standards (ISO 27001, NIST, GDPR).
- Enforce IT security policies and support audit and compliance readiness.
Security Operations
- Respond to and manage IT security incidents and escalations.
- Oversee identity and access management, including privileged access and user reviews.
- Deliver organisation-wide security awareness training.
Reporting & Governance
- Produce dashboards and reports detailing risk exposure and control effectiveness.
- Provide regular updates to management and leadership.
Candidate Profile:
Experience:
- Minimum 3 years in IT risk management, cybersecurity, or compliance.
- Proven ability to work across multiple teams or business units.
Skills:
- Familiar with security frameworks (ISO 27001, NIST), IT general controls, and GDPR.
- Strong analytical, organisational, and communication skills.
- Ability to explain technical risks in simple, business-focused terms.
Qualifications (Desirable):
- Degree in IT, Cybersecurity, or a related field.
- Security certifications such as ISO 27001, CISM, or CompTIA Security+.
What the Role Offers:
- Flexible working and a balanced work environment.
- Ongoing training and professional development support.
- Competitive salary with performance-based bonus.
- Strong internal culture focused on innovation, learning, and collaboration
Information Security Specialist
Posted today
Job Viewed
Job Description
Our client is looking for a
Cloud and Compliance Specialist
to join their team in Dublin for an 11 month hybrid position (3 days on site, 2 days remote)
Responsibilities:
- Support significant programs of work across various levels of XFNs in Cloud Security and Cloud GRC areas.
- Collaborate with team members and stakeholders to understand or identify defined work problems and program goals, obtain prioritized deliverables, and discuss program impact.
- Designing, implementing, and/or assessing security controls and frameworks
- Implement maturity frameworks across multiple programs factoring in emerging regulations and proactive detection of risks.
- Assess and document emerging regulatory impact on established policy and control frameworks
- Identify, communicate, and collaborate with relevant stakeholders within one or more teams to drive impact and work toward mutual goals.
- Establish learnings, best practices, standardized frameworks and tools across GRC and related teams.
- Develop detailed program/project plans in partnership with XFN teams.
- EU Security Office - Document compliance positions for NIS 2 and RED, support SRA delivery
- Cloud Security GRC - Conduct deep-dives into Cloud environments; document GRC-driven positions, and look for opportunities to improve Cloud Security Posture
Requirements:
- At least 5-7 years in Information Security.
- Deep and demonstrable familiarity with key Cloud Security, Risk Management and Compliance concepts Several years
- (5+) of hands-on security experience with at least one of the major CSPs (AWS, GCP, Azure)
- Experience in a GRC function overseeing Cloud implementations at scale
- Experience in designing and implementing control frameworks
- Experience in assessing security deficiencies in information systems and recommending mitigating controls in a corporate environment
Benefits:
- Competitive salary
- Healthcare contribution and inclusion in company pension scheme
- Work laptop and phone
- 25 days annual leave (pro-rata) plus paid bank holidays
- Expanding workforce with potential for career progression for top performers
Information Security Analyst
Posted today
Job Viewed
Job Description
Information Security (InfoSec) Analyst
12 month fixed term ( very likely to go longer)
Location:
Dublin West - 3 Days on site, Dublin West outside of the M50
Eligibility:
Open to candidates who do
not
require visa sponsorship
Stamp 1G (Spouse), Stamp 1G (Graduate, 12+ months remaining), Stamp 4 or EU passport holders.
We're looking for an Information Security Analyst to join a growing Cyber Security team, playing a key role in strengthening the organisation's security posture.
This role focuses on risk management, compliance, documentation and preparation for the upcoming NIS2 Directive.
Reporting into a Senior Information Security Manager, you'll help ensure the confidentiality, integrity and availability of data across a complex vendor ecosystem.
It's a hands-on governance and assurance role with a strong focus on vendor compliance, policy development and the continuous improvement of security controls and practices.
About You
- Previous experience in Information Security, Risk Management or Compliance.
- Previous experience vendor risk and third-party compliance.
- Excellent communication and stakeholder management skills.
- Knowledge of GDPR, ISO/IEC 27001 or NIS2 requirements. (Not a major thing if you don't)
- (Bonus) Certifications such as CISSP, CISM, or ISO 27001 Lead Implementer.
Key Responsibilities
- Support audits, assurance activities and evidence collection for compliance frameworks.
- Conduct and maintain risk assessments to identify and address threats and vulnerabilities.
- Collaborate across Legal, Compliance and IT to embed effective security governance.
- Foster a strong security and compliance culture across the organisation and partner network.
- Monitor and improve third-party/vendor compliance obligations.
This is a great role someone who has wants to grow their experience in security, governance, vendor risk and compliance
Information Security Architect
Posted today
Job Viewed
Job Description
Our Dublin based client is looking for an Information Security Architect to join their team. This role requires technical expertise in security architecture combined with proven consultancy experience. This is a daily rate contract role offering excellent daily rates.
Key Responsibilities:
- Design, document, and maintain enterprise-level security architectures, reference models, and security controls frameworks.
- Align security architecture with business and IT strategies, ensuring consistency across on-premise, cloud, and hybrid environments.
- Act as a trusted advisor to senior stakeholders, translating business needs into secure technology solutions.
- Deliver workshops, assessments, and security briefings to executive and technical audiences.
- Provide independent security consultancy to multiple projects and programmes simultaneously.
- Develop business cases and roadmaps for security improvement initiatives.
- Lead risk assessments, threat modelling, and security gap analyses for projects and existing systems.
- Guide IT and development teams in implementing secure architectures and controls.
- Oversee the selection and deployment of security tools and technologies.
- Support incident response, forensic investigations, and remediation planning when required.
Essential Experience:
- 5+ years of professional experience in Security Architecture.
Educational Requirements:
- Degree in Computer Science, Information Technology, or a related discipline.
Benefits:
- Competitive daily rate.
Be The First To Know
About the latest Cybersecurity consultant Jobs in Ireland !
Information Security Architect
Posted today
Job Viewed
Job Description
Senior Information Security Architect
.
Contract position - Dublin
Realtime are looking for a
Senior Information Security Architect
. You will be responsible for crafting and executing a comprehensive security strategy. You will lead the development of security architecture, policies, and processes, ensuring compliance and addressing emerging threats. Your role will be crucial in minimizing risks and safeguarding the company's operational capabilities and reputation. This is an exciting opportunity to develop and implement security strategies and lead form the front.
Skills & Responsibilities:
- Proven experience in cybersecurity, developing/ implementing security strategies & policies.
- Strong experience implementing Zero trust architecture (ZTA)
- Extensive experience of IT security practices and standards.
- IT security technologies: encryption, authentication, EDR, XDR…
- Experience implementing multi-factor authentication.
- GDPR compliance and security best practices.
- Experience working with 3rd party suppliers to conduct penetration tests.
- Legal security requirements: Data Protection acts, PCI DSS, NIS2
- Security control frameworks: NIS2, ISO 27000, ENISA ISF, COBIT.
- Experience with risk assessment, incident management, and compliance.
- Create and implement security strategies, architectures, and policies.
- Lead IT security projects to enhance overall security posture.
- Develop and maintain IT security policies, standards, and guidelines.
- Work closely with managed security partners and oversee their services.
- Conduct IT security risk assessments and manage security-related incidents.
- Monitor and assess emerging threats and their potential impact.
- Develop materials to promote security awareness among staff.
- Ensure compliance with GDPR, health & safety, and other regulatory requirements.
- Implement secure design, threat modeling, & security control frameworks: NIS2, ISO27000.
If you are interested send your CV to
Information Security Analyst
Posted today
Job Viewed
Job Description
Every day, Global Payments makes it possible for millions of people to move money between buyers and sellers using our payments solutions for credit, debit, prepaid and merchant services. Our worldwide team helps over 3 million companies, more than 1,300 financial institutions and over 600 million cardholders grow with confidence and achieve amazing results. We are driven by our passion for success and we are proud to deliver best-in-class payment technology and software solutions. Join our dynamic team and make your mark on the payments technology landscape of tomorrow.
Summary of This RoleEvaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, firmware and software . Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS security . Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents. Investigates and resolves security incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents.
What Part Will You Play?- Gains and maintains knowledge of how to monitor complex systems and response to known and emerging threats against the Global Payments network via intrusion detection software
- Assists in detailed, comprehensive investigation of security issues by reviewing security log data, interpreting data in support of security event management process from various data feeds and triages on a wide variety of security events.
- Under close supervision performs incident handling process by gaining knowledge in implementation of containment, protection and remediation activities.
- Gains and maintains knowledge of new and emerging threats that can affect the organization's information assets by assisting in analysis of third party software/solutions, IT configuration changes (including access control requests), and network/system architecture from risk perspective
- Under close supervision designs and configures security systems, including proxy, remote access, mail gateway, intrusion prevention, wireless networking, data leak prevention, security information and event management and web application firewalls.
- Assists in assessing and disseminating threats related to the enterprise in regard to current vulnerability by managing and developing an emerging threat model.
- Develops an understanding of how to assess risks based on changes to implementation of ISO(International Organization for Standardization)/BSO(Business Services Online); gains knowledge of PCI(Payment Card Industry)/Logical Security guidelines and models, HIPPA(health insurance portability and accountability act), PII(Personally Identifiable Information), and Card personalization.
- Gains knowledge of how to create cost effective solutions for system/application development regarding Information Security processes and concepts in applicable systems and software.
- Works under close supervision to perform day-to-day Information Security functions pertaining to numerous security software products and processes.
Minimum Qualifications
- Bachelor's Degree
- Relevant Experience or Degree in: Bachelor's degree in Computer Science, Info Security, or related field. Or relevant work experience in a related field.
- Typically No Relevant Experience Required
Preferred Qualifications
- Typically Minimum 2 Years Relevant Exp
- Including network operations or engineering or system administration on Unix, Linux, MAC(Message Authentication Code), or Windows; common security operations, intrusion detection systems, Security Incident Even Management systems, and anti-virus collection logs; including knowledge of industry standard security compliance programs PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act), etc.))
- Skills / Knowledge - Learns to use professional concepts. Applies company policies and procedures to resolve routine issues.
- Job Complexity - Works on problems of limited scope. Follows standard practices and procedures in analyzing situations or data from which answers can be readily obtained. Builds stable working relationships internally.
- Supervision - Normally receives detailed instructions on all work.
- Risk Assessment - Ability to identify, communicate, and mitigate risk within technical solution designs
- Industry Knowledge - Continued self-education of new and emerging threats and relevant processes, controls, or technologies to mitigate them.
- Incident Response - Knowledge and skills to contribute to all phases of Incident Response.
Global Payments Inc. is an equal opportunity employer. Global Payments provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex (including pregnancy), national origin, ancestry, age, marital status, sexual orientation, gender identity or expression, disability, veteran status, genetic information or any other basis protected by law. If you wish to request reasonable accommodations related to applying for employment or provide feedback about the accessibility of this website, please contact
Information Security Analyst
Posted today
Job Viewed
Job Description
Information Security Analyst - Dublin
ICON plc is a world-leading healthcare intelligence and clinical research organization. We're proud to foster an inclusive environment driving innovation and excellence, and we welcome you to join us on our mission to shape the future of clinical development.
Information Security Analyst
At ICON, it's our people that set us apart. Our diverse teams enable us to become a better partner to our customers and help us to fulfil our mission to advance and improve patients' lives.
Our 'Own It' culture is driven by four key values that bring us together as individuals and set us apart as an organisation: Accountability & Delivery, Collaboration, Partnership and Integrity. We want to be the Clinical Research Organisation that delivers excellence to our clients and to patients at every touch-point. In short, to be the partner of choice in drug development.
That's our vision. We're driven by it. And we need talented people who share it.
If you're as driven as we are, join us. You'll be working in a dynamic and supportive environment, with some of the brightest and the friendliest people in the sector, and you'll be helping shape an industry.
The Role
We are currently recruiting for an Information Security Analyst to work in the Governance, Risk & Compliance segment of our Cyber Security Team. This is a really great time to join this division as it is undergoing significant development and you will be joining at a time of exciting change with lots of opportunities for growth and development.
Responsibilities
- Perform activities in the support of one or more information security management practices, such as security compliance, security risk assessment and management, security policy management.
- Ensure activities are performed in accordance with company policies and industry standard frameworks (e.g., NIST CSF, NIST RMF and ISO
- Perform information security risk assessments, security compliance continuous monitoring, and/or various regulatory or contractual compliance activities.
- Work with other key stakeholders (e.g., quality assurance, legal, data protection office, business continuity, and other information technology business units) to ensure the organization analyzes and communicates information security risks and status of controls compliance effectively.
- Participate in the development of training and communication materials for key stakeholders of the process within your area of control or expertise.
- Advise and educate stakeholders on managing cybersecurity risks and information assurance activities in accordance with ICON's policies and procedures.
- Participate in authoring and reviewing information security policies and procedures pertaining to information security risk management and information assurance activities.
- Assist in the development of reports relating to the effectiveness of the cybersecurity risk management and assurance program.
- Perform ancillary tasks to support the strategic mission and objectives of the Cyber and Information Security department, as needed.
- Research and stay current on new technical literature applicable to information security, risk management, and information assurance.
- Assist in the development of metrics relating to the Cybersecurity Risk Management and Assurance team's business functions/processes.
Desired Qualifications
- Working technical knowledge of industry best practices and commonly used frameworks & standards (e.g., NIST 800-53/171, COSO, SOC/SSAE 18, COBIT, ISO ,) and various regulations pertaining to information security, cyber risk management, compliance, and data privacy (e.g., SOX, GDPR, HIPAA, GxP/GALP/GMP).
- Prior experience using an integrated risk management tool (e.g., ServiceNow) and/or vendor risk management tool (e.g., Process Unity) is a plus.
- Possess basic-to-intermediate understanding of risks and controls pertaining to technical, management, and operations security controls, system development lifecycle, business continuity, disaster recovery, data center controls, cloud computing, third-party risk management and privacy.
- Holds a CISSP, CISM, CISA, CRISC, ISO 27001 Lead Auditor or Implementer or similar certification; desirable but not required.
Minimum Requirements
- Fundamental relationship management and communications skills.
- Fundamental ability to solve problems and apply skills to determine risk or compliance deviations.
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, Enterprise Risk Management or related field or equivalent experience and one year of risk management, cybersecurity, compliance or related experience (or combined equivalent education, training, and experience).
- Excellent written and verbal communication skills.
- Read, write and speak fluent English, with strong documentation and organizational skills.
Benefits Of Working In ICON
Our success depends on the quality of our people. That's why we've made it a priority to build a culture that rewards high performance and nurtures talent.
We offer very competitive salary packages. And to keep them competitive, we regularly benchmark them against our competitors. Our annual bonuses reflect delivery of performance goals – both ours and yours.
We also provide a range of health-related benefits to employees and their families and offer competitive retirement plans – and related benefits such as life assurance – so you can save and plan with confidence for the years ahead.
But beyond the competitive salaries and comprehensive benefits, you'll benefit from an environment where you are encouraged to fulfil your sense of purpose and drive lasting change.
ICON is an equal opportunity and inclusive employer and is committed to providing a workplace free of discrimination and harassment. All qualified applicants will receive equal consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.
If, because of a medical condition or disability, you need a reasonable accommodation for any part of the application process, or in order to perform the essential functions of a position, please let us know through the form below.
What ICON Can Offer You
Our success depends on the quality of our people. That's why we've made it a priority to build a diverse culture that rewards high performance and nurtures talent.
In addition to your competitive salary, ICON offers a range of additional benefits. Our benefits are designed to be competitive within each country and are focused on well-being and work life balance opportunities for you and your family.
Our Benefits Examples Include
- Various annual leave entitlements
- A range of health insurance offerings to suit you and your family's needs.
- Competitive retirement planning offerings to maximize savings and plan with confidence for the years ahead.
- Global Employee Assistance Programme, LifeWorks, offering 24-hour access to a global network of over 80,000 independent specialized professionals who are there to support you and your family's well-being.
- Life assurance
- Flexible country-specific optional benefits, including childcare vouchers, bike purchase schemes, discounted gym memberships, subsidized travel passes, health assessments, among others.
Visit our careers site to read more about the benefits ICON offers.
At ICON, inclusion & belonging are fundamental to our culture and values. We're dedicated to providing an inclusive and accessible environment for all candidates. ICON is committed to providing a workplace free of discrimination and harassment. All qualified applicants will receive equal consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.
If, because of a medical condition or disability, you need a reasonable accommodation for any part of the application process, or in order to perform the essential functions of a position, please let us know or submit a request here
Interested in the role, but unsure if you meet all of the requirements? We would encourage you to apply regardless – there's every chance you're exactly what we're looking for here at ICON whether it is for this or other roles.
Are you a current ICON Employee? Please click here to apply