8 Information Security Analyst jobs in Ireland
Security Engineer, Incident Response , Security Incident Response Team (SIRT)

Posted 2 days ago
Job Viewed
Job Description
Amazon is seeking a qualified Security Engineer to join our innovative, high energy Information Security team. In this role you will work within the Amazon Security Incident Response Team (SIRT). SIRT Security Engineers respond to security events, conduct analysis of threats such as malware and intrusion attempts, and provide security services to safeguard highly sensitive data. They work hands-on with detection systems and vulnerability analysis tools to respond to potential threats to Amazon systems. SIRT Security Engineers are unique individuals prepared to relentlessly resolve security issues by gathering and analyzing event data and conducting root-cause analysis. With your technical expertise, you will be solving security challenges at scale, working to protect the applications powering the most sophisticated e-commerce platform ever built. We value broad and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, threat hunting, and threat intelligence.
Key job responsibilities
- Responding to security incidents, and coordinating a cohesive response involving multiple teams across Amazon.
- Providing security engineering solutions and support during customer-facing incidents, proactively considering the prevention of similar incidents from occurring in the future.
- Assisting in the development of pragmatic solutions that achieve business requirements while maintaining an acceptable level of risk.
- Identifying and recommending solutions that improve or expand Amazon's incident response capabilities.
- Working alongside and mentoring Information Security engineers to improve security, reduce and quickly address risk.
- Evaluating the impact of current security trends, advisories, publications, and academic research to Amazon, coordinating response as necessary across affected teams.
- Keeping your knowledge and skills current with the rapidly changing threat landscape.
- Participating in a follow-the-sun on-call rotation.
About the team
Why Amazon Security
At Amazon, security is central to maintaining customer trust and delivering delightful customer experiences. Our organization is responsible for creating and maintaining a high bar for security across all of Amazon's products and services. We offer talented security professionals the chance to accelerate their careers with opportunities to build experience in a wide variety of areas including cloud, devices, retail, entertainment, healthcare, operations, and physical stores.
Work/Life Balance
We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why flexible work hours and arrangements are part of our culture. When we feel supported in the workplace and at home, there's nothing we can't achieve.
Inclusive Team Culture
In Amazon Security, it's in our nature to learn and be curious. Ongoing DEI events and learning experiences inspire us to continue learning and to embrace our uniqueness. Addressing the toughest security challenges requires that we seek out and celebrate a diversity of ideas, perspectives, and voices.
Training and Career Growth
We're continuously raising our performance bar as we strive to become Earth's Best Employer. That's why you'll find endless knowledge-sharing, training, and other career-advancing resources here to help you develop into a better-rounded professional.
Basic Qualifications
- BS in Computer Science, Information Security, or equivalent professional experience
- 1-3 years of demonstrated experience in areas such as incident response, systems security, network security, and/or application security
- Proficiency in at least one programming language (e.g., Python, Go, PowerShell, Shell scripting, Perl, Ruby, Java, C++, C)
- Technical depth in two or more specialties including: digital forensics, malware analysis, network security, application security, security intelligence, and security operations
- Understanding of security vulnerabilities, attacker exploit techniques, and their remediation methodologies.
Preferred Qualifications
- Experience triaging and developing security alerts and response automation, conducting front-line analysis, and providing escalation support.
- 3+ years of information security experience.
- Relevant industry certifications from SANS, ISC2, etc.
- Strong demonstrated knowledge of Unix tools and architecture.
- Experience working as part of a Computer Security Incident Response Team (CSIRT)
- Familiarity/experience with AWS services and security concepts.
Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is central to our success. We make recruiting decisions based on your experience and skills. We value your passion to discover, invent, simplify and build. Protecting your privacy and the security of your data is a longstanding top priority for Amazon. Please consult our Privacy Notice ( ) to know more about how we collect, use and transfer the personal data of our candidates.
Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other legally protected status.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.
Cyber Security Incident Response Specialist

Posted 2 days ago
Job Viewed
Job Description
In the Americas, SMBC Group has a presence in the US, Canada, Ireland, Mexico, Brazil, Chile, Colombia, and Peru. Backed by the capital strength of SMBC Group and the value of its relationships in Asia, the Group offers a range of commercial and investment banking services to its corporate, institutional, and municipal clients. It connects a diverse client base to local markets and the organization's extensive global network. The Group's operating companies in the Americas include Sumitomo Mitsui Banking Corp. (SMBC), SMBC Nikko Securities America, Inc., SMBC Capital Markets, Inc., SMBC MANUBANK, JRI America, Inc., SMBC Leasing and Finance, Inc., Banco Sumitomo Mitsui Brasileiro S.A., and Sumitomo Mitsui Finance and Leasing Co., Ltd.
+ This is a hybrid role, requiring the successful candidate to attend our Tralee office.
**Role Description**
As a Cyber Incident Response Analyst, you will be a key part of a high performing SOC team, with a desire to continually improve and advance our capabilities to protect SMBC Group. You will bring your passion for Cybersecurity to a team of like-minded professionals and leverage this passion to ensure our monitoring and response capabilities are effective and efficient and that we keep pace with a rapidly changing threat landscape.
You will relish your core role in supporting the monitoring and response of cyber security alerts and incidents by digging into and investigating them to find the root cause and identifying the gap in controls that allowed a threat to reach that point in the kill chain. If you identify an incident, you will lead that technical analysis, tracking down the actions of that threat actor as part of the incident response, while supported by the wider Incident response process and members of the SOC and CSIRT teams. If you identify a false positive, you will drive the effort to tune or refine our detections, or to drive improvements to our preventative controls to prevent a recurrence, freeing more time for the SOC to focus on improving our skills and capabilities. With your knowledge and expertise, you will develop and hone the SOC through work-product review, mentoring, and ownership of projects to develop the technical capabilities of the SOC.
As part of a wider team of SOC analysts, you are able to focus on an area you are passionate about, or if sufficiently experienced, take the lead. You will develop deep expertise and expand our capabilities in domains ranging from across Purple Teaming, Threat hunting, Digital Forensics and Incident Response (DFIR), Security Automation, Detection Engineering and Threat Intelligence and share this knowledge to develop the depth of knowledge of the SOC. As part of a Financial Group with offices and data centers across the Globe, you will have access and exposure to leading technologies and tools. If there is a gap in our toolset, you can help us identify and bridge that gap by acting as Subject Matter Expert to do so. You will bring fresh ideas, challenge the status quo, and seek always to answer - how can we improve?
This role is best suited for candidates who enjoy and have experience within SOC or CSIRT teams and enjoy investigating and finding the root of an issue or incident and working on getting the most from leading edge security toolsets and platforms and processes. Candidates who excel will think critically to find ways to resolve security challenges. This role would suit an experienced and self-motivated cyber security professional with strong technical skills and knowledge combined with a passion for cyber security.
Note: Expectation is to be onsite once a month for this role.
**Role Objectives**
-Act as technical lead in the development and enhancement of capabilities such as Cyber Monitoring & Response/Purple Teaming/Threat Hunting/Digital Forensics/Incident Response
-Act as an escalation point for the analysis of security alerts or technical response to security events and incidents
-Review and guide the SOC personnel for well-written, complete, and thorough analysis
-Mentor and guide more junior SOC personnel sharing your knowledge and expertise.
-Develop and improve monitoring & response playbooks.
-Conduct proactive threat hunting and DFIR activities.
-Develop deep expertise in our monitoring systems and technology to act as an SME in working with our detection engineering and automation teams to enhance our abilities to prevent, detect & respond.
-Identify and test new adversary TTPs and our ability to detect and respond to them.
-Identify opportunities for efficiency, work hand in hand with Security Automation team to automate and improve our response processes.
-Assist in the implementation and ongoing support of security systems, acting as an SME for SOC related projects.
-Execute tasks or support projects to enhance team's capabilities.
-Assist in defining SOC requirements for information technology projects.
-Act as a role model and set the standard for technical analysis within the SOC.
-Providing strong mentorship and guidance to more junior SOC team members by acting and leading by example. Bring a positive outlook and seek to motivate and inspire your fellow team members.
-Demonstrate comprehensive understanding of cyber security best practices, risk vectors, mitigation techniques and protection software. Display knowledge of network security concepts and tools such as firewalls, proxy servers, email security and suspicious traffic flows. Exhibit analytical ability to lead incident response and mitigation efforts as well as identify key areas for improvement from post-incident analysis. Show ability to convey cyber security polices and concepts to employees and lead training efforts to ensure all employees follow recommended best practices relating to cyber security.
-Strong understanding of MITRE ATT&CK Cyber Kill Chain and similar frameworks.
-Strong knowledge of security controls related to the detection, analysis, and response (SIEM, EDR, NDR, XDR, UEBA).
-Strong knowledge of Windows and Linux systems, Active Directory, Cloud technologies.
**Qualifications and Skills**
-5+ years of experience in cyber security experience required, ideally in a SOC, DFIR, or CSIRT role.
-Strong verbal and written communication skills with experience in documenting their work to a high level.
-Professional Certifications an advantage but not essential if have requisite role knowledge, GCIH, GNFA, GFCA, Certified Ethical Hacker (CEH), OSCP, CISSP or similar certifications a plus.
-Must be self-directed with the ability to work independently.
-Ability to multi-task and remain productive in a service-driven and results oriented environment.
-Demonstrated strong organizational, analytical, and problem-solving skills.
**Additional Requirements**
SMBC's employees participate in a hybrid workforce model that provides employees with an opportunity to work from home, as well as, from an SMBC office. SMBC requires that employees live within a reasonable commuting distance of their office location. Prospective candidates will learn more about their specific hybrid work schedule during their interview process.
SMBC provides reasonable accommodations during candidacy for applicants with disabilities consistent with applicable federal, state, and local law. If you need a reasonable accommodation during the application process, please let us know at
Cyber Incident response & Engineering Lead
Posted 4 days ago
Job Viewed
Job Description
Chief Information Security Officer
Posted 2 days ago
Job Viewed
Job Description
Confirmo is one of the fastest growing crypto payment gateways, and our flexible solutions, low fees, and top-class support make it easy for businesses of all sizes to accept crypto payments. Forbes US named us among the best crypto payment gateways in the world and we don't plan to slow down! Since 2022, we've grown 700% in volume and now process over $60M+ monthly. We are in the process of obtaining our MiCA licence in Ireland and as part of this expansion, we plan to hire approximately eight employees in Ireland, with a CISO as a top priority.
Key Responsibilities:
Understand our business risks, evaluate our existing security standards and practices, identify the biggest threats and vulnerabilities and propose lightweight yet efficient solutions.
Architect and implement cloud security and SDLC controls, including access management, network security, encryption, data management and threat detection, following industry best practices.
Design, build, and operate scalable security solutions across our cloud infrastructure, ensuring resilience, high availability, and automation at scale.
Evaluate our software development lifecycle from a security perspective, actively collaborate on feature definitions and MRs that require security assessment.
Define and enforce digital security policies, collaborating with engineering teams to drive adoption and ensure consistent implementation.
Collaborate with compliance and operations teams to align our security practices with regulatory and industry standards such as DORA, ISO 27001 and others, plus support certification or audit readiness where needed.
Your Profile:
7+ years of cybersecurity experience. An ideal candidate even tried a managerial role in that field but realised hands-on experience in a fast paced environment is a lot more entertaining role.
Strong background in security monitoring and detection engineering for cloud environments.
Strong background in programming. You don't have to be a seasoned software developer, but general programming in multiple languages and the ability to understand even complex source code is a must. LLMs help, but responsibility remains on our shoulders. Our main languages are JVM (Java or Kotlin) and Javascript/Typescript plus a lot of Python and other scripting.
Experience with public cloud infrastructure (ideally AWS).
Experience with edge security solutions, especially Cloudflare
Any relevant certifications are a plus, e.g.: CISSP, CEH, OSWA, OSWE, etc
Proficiency in Infrastructure as Code (IaC) tools such as Terraform, Ansible, or equivalent.
Familiarity with the FinTech environment and/or the cryptocurrency domain is a strong plus.
Analytical thinking, highly organised mind. We don't have the capacity to micromanage, we need to rely on your abilities.
Strong ability to prioritise and choose your battles. Our security imperfections need to be carefully evaluated and their solution deliberately prioritised.
This position is based in Dublin/Ireland, remote work is ok from Ireland with occasional travel to Dublin. If you are interested in learning more, please submit your CV, and our recruiter, Brian, will get back to you promptly.
Chief Information Security Officer
Posted 5 days ago
Job Viewed
Job Description
Confirmo is one of the fastest growing crypto payment gateways, and our flexible solutions, low fees, and top-class support make it easy for businesses of all sizes to accept crypto payments. Forbes US named us among the best crypto payment gateways in the world and we don't plan to slow down! Since 2022, we've grown 700% in volume and now process over $60M+ monthly. We are in the process of obtaining our MiCA licence in Ireland and as part of this expansion, we plan to hire approximately eight employees in Ireland, with a CISO as a top priority.
Key ResponsibilitiesUnderstand our business risks, evaluate our existing security standards and practices, identify the biggest threats and vulnerabilities and propose lightweight yet efficient solutions.
Architect and implement cloud security and SDLC controls, including access management, network security, encryption, data management and threat detection, following industry best practices.
Design, build, and operate scalable security solutions across our cloud infrastructure, ensuring resilience, high availability, and automation at scale.
Evaluate our software development lifecycle from a security perspective, actively collaborate on feature definitions and MRs that require security assessment.
Define and enforce digital security policies, collaborating with engineering teams to drive adoption and ensure consistent implementation.
Collaborate with compliance and operations teams to align our security practices with regulatory and industry standards such as DORA, ISO 27001 and others, plus support certification or audit readiness where needed.
7+ years of cybersecurity experience. An ideal candidate even tried a managerial role in that field but realised hands-on experience in a fast paced environment is a lot more entertaining role.
Strong background in security monitoring and detection engineering for cloud environments.
Strong background in programming. You don't have to be a seasoned software developer, but general programming in multiple languages and the ability to understand even complex source code is a must. LLMs help, but responsibility remains on our shoulders. Our main languages are JVM (Java or Kotlin) and Javascript/Typescript plus a lot of Python and other scripting.
Experience with public cloud infrastructure (ideally AWS).
Experience with edge security solutions, especially Cloudflare
Any relevant certifications are a plus, e.g.: CISSP, CEH, OSWA, OSWE, etc
Proficiency in Infrastructure as Code (IaC) tools such as Terraform, Ansible, or equivalent.
Familiarity with the FinTech environment and/or the cryptocurrency domain is a strong plus.
Analytical thinking, highly organised mind. We don't have the capacity to micromanage, we need to rely on your abilities.
Strong ability to prioritise and choose your battles. Our security imperfections need to be carefully evaluated and their solution deliberately prioritised.
This position is based in Dublin/Ireland, remote work is ok from Ireland with occasional travel to Dublin. If you are interested in learning more, please submit your CV, and our recruiter, Brian, will get back to you promptly.
Information Security Compliance Specialist, PCI

Posted 2 days ago
Job Viewed
Job Description
The Information Security Compliance Specialist is responsible for managing McAfee's information security compliance certifications, including maintaining McAfee's PCI DSS certification and supporting additional frameworks including SOC 2 Type II, ISO2700, NIST CSF and HIPAA.
This position is open in Ireland; We will only consider candidates currently in Ireland and are not offering relocation assistance at this time.
**_About the Role_** **_:_**
+ Managing McAfee's PCI DSS 4.0 compliance program.
+ Supporting additional compliance frameworks including ISO2700X, SOC 2 Type II and HIPAA.
+ Working with stakeholders across McAfee to facilitate internal compliance assessments aligned to industry standards including NIST CSF.
+ Working with stakeholders in Sales and Procurement to meet partner expectations, including responding to customer security requests and reviewing contractual agreements.
**_About You_** **_:_**
+ Ideal candidates will have a minimum of 5 years of experience in the same field.
+ PCI ISA or QSA.
+ Ability to conduct thorough security audits, including risk assessments to identify and evaluate security risks and compliance gaps.
+ Knowledge of cloud computing principles and best practices, with specific focus on cloud security controls, configurations, and monitoring tools.
+ Strong interpersonal and communication skills, with the ability to collaborate effectively with stakeholders at all levels of the organization to drive security initiatives and remediation efforts.
+ Strong project management skills and experience in managing security projects, including planning, execution, monitoring, and reporting on project progress and outcomes.
+ Please specify the versions of PCI you've worked with in your resume.
#LI-Remote
**_Company Overview_**
McAfee is a leader in personal security for consumers. Focused on protecting people, not just devices, McAfee consumer solutions adapt to users' needs in an always online world, empowering them to live securely through integrated, intuitive solutions that protects their families and communities with the right security at the right moment.
**_Company Benefits and Perks:_**
We work hard to embrace diversity and inclusion and encourage everyone at McAfee to bring their authentic selves to work every day. We're proud to be Great Place to Work® Certified in 10 countries, a reflection of the supportive, empowering environment we've built where people feel seen, valued, and energized to reach their full potential and thrive.
We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees.
+ Bonus Program
+ Pension and Retirement Plans
+ Medical, Dental and Vision Coverage
+ Paid Time Off
+ Paid Parental Leave
+ Support for Community Involvement
We're serious about our commitment to diversity which is why McAfee prohibits discrimination based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
Chief Information Security Officer (CISO)
Posted 4 days ago
Job Viewed
Job Description
Be The First To Know
About the latest Information security analyst Jobs in Ireland !
Chief Information Security Officer (CISO)
Posted 4 days ago
Job Viewed