83 Sap Security Analysts jobs in Ireland
Vulnerability Assessment Supervisor, International Protection
Posted today
Job Viewed
Job Description
Reporting Relationship
- Reports to the Manager, Vulnerability Assessments
Working Relationships
- You will work with a multidisciplinary team at City West including the IPAS Welfare Team, Dept of Social Protection, NGOs and other stakeholders.
About the Role:
Supervision and Team Leadership
- Lead, supervise, and support a team of Vulnerability Assessment Officers.
- Monitor team performance to ensure adherence to organisational policies, procedures, and ethical standards.
- Provide regular feedback and conduct performance evaluations.
Operational Oversight
- Ensure assessments are conducted in line with evidence-based approach, respect the "do no harm" principle and best practices.
- Review and approve assessment reports for accuracy, thoroughness, and compliance with legal and ethical guidelines.
Quality Assurance and Compliance
- Implement and maintain quality control processes to uphold high standards of service delivery.
- Stay updated on relevant international human rights and international protection law frameworks, and Ireland's international protection and migration governance systems.
- Ensure team compliance with duty of care principles, informed consent protocols, and best interest determinations, especially for children.
Stakeholder Engagement
- Act as a liaison between the Vulnerability Assessment team and other internal departments or external stakeholders.
- Collaborate with social protection services and other relevant agencies to ensure appropriate placement and support for vulnerable individuals.
Case Management and Support
- Assist with complex or sensitive cases, offering expertise on handling issues related to gender inequality, trauma, and other specific vulnerabilities.
- Ensure the team maintains respect, empathy, and discretion when engaging with individuals from diverse cultural, age, and gender backgrounds.
- Support the Vulnerability Assessment Officers in identifying strengths and coping strategies in individuals to enhance their safety and recovery.
PERSON SPECIFICATIONS
Education & Training:
- A degree level 7 or 8 qualification in Counselling/Social Work/Nursing/Social Care / Social Studies /Teaching/ Psychology/Human Resources or other empathy-centric disciplines that require interaction with people is a requirement for this position.
Experience:
- Minimum 2years experience in the field of social care is essential.
- Proven competence in the care and support of the adults in vulnerable situations and a genuine interest in this area is required.
Competencies and Values:
- Human Rights Based Approach
- Resilience, Positive Attitude & Openness to Change
- Effective Communication & Working Relationships
- Planning, Organising & Reprioritising
- Innovation, Creativity & Problem Solving
Personal Specification:
A strong commitment to caring and an empathetic understanding of those going the International protection system are essential attributes for this role. The successful candidate should possess excellent people skills, be flexible and have experience with rapid and complex changing work environments.
Professional Expectation
You will be expected to keep abreast of current developments and best practice in the area of International Protection. In this respect you may from time to time be required to attend appropriate courses and seminars.
The Project Worker/ Reception Officer must be aware of ethical policies and procedures which pertain to the sector including:
- Vulnerability assessment policy
- Good People Services agreed Policies and Codes of Good Practice.
- Diversity, Equality, Cultural Awareness and Anti-Racism;
- Children First Training &Safeguarding Vulnerable Persons at Risk of Abuse.
- Confidentiality Guidelines.
- Data Protection Guidelines (GDPR).
- Equal Opportunity Principles.
- Health & Safety requirements in compliance with Good People Services instructions.
- Be fully familiar with fire precautions and fire drills.
- Notification of accidents, incidents, and other reportable events.
- Code of Practice for Persons working in Reception Centres;
- First Aid Training Basics and Beyond Customer Care;
- Conflict Management;
- Resilience Training
Confidentiality
In the course of your employment, you may have access to or hear information concerning the medical or personal affairs of service users or staff or other centres business. Such records and information are strictly confidential. In addition, records must never be left in such a manner that unauthorised persons can obtain access to them.
Location: City West/ Dublin City Centre
Salary: €21.50/hr
Languages Required: Georgian, Albanian, Urdu or Portuguese (fluent English as well)
Job Type: Full-time
Pay: From €21.50 per hour
Ability to commute/relocate:
- CO. Dublin, CO. Dublin: reliably commute or plan to relocate before starting work (required)
Education:
- Bachelor's (required)
Experience:
- Social care: 1 year (required)
Language:
- Ukrainian and English, Georgian and English (required)
Work authorisation:
- Ireland (required)
Work Location: In person
Information Security Analyst
Posted today
Job Viewed
Job Description
Information Security (InfoSec) Analyst
12 month fixed term ( very likely to go longer)
Location:
Dublin West - 3 Days on site, Dublin West outside of the M50
Eligibility:
Open to candidates who do
not
require visa sponsorship
Stamp 1G (Spouse), Stamp 1G (Graduate, 12+ months remaining), Stamp 4 or EU passport holders.
We're looking for an Information Security Analyst to join a growing Cyber Security team, playing a key role in strengthening the organisation's security posture.
This role focuses on risk management, compliance, documentation and preparation for the upcoming NIS2 Directive.
Reporting into a Senior Information Security Manager, you'll help ensure the confidentiality, integrity and availability of data across a complex vendor ecosystem.
It's a hands-on governance and assurance role with a strong focus on vendor compliance, policy development and the continuous improvement of security controls and practices.
About You
- Previous experience in Information Security, Risk Management or Compliance.
- Previous experience vendor risk and third-party compliance.
- Excellent communication and stakeholder management skills.
- Knowledge of GDPR, ISO/IEC 27001 or NIS2 requirements. (Not a major thing if you don't)
- (Bonus) Certifications such as CISSP, CISM, or ISO 27001 Lead Implementer.
Key Responsibilities
- Support audits, assurance activities and evidence collection for compliance frameworks.
- Conduct and maintain risk assessments to identify and address threats and vulnerabilities.
- Collaborate across Legal, Compliance and IT to embed effective security governance.
- Foster a strong security and compliance culture across the organisation and partner network.
- Monitor and improve third-party/vendor compliance obligations.
This is a great role someone who has wants to grow their experience in security, governance, vendor risk and compliance
Information Security Analyst
Posted today
Job Viewed
Job Description
Every day, Global Payments makes it possible for millions of people to move money between buyers and sellers using our payments solutions for credit, debit, prepaid and merchant services. Our worldwide team helps over 3 million companies, more than 1,300 financial institutions and over 600 million cardholders grow with confidence and achieve amazing results. We are driven by our passion for success and we are proud to deliver best-in-class payment technology and software solutions. Join our dynamic team and make your mark on the payments technology landscape of tomorrow.
Summary of This RoleEvaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, firmware and software . Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS security . Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents. Investigates and resolves security incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents.
What Part Will You Play?- Gains and maintains knowledge of how to monitor complex systems and response to known and emerging threats against the Global Payments network via intrusion detection software
- Assists in detailed, comprehensive investigation of security issues by reviewing security log data, interpreting data in support of security event management process from various data feeds and triages on a wide variety of security events.
- Under close supervision performs incident handling process by gaining knowledge in implementation of containment, protection and remediation activities.
- Gains and maintains knowledge of new and emerging threats that can affect the organization's information assets by assisting in analysis of third party software/solutions, IT configuration changes (including access control requests), and network/system architecture from risk perspective
- Under close supervision designs and configures security systems, including proxy, remote access, mail gateway, intrusion prevention, wireless networking, data leak prevention, security information and event management and web application firewalls.
- Assists in assessing and disseminating threats related to the enterprise in regard to current vulnerability by managing and developing an emerging threat model.
- Develops an understanding of how to assess risks based on changes to implementation of ISO(International Organization for Standardization)/BSO(Business Services Online); gains knowledge of PCI(Payment Card Industry)/Logical Security guidelines and models, HIPPA(health insurance portability and accountability act), PII(Personally Identifiable Information), and Card personalization.
- Gains knowledge of how to create cost effective solutions for system/application development regarding Information Security processes and concepts in applicable systems and software.
- Works under close supervision to perform day-to-day Information Security functions pertaining to numerous security software products and processes.
Minimum Qualifications
- Bachelor's Degree
- Relevant Experience or Degree in: Bachelor's degree in Computer Science, Info Security, or related field. Or relevant work experience in a related field.
- Typically No Relevant Experience Required
Preferred Qualifications
- Typically Minimum 2 Years Relevant Exp
- Including network operations or engineering or system administration on Unix, Linux, MAC(Message Authentication Code), or Windows; common security operations, intrusion detection systems, Security Incident Even Management systems, and anti-virus collection logs; including knowledge of industry standard security compliance programs PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act), etc.))
- Skills / Knowledge - Learns to use professional concepts. Applies company policies and procedures to resolve routine issues.
- Job Complexity - Works on problems of limited scope. Follows standard practices and procedures in analyzing situations or data from which answers can be readily obtained. Builds stable working relationships internally.
- Supervision - Normally receives detailed instructions on all work.
- Risk Assessment - Ability to identify, communicate, and mitigate risk within technical solution designs
- Industry Knowledge - Continued self-education of new and emerging threats and relevant processes, controls, or technologies to mitigate them.
- Incident Response - Knowledge and skills to contribute to all phases of Incident Response.
Global Payments Inc. is an equal opportunity employer. Global Payments provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex (including pregnancy), national origin, ancestry, age, marital status, sexual orientation, gender identity or expression, disability, veteran status, genetic information or any other basis protected by law. If you wish to request reasonable accommodations related to applying for employment or provide feedback about the accessibility of this website, please contact
Information Security Analyst
Posted today
Job Viewed
Job Description
Information Security Analyst - Dublin
ICON plc is a world-leading healthcare intelligence and clinical research organization. We're proud to foster an inclusive environment driving innovation and excellence, and we welcome you to join us on our mission to shape the future of clinical development.
Information Security Analyst
At ICON, it's our people that set us apart. Our diverse teams enable us to become a better partner to our customers and help us to fulfil our mission to advance and improve patients' lives.
Our 'Own It' culture is driven by four key values that bring us together as individuals and set us apart as an organisation: Accountability & Delivery, Collaboration, Partnership and Integrity. We want to be the Clinical Research Organisation that delivers excellence to our clients and to patients at every touch-point. In short, to be the partner of choice in drug development.
That's our vision. We're driven by it. And we need talented people who share it.
If you're as driven as we are, join us. You'll be working in a dynamic and supportive environment, with some of the brightest and the friendliest people in the sector, and you'll be helping shape an industry.
The Role
We are currently recruiting for an Information Security Analyst to work in the Governance, Risk & Compliance segment of our Cyber Security Team. This is a really great time to join this division as it is undergoing significant development and you will be joining at a time of exciting change with lots of opportunities for growth and development.
Responsibilities
- Perform activities in the support of one or more information security management practices, such as security compliance, security risk assessment and management, security policy management.
- Ensure activities are performed in accordance with company policies and industry standard frameworks (e.g., NIST CSF, NIST RMF and ISO
- Perform information security risk assessments, security compliance continuous monitoring, and/or various regulatory or contractual compliance activities.
- Work with other key stakeholders (e.g., quality assurance, legal, data protection office, business continuity, and other information technology business units) to ensure the organization analyzes and communicates information security risks and status of controls compliance effectively.
- Participate in the development of training and communication materials for key stakeholders of the process within your area of control or expertise.
- Advise and educate stakeholders on managing cybersecurity risks and information assurance activities in accordance with ICON's policies and procedures.
- Participate in authoring and reviewing information security policies and procedures pertaining to information security risk management and information assurance activities.
- Assist in the development of reports relating to the effectiveness of the cybersecurity risk management and assurance program.
- Perform ancillary tasks to support the strategic mission and objectives of the Cyber and Information Security department, as needed.
- Research and stay current on new technical literature applicable to information security, risk management, and information assurance.
- Assist in the development of metrics relating to the Cybersecurity Risk Management and Assurance team's business functions/processes.
Desired Qualifications
- Working technical knowledge of industry best practices and commonly used frameworks & standards (e.g., NIST 800-53/171, COSO, SOC/SSAE 18, COBIT, ISO ,) and various regulations pertaining to information security, cyber risk management, compliance, and data privacy (e.g., SOX, GDPR, HIPAA, GxP/GALP/GMP).
- Prior experience using an integrated risk management tool (e.g., ServiceNow) and/or vendor risk management tool (e.g., Process Unity) is a plus.
- Possess basic-to-intermediate understanding of risks and controls pertaining to technical, management, and operations security controls, system development lifecycle, business continuity, disaster recovery, data center controls, cloud computing, third-party risk management and privacy.
- Holds a CISSP, CISM, CISA, CRISC, ISO 27001 Lead Auditor or Implementer or similar certification; desirable but not required.
Minimum Requirements
- Fundamental relationship management and communications skills.
- Fundamental ability to solve problems and apply skills to determine risk or compliance deviations.
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, Enterprise Risk Management or related field or equivalent experience and one year of risk management, cybersecurity, compliance or related experience (or combined equivalent education, training, and experience).
- Excellent written and verbal communication skills.
- Read, write and speak fluent English, with strong documentation and organizational skills.
Benefits Of Working In ICON
Our success depends on the quality of our people. That's why we've made it a priority to build a culture that rewards high performance and nurtures talent.
We offer very competitive salary packages. And to keep them competitive, we regularly benchmark them against our competitors. Our annual bonuses reflect delivery of performance goals – both ours and yours.
We also provide a range of health-related benefits to employees and their families and offer competitive retirement plans – and related benefits such as life assurance – so you can save and plan with confidence for the years ahead.
But beyond the competitive salaries and comprehensive benefits, you'll benefit from an environment where you are encouraged to fulfil your sense of purpose and drive lasting change.
ICON is an equal opportunity and inclusive employer and is committed to providing a workplace free of discrimination and harassment. All qualified applicants will receive equal consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.
If, because of a medical condition or disability, you need a reasonable accommodation for any part of the application process, or in order to perform the essential functions of a position, please let us know through the form below.
What ICON Can Offer You
Our success depends on the quality of our people. That's why we've made it a priority to build a diverse culture that rewards high performance and nurtures talent.
In addition to your competitive salary, ICON offers a range of additional benefits. Our benefits are designed to be competitive within each country and are focused on well-being and work life balance opportunities for you and your family.
Our Benefits Examples Include
- Various annual leave entitlements
- A range of health insurance offerings to suit you and your family's needs.
- Competitive retirement planning offerings to maximize savings and plan with confidence for the years ahead.
- Global Employee Assistance Programme, LifeWorks, offering 24-hour access to a global network of over 80,000 independent specialized professionals who are there to support you and your family's well-being.
- Life assurance
- Flexible country-specific optional benefits, including childcare vouchers, bike purchase schemes, discounted gym memberships, subsidized travel passes, health assessments, among others.
Visit our careers site to read more about the benefits ICON offers.
At ICON, inclusion & belonging are fundamental to our culture and values. We're dedicated to providing an inclusive and accessible environment for all candidates. ICON is committed to providing a workplace free of discrimination and harassment. All qualified applicants will receive equal consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.
If, because of a medical condition or disability, you need a reasonable accommodation for any part of the application process, or in order to perform the essential functions of a position, please let us know or submit a request here
Interested in the role, but unsure if you meet all of the requirements? We would encourage you to apply regardless – there's every chance you're exactly what we're looking for here at ICON whether it is for this or other roles.
Are you a current ICON Employee? Please click here to apply
Information Security Analyst
Posted today
Job Viewed
Job Description
Summary
Description
Summary of This Role
Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, firmware and software . Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS security . Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents. Investigates and resolves security incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents.
What Part Will You Play?
- Gains and maintains knowledge of how to monitor complex systems and response to known and emerging threats against the Global Payments network via intrusion detection software
- Assists in detailed, comprehensive investigation of security issues by reviewing security log data, interpreting data in support of security event management process from various data feeds and triages on a wide variety of security events.
- Under close supervision performs incident handling process by gaining knowledge in implementation of containment, protection and remediation activities.
- Gains and maintains knowledge of new and emerging threats that can affect the organization's information assets by assisting in analysis of third party software/solutions, IT configuration changes (including access control requests), and network/system architecture from risk perspective
- Under close supervision designs and configures security systems, including proxy, remote access, mail gateway, intrusion prevention, wireless networking, data leak prevention, security information and event management and web application firewalls.
- Assists in assessing and disseminating threats related to the enterprise in regard to current vulnerability by managing and developing an emerging threat model.
- Develops an understanding of how to assess risks based on changes to implementation of ISO(International Organization for Standardization)/BSO(Business Services Online); gains knowledge of PCI(Payment Card Industry)/Logical Security guidelines and models, HIPPA(health insurance portability and accountability act), PII(Personally Identifiable Information), and Card personalization.
- Gains knowledge of how to create cost effective solutions for system/application development regarding Information Security processes and concepts in applicable systems and software.
- Works under close supervision to perform day-to-day Information Security functions pertaining to numerous security software products and processes.
What Are We Looking For in This Role?
Minimum Qualifications
- Bachelor's Degree
- Relevant Experience or Degree in: Bachelor's degree in Computer Science, Info Security, or related field. Or relevant work experience in a related field.
- Typically No Relevant Experience Required
Preferred Qualifications
- Typically Minimum 2 Years Relevant Exp
- Including network operations or engineering or system administration on Unix, Linux, MAC(Message Authentication Code), or Windows; common security operations, intrusion detection systems, Security Incident Even Management systems, and anti-virus collection logs; including knowledge of industry standard security compliance programs PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act), etc.))
What Are Our Desired Skills and Capabilities?
- Skills / Knowledge - Learns to use professional concepts. Applies company policies and procedures to resolve routine issues.
- Job Complexity - Works on problems of limited scope. Follows standard practices and procedures in analyzing situations or data from which answers can be readily obtained. Builds stable working relationships internally.
- Supervision - Normally receives detailed instructions on all work.
- Risk Assessment - Ability to identify, communicate, and mitigate risk within technical solution designs
- Industry Knowledge - Continued self-education of new and emerging threats and relevant processes, controls, or technologies to mitigate them.
- Incident Response - Knowledge and skills to contribute to all phases of Incident Response.
Senior Information Security Analyst
Posted 1 day ago
Job Viewed
Job Description
About The ServiceNow Security Office
The **ServiceNow Security Organization** is dedicated to delivering **world-class, innovative security solutions** that minimize risk and protect both our company and our customers. By enabling the secure migration of sensitive data and workloads to the cloud, we help accelerate ServiceNow's position as the **most trusted SaaS provider** in the industry.
We are committed to fostering an environment where our employees feel empowered, take pride in their work, and have the opportunity to make a meaningful impact.
**About the Team - Global Security Support Center (GSSC)**
The **Global Security Support Center (GSSC)** at ServiceNow is a diverse and highly skilled team of security professionals who play a pivotal role in strengthening both our internal and external security posture. The team collaborates closely with various functions across the company and serves as a key interface with our customers on security-related matters.
Through expertise, communication, and a commitment to excellence, the GSSC team reinforces ServiceNow's reputation as a **security-first organization** , consistently demonstrating our commitment to protecting our platform, our data, and our customers.
GSSC Mission Statement: To provide external & internal facing security support on behalf of the Security Organization to improve our customers' security posture and build Customer trust.
**Job Description**
**Responsibilities on the role: **
+ Represent security organization in customer-facing Security Incidents, cases, Security findings, tasks and questions and calls related to Security & Privacy.
+ Own, triage, investigate and respond to security matters of ServiceNow platform, ensuring timely communication, resolution and enhance customer experience and processes.
+ Act as the primary point of contact for all security-related matters in ServiceNow, supporting both internal and external stakeholders.
+ Facilitate the efficient workflow/triage of security-related incidents/cases by collaborating with customers and other internal ServiceNow teams.
+ Build and maintain a high level of customer trust and confidence through exceptional service and communication.
+ Customer Outreach Communications on Security & escalation handling.
+ Understand and deliver excellent capability maturity models to fine tune Security processes.
+ Create and enhance documentation and processes to strengthen security maturity and operational excellence.
+ Develop and deliver training/enablement programs on Security, for internal and external customers on security awareness and best practices.
+ Develop AI Solutions for automating repetitive activities & design new solutions leveraging AI.
+ Work with Legal on security/privacy-related matters & a global team spread across different time zones, so flexibility of times is required.
+ Provide support and be available as a responsible resource for the On-Call rotation (weekends, public holidays, and after hours) as rostered.
**To be successful in this role, you have:**
+ Experience: A minimum of 3-5+ years of professional experience in information security or application security roles.
+ Certifications: Relevant certifications are highly preferred, including but not limited to:
+ **Required** : ServiceNow Certified System Administrator (CSA)
+ **Preferred** (Two or more): Azure AI Fundamentals, AWS Certified AI Practitioner, Offensive Security Web Assessor (OSWA), GIAC Web Application Penetration Tester (GWAPT), GIAC Security Essentials Certification (GSEC), GIAC Certified Incident Handler (GCIH), CISSP, CISM.
**Skills & Competencies**
+ Technical Skills:
+ Solid understanding of cloud computing models and major hyperscaler cloud models.
+ Hands-on experience with using and understanding security tools and technologies, including: SIEM solutions, logging tools, load balancers, firewalls, WAFs, IDS/IPS, vulnerability management platforms, encryption techniques etc.
+ Basic to Intermediate-level programming knowledge in **Java/JavaScript** with the ability to read, interpret & understand to explain code effectively.
+ Intermediate to Advanced proficiency in using web proxy tools for security testing and assessments.
+ Application Security: In-depth understanding of web application vulnerabilities (e.g., OWASP Top Ten) and corresponding mitigation strategies.
+ Risk Management: Ability to clearly explain security risks to non-technical stakeholders using straightforward, non-technical language.
+ Compliance & Regulatory Knowledge: Good knowledge of key compliance and regulatory frameworks including: NIST, CIS, GDPR, HIPAA, PCI DSS, ISO standards etc.
+ Artificial Intelligence: Experience working with AI technologies and designing AI-based solutions.
+ Analytical Thinking: Strong analytical and problem-solving capabilities, with the ability to evaluate and address complex security challenges.
+ Communication: Excellent verbal and written communication skills, with the ability to convey technical information to non-technical audience.
+ Team Collaboration: Demonstrated ability to thrive in a team-oriented, collaborative environment working in a follow the sun model.
+ Security Concepts: Good understanding of Security concepts and articulating Security and risk in simple terms without using jargons and make sense to customers.
+ Education: Bachelor's degree in computer science or information security or relevant information security experience.
+ Preferred Additional Experience: Hands-on experience with web-based vulnerability exploitation and experience is a strong plus to succeed in this role.
At GSSC, we pride ourselves on fostering a culture of inclusivity, innovation, and excellence. Our team and customers are at the heart of everything we do, and we are committed to providing a supportive and engaging work environment. As an Information Security and Application Security resource in the region, you will be an integral part of our mission to deliver secure and reliable solutions to our clients.
FD21
**Work Personas**
We approach our distributed world of work with flexibility and trust. Work personas (flexible, remote, or required in office) are categories that are assigned to ServiceNow employees depending on the nature of their work and their assigned work location. Learn more here ( . To determine eligibility for a work persona, ServiceNow may confirm the distance between your primary residence and the closest ServiceNow office using a third-party service.
**Equal Opportunity Employer**
ServiceNow is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, national origin or nationality, ancestry, age, disability, gender identity or expression, marital status, veteran status, or any other category protected by law. In addition, all qualified applicants with arrest or conviction records will be considered for employment in accordance with legal requirements.
**Accommodations**
We strive to create an accessible and inclusive experience for all candidates. If you require a reasonable accommodation to complete any part of the application process, or are unable to use this online application and need an alternative method to apply, please contact for assistance.
**Export Control Regulations**
For positions requiring access to controlled technology subject to export control regulations, including the U.S. Export Administration Regulations (EAR), ServiceNow may be required to obtain export control approval from government authorities for certain individuals. All employment is contingent upon ServiceNow obtaining any export license or other approval that may be required by relevant export control authorities.
From Fortune. ©2025 Fortune Media IP Limited. All rights reserved. Used under license.
Information Security Risk Analyst
Posted today
Job Viewed
Job Description
Company Overview
KKR is a leading global investment firm that offers alternative asset management as well as capital markets and insurance solutions. KKR aims to generate attractive investment returns by following a patient and disciplined investment approach, employing world-class people, and supporting growth in its portfolio companies and communities. KKR sponsors investment funds that invest in private equity, credit and real assets and has strategic partners that manage hedge funds. KKR's insurance subsidiaries offer retirement, life and reinsurance products under the management of Global Atlantic Financial Group. References to KKR's investments may include the activities of its sponsored funds and insurance subsidiaries.
Position Summary
KKR is seeking an Information Security Risk Analyst to join the Information Security Governance, Risk, and Compliance (GRC) organization. This role offers exciting opportunities for growth and impact as KKR scales its business and continues to innovate. This role will assist in identifying, assessing, and tracking cybersecurity risk across the organization. You will help manage risk issues, collaborate with business and IT stakeholders, and support ongoing risk and compliance initiatives. This is an excellent opportunity for candidates looking to grow their career in information security and risk management. You will also be looking over the horizon, identifying future needs and exploring leading edge solutions.
Responsibilities
Support Cyber Risk Management Activities
- Assist in conducting cyber risk assessments on internal systems, third-party vendors, and emerging technologies.
- Help document and track identified risks, mitigation plans, and risk acceptances.
- Monitor remediation efforts and follow up on open risk issues with stakeholders.
Stakeholder Engagement
- Participate in meetings with business and technical stakeholders to gather information, identify, communicate risk issues, and support decision-making processes.
- Collaborate with internal teams to communicate risk findings and support risk-based decision-making in projects, operations, and vendor engagements.
Risk Documentation & Reporting
- Maintain accurate risk registers and documentation using GRC tools or tracking systems.
- Contribute to the development of risk reports and dashboards for management and audit purposes.
Compliance & Policy Support
- Help ensure alignment with internal security policies, standards, and applicable regulatory requirements (e.g., SOX, GDPR, NIS2 etc.).
- Assist in documenting and maintaining security governance artifacts including policies, procedures, and control mappings.
Continuous Improvement
- Identify opportunities for improving risk processes, tools, and reporting.
- Stay current on cybersecurity trends, threats, and regulatory developments.
Qualifications
- Bachelor's degree in Information Security, Information Systems, Computer Science, or a related field—or equivalent work experience.
- Foundational understanding of cybersecurity principles and risk management concepts.
- Strong written and verbal communication skills, especially with non-technical audiences.
- Ability to present ideas in a user and business-friendly manner
- Detail-oriented with outstanding organizational and documentation skills.
- Ability to work effectively in a team environment and build positive relationships.
- Team-player who enjoys working in a collaborative and collegial environment and is an active contributor as part of a global team
- Ability to work calmly under pressure and meet deadlines and solve problems requiring creativity, initiative and drive; self-motivated and enjoys a sense of pride in their accomplishments
- Strategic self-starter with an innovative mindset
KKR is an equal opportunity employer. Individuals seeking employment are considered without regard to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, sexual orientation, or any other category protected by applicable law.
Be The First To Know
About the latest Sap security analysts Jobs in Ireland !
Information Security Officer
Posted today
Job Viewed
Job Description
The Information Security Officer will play a key role in promoting cybersecurity best practices and ensuring regulatory compliance across two closely aligned business units. The position focuses on IT risk management, policy alignment, security operations, and user access governance, helping to protect systems, data, and users while enhancing the overall security posture. This is a mid level role.
Key Responsibilities:
IT Risk Management
- Identify, assess, document, and treat IT risks across systems, infrastructure, and processes.
- Maintain and update risk registers and Level 1 controls.
- Lead risk assessments, remediation efforts, and control improvement.
Policy & Compliance
- Ensure alignment with global and regulatory security standards (ISO 27001, NIST, GDPR).
- Enforce IT security policies and support audit and compliance readiness.
Security Operations
- Respond to and manage IT security incidents and escalations.
- Oversee identity and access management, including privileged access and user reviews.
- Deliver organisation-wide security awareness training.
Reporting & Governance
- Produce dashboards and reports detailing risk exposure and control effectiveness.
- Provide regular updates to management and leadership.
Candidate Profile:
Experience:
- Minimum 3 years in IT risk management, cybersecurity, or compliance.
- Proven ability to work across multiple teams or business units.
Skills:
- Familiar with security frameworks (ISO 27001, NIST), IT general controls, and GDPR.
- Strong analytical, organisational, and communication skills.
- Ability to explain technical risks in simple, business-focused terms.
Qualifications (Desirable):
- Degree in IT, Cybersecurity, or a related field.
- Security certifications such as ISO 27001, CISM, or CompTIA Security+.
What the Role Offers:
- Flexible working and a balanced work environment.
- Ongoing training and professional development support.
- Competitive salary with performance-based bonus.
- Strong internal culture focused on innovation, learning, and collaboration
Information Security Specialist
Posted today
Job Viewed
Job Description
Our client is looking for a
Cloud and Compliance Specialist
to join their team in Dublin for an 11 month hybrid position (3 days on site, 2 days remote)
Responsibilities:
- Support significant programs of work across various levels of XFNs in Cloud Security and Cloud GRC areas.
- Collaborate with team members and stakeholders to understand or identify defined work problems and program goals, obtain prioritized deliverables, and discuss program impact.
- Designing, implementing, and/or assessing security controls and frameworks
- Implement maturity frameworks across multiple programs factoring in emerging regulations and proactive detection of risks.
- Assess and document emerging regulatory impact on established policy and control frameworks
- Identify, communicate, and collaborate with relevant stakeholders within one or more teams to drive impact and work toward mutual goals.
- Establish learnings, best practices, standardized frameworks and tools across GRC and related teams.
- Develop detailed program/project plans in partnership with XFN teams.
- EU Security Office - Document compliance positions for NIS 2 and RED, support SRA delivery
- Cloud Security GRC - Conduct deep-dives into Cloud environments; document GRC-driven positions, and look for opportunities to improve Cloud Security Posture
Requirements:
- At least 5-7 years in Information Security.
- Deep and demonstrable familiarity with key Cloud Security, Risk Management and Compliance concepts Several years
- (5+) of hands-on security experience with at least one of the major CSPs (AWS, GCP, Azure)
- Experience in a GRC function overseeing Cloud implementations at scale
- Experience in designing and implementing control frameworks
- Experience in assessing security deficiencies in information systems and recommending mitigating controls in a corporate environment
Benefits:
- Competitive salary
- Healthcare contribution and inclusion in company pension scheme
- Work laptop and phone
- 25 days annual leave (pro-rata) plus paid bank holidays
- Expanding workforce with potential for career progression for top performers
Information Security Architect
Posted today
Job Viewed
Job Description
Our Dublin based client is looking for an Information Security Architect to join their team. This role requires technical expertise in security architecture combined with proven consultancy experience. This is a daily rate contract role offering excellent daily rates.
Key Responsibilities:
- Design, document, and maintain enterprise-level security architectures, reference models, and security controls frameworks.
- Align security architecture with business and IT strategies, ensuring consistency across on-premise, cloud, and hybrid environments.
- Act as a trusted advisor to senior stakeholders, translating business needs into secure technology solutions.
- Deliver workshops, assessments, and security briefings to executive and technical audiences.
- Provide independent security consultancy to multiple projects and programmes simultaneously.
- Develop business cases and roadmaps for security improvement initiatives.
- Lead risk assessments, threat modelling, and security gap analyses for projects and existing systems.
- Guide IT and development teams in implementing secure architectures and controls.
- Oversee the selection and deployment of security tools and technologies.
- Support incident response, forensic investigations, and remediation planning when required.
Essential Experience:
- 5+ years of professional experience in Security Architecture.
Educational Requirements:
- Degree in Computer Science, Information Technology, or a related discipline.
Benefits:
- Competitive daily rate.