21 Security Operations jobs in Ireland
Security Operations Manager
Posted today
Job Viewed
Job Description
About The Company:
OCS UK & Ireland is a leading facilities management company with 50,000+ colleagues and a turnover in excess of £2bn. We deliver innovative, award-winning services within facilities management, hard services, cleaning, security and catering.
Our mission is to make people and places the best they can be for our colleagues, customers and the communities we serve. Our commitment to doing business the right way is rooted in our TRUE values -
Trust, Respect, Unity, and Empowerment
About The Role:
Working Days: This role requires the candidate to be fully flexible 5 days over 7. This role will entail working weekends and evenings
Overall Purpose of the Role
Support the Operations team, ensure the profitable, efficient, and safe operations of contracts within the company
.
To provide quality service delivery to all clients in accordance with company procedures. To help and support existing business along with achieving relevant growth targets for new work.
Health & Safety Purpose: To take a direct interest in the health and safety of yourself, your colleagues and others who may be affected by your work activities.
Responsibilities
Main Duties & Responsibilities of the Role
- To ensure that a safe working environment is maintained through compliance with all company health and safety policies and procedures measured through auditing as required.
- To ensure compliance with company policies and procedures use of all internal systems.
- To ensure that appropriate staffing levels are maintained with the necessary skills and provide all necessary training and development to ensure their competence in their respective roles
- To ensure any HR issues are dealt with in the correct manner and timescales
- To ensure monthly QA's with clients are completed and submitted within timescales
- To ensure Monthly KPIs and reporting are adhered too.
- To ensure any site requests are responded to
- To ensure any requests by the Operations team and director of security are responded to and resolved in a timely fashion.
- To help other parts if the business as required
- Flexibility of working hours in required to carry out this role which is subject to weekends.
- Client engagement / relationship attributes are essential for this role
Health & Safety Duties
- Communicate regularly with staff through formal and informal channels on safety matters to ensure that there is a free flow of ideas and that morale remains high.
- Ensure that the OCS safety image is reflected positively through your actions and those of your subordinates.
- To direct activities of all subordinates, ensuring that they are properly trained to competently carry out their duties and responsibilities as well as ensuring that they acknowledge and accept a personal responsibility for safety.
- Take responsibility for ensuring that a safe system of work is produced and communicated to employees (subordinates) prior to the commencement of the work activity.
- Take responsibility for ensuring that plant and equipment is maintained and fit for purpose.
- Ensure that work activities are properly managed and supervised.
- Manage the Occupational Road Risk of those drivers under your control.
- Manage the safety performance of subordinates and take appropriate disciplinary action for any breaches in accordance with Company Procedure.
Group Safety Support:
You will be required to work closely with the Group Health and Safety team who are available to provide safety advice and support. Furthermore, you will be required to ensure that safety initiatives are implemented within your areas of control.
Experience
Security management experience operating within a multi-site / service sector environment (essential).
Security QQI Level 6 or above/ equivalent is desirable for this role
Proven track record in delivering effective customer service whilst maintaining appropriate operating margins.
Previous Experience (essential).
Proven experience of multi-client site functions.
Personal Characteristics/Attributes
Must be self-motivated and results orientated with effective inter – personal skills and the ability to communicate at all levels. Highly effective communication is essential for this role.
Highly organised with the ability to prioritise workload and delegate effectively to direct reports Ability to mentor and develop staff, counselling and coaching as necessary.
High degree of interest in their own personal development and future career progression
How to Apply:
If you are interested in joining a business that encourages professional development, career progression and the chance to work with inspirational people then please click apply and register your interest You can also sign up to our job alerts when registering which will notify you when other suitable vacancies are available.
We are an equal opportunities employer and rely on a diverse workforce with a broad range of knowledge, skills, and backgrounds to deliver our goals. We offer an inclusive and welcoming environment and actively encourage applications from all individuals regardless of race, gender, nationality, religion, sexual orientation, disability, or age.
Security Operations Analyst
Posted today
Job Viewed
Job Description
About the role
Reporting to the Security Operations Lead, the Security Operations Analyst will play an important support role in ensuring the security of Monument Re's information systems, networks and data. The role-holder will possess a solid understanding of security technologies and operational security practices and be responsible for monitoring system and application alerts, identifying potential risks and vulnerabilities, and triage and responding to or escalating security events of interest and incidents.
Responsibilities
- Operate and improve technical security controls, including SIEM, honeypots, EDR, vulnerability scanning, email scanning.
- Conduct the security monitoring, triage and response to day-to-day security events and incidents such as phishing attacks.
- Liaise with the externally managed Security Operations Centre (SOC) to ensure all use cases are in place and suspicious events are alerted, investigated, assessed and escalated.
- Provide incident response support to ensure the rapid containment, eradication and recovery from any security incidents, sometimes out of hours per an on-call rota.
- Perform threat hunting to proactively identify and manage potential threats.
- Assess threat intelligence sources for relevance to Monument Re and support defensive activity to mitigate identified threats.
- Support regular security assessments, vulnerability scans and penetration tests to identify and mitigate risks.
- Add security gaps merging from incidents and events to the security risk register and work with stakeholders and risk owners to support the delivery of agreed risk management actions.
- Collect the KPIs and KRIs that contribute to the periodic security reporting to various governance forums.
- Participate in the technical aspects of internal and external security audits.
- Ensure the security control requirements of DORA are met across the Monument Re Group.
- Stay current with latest threats, vulnerabilities and security technologies.
- Maintain documentation and playbooks for security operations procedures and processes.
Role Requirements
- Minimum of 1-3 years' experience in similar technical security or security operations role.
- Experience of working in a regulated environment, ideally financial services.
- Hold a relevant technical security certification (ISC2, SANS GIAC, vendor-specific) or equivalent training/experience
- Demonstratable experience of using industry leading SIEM, EDR and vulnerability management tooling such as Rapid 7 IDR and IVM tooling, Windows Defender, Abnormal Security and industry threat intelligence services such as Recorded Future and the FS-ISA
- Experience of incident response activities, particularly during high pressure situations where experience and good decision making supported the triaging, containment and recovery from a security incident.
- Experience with working in partnership with IT, GRC and Technical Security teams.
- An understanding of DORA and the regulatory requirements for maintaining Operational Resilience.
- Willingness to join an on-call rota to provide backup for the current 24 x 7 x 365 Managed Detection & Response (MDR) services.
- Must have high attention to detail; be a self-starter and able to prioritize in a fast moving, high pressure, constantly changing environment
- Good interpersonal, written and verbal communications skills to engage with internal
- Excellent English language skills. French language skills desirable
- Proactive approach with an eagerness to learn & develop
Location
Dublin, Ireland. Hybrid
Closing Date
28th November 2025
Equal Opportunities Statement
Monument Re Group is an Equal Opportunity employer. Our Corporate values of Trust and Collaboration demonstrate our commitment to fostering an inclusive culture where all our employees feel respected and valued. We recognise that each employee brings their own unique skill sets, capabilities, immutable characteristics, and varied experiences to their work. In turn, the Monument Re Group provides a work environment for all our employees to achieve personal and professional growth and development throughout their careers with us.
Email:
About us
Regional Security Operations Associate
Posted today
Job Viewed
Job Description
We are seeking a highly qualified and experienced Regional Security Operations Associate to join our team. The successful candidate will be responsible for serving as the primary link between field operations and the Corporate Security Program, ensuring the communication and enforcement of security standards and policies. This role involves providing guidance to clients and security vendors, overseeing incident response planning, conducting security investigations, and ensuring compliance with established standards. The Regional Security Operations Associate will also play a key role in assessing security vulnerabilities, recommending corrective actions, and contributing to retrofit and new construction projects.
Responsibilities:
- Serve as the conduit to field operations for communication and enforcement of CyrusOne Corporate Security Program to include: corporate security standards and policies.
- Provide guidance to client and security vendors regarding security program; identify gaps and recommend corrective action if needed.
- Assist CyrusOne Security leadership with development and implementation of consistent standards, policies, and procedures across the CyrusOne facility portfolio.
- Ensure Guard Service Vendor institutes consistent post orders and system maintenance procedures across the CyrusOne facility portfolio.
- Assist incident response planning, programs for assigned campus
- Monitor incident response by guard vendor ensuring compliance with post orders.
- Monitor client incident reporting system and ensure site response is appropriate.
- Perform security vulnerability assessments of operations and facilities based upon client requirements and industry best practices.
- Participate/lead security investigations within assigned campus regarding all policy, criminal violations.
- Survey all security operations to recommend operational efficiencies resulting in cost savings or increased productivity.
- Escalate critical issues to CyrusOne Security leadership.
- Prepare well documented investigative and security assessment reports.
- Assist with retrofit and new construction projects, to ensure CyrusOne standards are adhered to.
- Assist with handoff after completion of retrofit and construction projects to ensure daily operations are fully functional.
Qualifications:
- Minimum 5 years of direct oversight/involvement with security operations and programs.
- Minimum 3 years' experience with security investigations, interviewing.
- Minimum 3 years' experience in standard, policy, procedure development.
- Strong organizational skills and collaborative management style needed.
- Must be an intelligent, articulate and persuasive communicator who can discuss security-related concepts with a broad range of technical and non-technical staff.
- Must have experience with design and implementation of security controls.
- Strong understanding of physical access technology and systems, or data center practices and procedures.
- Ability to develop and administer the enforcement of policy and procedures firmly, tactfully, and with consistency.
- Strong commitment to customer service.
- Ability to establish and maintain effective professional relationships with a diverse group of individuals, both internal and external to the company.
- Excellent oral and written communication skills, ability to stay organized in a dynamic environment.
- Willingness to adjust hours and be flexible as required by the business to include being onsite for extended hours during emergency situations such as emergency incidents.
Education:
- Bachelor's Degree or equivalent experience, with a focus on physical security.
CyrusOne is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or other legally protected status.
CyrusOne provides reasonable accommodation for qualified individuals with disabilities in accordance with the Americans with Disabilities Act (ADA) and any other state or local laws. We will respond to requests for reasonable accommodations to assist you in applying for positions at CyrusOne, or to submit a resume.
Principal Security Operations Analyst
Posted today
Job Viewed
Job Description
- 6+ years experience in a SOC, Incident Response, or Forensics role
- Ability to explain possible complex alerts/events in a non-complex way, both written and verbal
- Proven mentoring experience and skills to junior team members, helping them to grow individually and as a team
- Understanding of Malware Analysis (Configuration of isolated Malware Analysis VM, Identification of File Formats, Basic Static & Dynamic analysis)
- Demonstrated experience with Windows and/or MacOS as an attack surface
- Strong understanding and experience with Threat Actor Tools and techniques: (MITRE ATT&CK Framework, PowerShell & Command Prompt Terminals, WMIC, Scheduled Tasks, SCM, Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, Basic Defense Evasion Techniques, other offensive/Red Team TTPs)
- Strong experience with Windows Administration or Enterprise Domain Administration and upkeep (Active Directory, Group Policy, PowerShell, Windows Server Update Service, and Domain Trusts)
- Strong experience with M365/Cloud attack techniques
- Demonstrated equivalent of self-guided study experience or Bachelor's degree in Information Technology, Computer Science, System Administration, or cybersecurity
- Experience with scripting languages (such as PowerShell, Python, Bash, PHP, JavaScript, or Ruby)
- Demonstrated experience on platforms like HackTheBox, TryHackMe, Blue Team Labs Online, etc
- Participation in cybersecurity competitions such as Capture the Flags, the Collegiate Cyber Defense Competition, etc
- Familiarity with MSP tools such as RMMs
- Previous experience in an MSP/MSSP/MDR role
- Reports to: Manager, Security Operations Analyst- EMEA
- Huntress is looking for a Principal Security Operations Center Analyst based in the the UK or Ireland to join our quickly growing team
- In this role, you will triage, investigate, respond to, and remediate intrusions daily
- You'll be surrounded by passionate individuals who are mission-driven to help protect companies worldwide from cyber-attacks
- This person will also mentor junior team members, allowing them to grow individually and as a team
- The Huntress Security Operations Center is an elite team that wakes up daily to combat threat actors
- You will have daily opportunities to progress your analysis skills while being at the forefront of what's happening in the wild
- With the chance to work on various incidents alongside a skilled team, you'll have the opportunity to accelerate your career and skills, too
- Function as the lead liaison between the SOC and other Product and Research teams
- Build automation to help reduce the workload on the SOC through report template creation
- Own and complete investigative objectives associated with multi-host intrusions without assistance
- Triage, investigate, and respond to alerts coming in from the Huntress platform
- Perform tactical forensic timelining and analysis to determine the root cause of attacks where possible and provide remediations needed to remove the threat
- Perform advanced malware analysis as part of investigating systems and identities
- Investigate suspicious Microsoft M365 activity and provide remediations
- Assist in escalations from the product support team for threat-related and SOC-relevant questions
- Assist our SOC Support team by engaging with customers via video/phone to explain or describe activity observed by the SOC when needed
- Contribute to detection efforts by helping to create or request net new detections as well as tuning detections
- Provide technical mentorship of more junior team members
- Contribute regularly to external facing Huntress content such as blogs, webinars, presentations, and speaking engagements
- 100% Remote: We've been a remote team from day one—and we've got the tools, systems and processes to be successful from anywhere in the world.
- PTO & Parental Leave: We offer 12 weeks of paid parental leave, along with vacation, sick time and floating holidays.
- 401K Match: We offer a 5% contribution to your 401k—even if you're not paying into it yourself.
- Growth Opportunities: We're super committed to employee development, both within and outside of Huntress – including education assistance programs, hands-on training and more.
- Health Benefits: Medical, dental, vision, and everything you'd expect from a company that cares about its team members.
- Stock Options: All full-time employees get stock options and benefit from the continued growth and success of the company.
Security Operations Center Analyst
Posted today
Job Viewed
Job Description
Network SOC Engineer – Level 2
Location: Dublin City Centre
Contract Type: 6-Month Daily Rate Contract
Job Description:
Our client, a large organisation in the financial services sector, is seeking an experienced Level 2 Network SOC Engineer to support and enhance their security operations. The ideal candidate will bring proven experience with email encryption, Zscaler technologies, and web application firewalls.
Job Responsibilities
- Monitor and manage network and security infrastructure as part of the SOC team at Level 2 capacity.
- Identify, triage, and respond to security incidents using established processes and tools.
- Utilise and maintain email encryption technologies to secure communication channels.
- Operate and troubleshoot Zscaler Internet Access and Private Access services.
- Maintain, configure, and monitor Web Application Firewalls (WAFs) for optimal performance and security.
- Collaborate with other internal teams to resolve complex network and security issues.
- Prepare incident reports and provide insights into recurring security events.
- Support the implementation of security best practices and continuous improvement initiatives.
Experience Required
- Minimum of 4 years of experience working in a SOC or network security engineering role.
- Strong hands-on experience with email encryption platforms.
- Practical experience configuring and supporting Zscaler technologies.
- Proficiency with Web Application Firewalls (e.g. Fortinet, F5, or similar).
- Familiarity with network security monitoring and incident response processes.
Desirable Skills
- Exposure to SIEM tools such as Splunk or QRadar.
- Experience working within financial services or other regulated environments.
- Relevant certifications (e.g. CompTIA Security+, CEH, GIAC, Zscaler certifications).
- Understanding of secure networking principles and threat intelligence.
Educational Requirements
- Bachelor's degree in Computer Science, Information Security, or a related field is preferred.
HOW TO APPLY:
If you are interested in this role, please apply for this role with your updated CV
Shift Lead Security Operations
Posted today
Job Viewed
Job Description
Triage Shift Lead, Security Operations
Cork, Ireland
At Arctic Wolf, we're not just navigating the cybersecurity landscape - we're redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: we've earned recognition on the
Forbes Cloud 100, CNBC Disruptor 50, Fortune Future 50, and Fortune Cyber 60
lists, and we recently took home the
2024 CRN Products of the Year
award. We're proud to be named a
Leader
in the
IDC MarketScape
for Worldwide Managed Detection and Response Services and earning a
Customers' Choice
distinction from
Gartner Peer Insights
. Our
Aurora Platform
also received
CRN's Products of the Year
award in the inaugural
Security Operations Platform
category. Join a company that's not only leading, but also shaping, the future of security operations.
Our mission is simple: End Cyber Risk. We're looking for a
Triage Shift Lead, Security Operations
in
Cork, Ireland
to be a part of making this happen.
About The Role
The Triage Shift Lead, Security Operations is responsible for all day-to-day team operations of the SOC (Security Operations Center) Triage Security Engineers and Analysts. The team delivers 24x7x365 detection, response, and customer engagement for our portfolio of services. The Triage Shift Lead will own resolving tactical issues, customer escalations, ensure accuracy of shift handovers, and see to it that the shift is operating at the desired throughput and execution excellence. The Shift Lead will be responsible for the day-to-day operational SLO metrics attainment, prioritization of shift work, and acting as the escalation point for all Security Analysts and Engineers. This team member is a technical individual with a desire to lead a highly cohesive team and can act as a stand-in for all levels of triage. The successful candidate is extremely well organized and has excellent communication skills. This team member is the first point of escalation for all shift team members and possesses the ability to effectively drive the assigned team to meet shift goals.
The Triage Shift Lead will be part of a shift rotation of days, nights, and weekends, and will manage the tactical elements of both outbound and inbound triage and handovers. This team member will have clean and crisp handovers to incoming shifts, and all customer escalations are handled proactively, promptly, and with the required level of urgency. This candidate will ensure that processes are adhered to and will help evolve the day-to-day aspects of the nuances of shift handovers.
This role reports to the Director of Security Operations and will provide effective feedback and suggestions on ways to improve. The ability to influence all different shift team members is a skill that this candidate possesses.
This role is a shift-based role that will average out to 40 hours / week comprised of various nights, weekends, and day shifts as part of a regular rotation.
- Manage the day-to-day escalations, shift handovers, and execution of the shift teams for both inbound and outbound triage.
- Strive to get the best out of each team member on shift by setting goals, measuring execution of the goals, providing feedback, and removing obstacles.
- Act as the escalation point for all tactical aspects of the role including customer escalations and internal communications.
- Facilitate with other Triage Shift Leads, strong alignment, and cohesion across teams.
- Ensure all S2 service level SLO's are monitored, execute resourcefully when staffing requirements demand.
- Provides leadership during security events. Ensure that team members can perform their role effectively and follow the proper process to full success within the team delivering high value to customers. Additionally, it may be required to generate a report of major security incidents as assigned.
- Develop, enhance, measure, and leverage metrics to make better informed decisions on how to improve the shift throughput, cohesion, and adherence to SLOs.
- Understand volume-driven leading indicators and jump in when needed for any role that requires support while on shift.
Required Skills and Experience:
- A degree in Cybersecurity or equivalent and/or experience working and managing within a Security Operations Center or Network Operations Center.
- Desire to lead technically minded individual contributors.
- Passion for Cybersecurity. Continually learning new attack vectors, new threats, and security framework expertise.
- Knowledge of industry adopted frameworks and methodologies (MITRE ATT&CK, CIS, NIST, ISO, PCI-DSS, etc.)
- Proven ability to rapidly analyze complex technical security threats and incident information to be able to communicate business-impacting risk to non-technical audiences.
- Ability to work independently, manage projects, and exercise judgement in reaching solutions.
- Strong verbal and written communication required. Must be able to articulate written information to customers.
- Team player – always looking out for peers, leaders, and other stakeholders within Arctic Wolf.
- You will be required to attend training, seminars, conferences, and webinars relevant to job role to enhance current knowledge base and skill set to improve job performance and efficiency.
- German and English language skill
And You May Have These Additional Skills And Experience
- Experience with Elastic Stack, Kibana, and/or Zendesk a plus
- Education such as Bachelor's or Master's Degree in the areas of IT/Computer Science or Cybersecurity as desirable
- Other industry certifications such as CISSP, CASP, and other security operations relevant certifications are desirable.
About Arctic Wolf
At Arctic Wolf, we foster a collaborative and inclusive work environment that thrives on diversity of thought, background, and culture. This is reflected in our multiple awards, including
Top Workplace USA
,
Best Places to Work – USA
,
Great Place to Work – Canada
,
Great Place to Work – UK
(2024), and
Kununu Top Company – Germany
Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction, with over 7,000 customers worldwide and more than 2,000 channel partners globally. As we continue to expand globally and enhance our technology, Arctic Wolf remains the most trusted name in the industry.
Our Values
Arctic Wolf recognizes that success comes from delighting our customers, so we work together to ensure that happens every day. We believe in diversity and inclusion, and truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate that—by protecting people's and organizations' sensitive data and seeking to end cyber risk— we get to work in an industry that is fundamental to the greater good.
We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity here.
We also believe and practice corporate responsibility, and have recently joined the Pledge 1% Movement, ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities.
All Wolves Receive Compelling Compensation And Benefits Packages, Including
- Equity for all employees
- 28 days annual leave, 10 public holidays and paid volunteering days off
- Comprehensive private benefits plan including medical, mental health, dental, disability, and value-added services
- Pension Plan with employer contribution
- Robust Employee Assistance Program (EAP) with mental health service
- Employee Discount Program with Beneplace
Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, orientation, national origin, age, disability, genetics, or any other basis forbidden under federal, provincial, or local law. Arctic Wolf is committed to fostering a welcoming, accessible, respectful, and inclusive environment ensuring equal access and participation for people with disabilities. As such, we strive to make our entire employee experience as accessible as possible and provide accommodations as required for candidates and employees with disabilities and/or other specific needs where possible. Please let us know if you require any accommodations by emailing
Security Requirements
- Conducts duties and responsibilities in accordance with AWN's Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information (in accordance with our employee handbook and corporate policies).
- Background checks are required for this position.
Ready to Make an Impact?
Apply now with your resume—and if available, your references or work samples. Join one of the fastest-growing and most innovative cybersecurity companies in the world.
Principal Security Operations Analyst- Ireland
Posted today
Job Viewed
Job Description
Reports to: Manager, Security Operations Analyst- EMEA
Location: Remote Ireland
Compensation Range: €103,150 to €33,650 base plus bonus and equity
What We Do:
Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Whether creating purpose-built security solutions, hunting down hackers, or impacting our community, our people go above and beyond to change the security game and make a real difference.
Founded in 2015 by former NSA cyber operators, Huntress protects all businesses—not just the 1%—with enterprise-grade, fully owned, and managed cybersecurity products at the price of an affordable SaaS application. The Huntress difference is our One Team advantage: our technology is designed with our industry-defining Security Operations Center (SOC) in mind and is never separated from our service.
We protect 4M+ endpoints and 7M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do. As long as hackers keep hacking, Huntress keeps hunting.
What You'll Do:
Huntress is looking for a Principal Security Operations Center Analyst based in the UK or Ireland to join our quickly growing team. In this role, you will triage, investigate, respond to, and remediate intrusions daily. You'll be surrounded by passionate individuals who are mission-driven to help protect companies worldwide from cyber-attacks. This person will also mentor junior team members, allowing them to grow individually and as a team.
The Huntress Security Operations Center is an elite team that wakes up daily to combat threat actors. You will have daily opportunities to progress your analysis skills while being at the forefront of what's happening in the wild. With the chance to work on various incidents alongside a skilled team, you'll have the opportunity to accelerate your career and skills, too.
Responsibilities:
- Function as the lead liaison between the SOC and other Product and Research teams
- Build automation to help reduce the workload on the SOC through report template creation
- Own and complete investigative objectives associated with multi-host intrusions without assistance
- Triage, investigate, and respond to alerts coming in from the Huntress platform
- Perform tactical forensic timelining and analysis to determine the root cause of attacks, where possible, and provide remediations needed to remove the threat
- Perform advanced malware analysis as part of investigating systems and identities
- Investigate suspicious Microsoft M365 activity and provide remediations
- Assist in escalations from the product support team for threat-related and SOC-relevant questions
- Assist our SOC Support team by engaging with customers via video/phone to explain or describe activity observed by the SOC when needed
- Contribute to detection efforts by helping to create or request net new detections, as well as tuning detections
- Provide technical mentorship to more junior team members
- Contribute regularly to external-facing Huntress content such as blogs, webinars, presentations, and speaking engagements
What You Bring To The Team:
- 6+ years of experience in a SOC, Incident Response, or Forensics role
- Ability to explain possible complex alerts/events in a non-complex way, both written and verbal
- Proven mentoring experience and skills to junior team members, helping them to grow individually and as a team
- Understanding of Malware Analysis (Configuration of isolated Malware Analysis VM, Identification of File Formats, Basic Static & Dynamic analysis)
- Demonstrated experience with Windows and/or macOS as an attack surface
- Strong understanding and experience with Threat Actor Tools and techniques: (MITRE ATT&CK Framework, PowerShell & Command Prompt Terminals, WMIC, Scheduled Tasks, SCM, Windows Domain and host Enumeration Techniques, Basic Lateral Movement Techniques, Basic Persistence Mechanisms, Basic Defense Evasion Techniques, other offensive/Red Team TTPs)
- Strong experience with Windows Administration or Enterprise Domain Administration and upkeep (Active Directory, Group Policy, PowerShell, Windows Server Update Service, and Domain Trusts)
- Strong experience with M365/Cloud attack techniques
- Demonstrated equivalent of self-guided study experience or Bachelor's degree in Information Technology, Computer Science, System Administration, or cybersecurity
Preferred Qualifications:
- Experience with scripting languages (such as PowerShell, Python, Bash, PHP, JavaScript, or Ruby)
- Demonstrated experience on platforms like HackTheBox, TryHackMe, Blue Team Labs Online, etc.
- Participation in cybersecurity competitions such as Capture the Flag, the Collegiate Cyber Defense Competition, etc.
- Familiarity with MSP tools such as RMMs
- Previous experience in an MSP/MSSP/MDR role
What We Offer:
- 100% remote work environment - since our founding in 2015
- New starter home office set-up allowance (€480 /li>
- Generous personal leave entitlements
- Digital monthly reimbursement ( 1)
- Travel to the US 1-2 times/year for various company events
- Pension
- Access to the BetterUp platform for coaching, personal, and professional growth
Huntress is committed to creating a culture of inclusivity where every single member of our team is valued, has a voice, and is empowered to come to work every day just as they are.
We do not discriminate based on race, ethnicity, color, ancestry, national origin, religion, sex, sexual orientation, gender identity, disability, veteran status, genetic information, marital status, or any other legally protected status.
We do discriminate against hackers who try to exploit businesses of all sizes.
Accommodations:
If you require reasonable accommodation to complete this application, interview, or pre-employment testing or participate in the employee selection process, please direct your inquiries to
. Please note that non-accommodation requests to this inbox will not receive a response.
If you have questions about your personal data privacy at Huntress, please visit our
privacy page
.
Be The First To Know
About the latest Security operations Jobs in Ireland !
Head of Cloud Enablement and Security Operations
Posted today
Job Viewed
Job Description
Who are we looking for?
We are seeking a strategic, technically strong, and hands-on Head of Cloud Enablement and Security Operation (SecOps) to lead the design, implementation, and governance of our cloud platforms This role requires deep technical expertise in cloud infrastructure and security practices, along with proven experience in leading a cloud-first operating model across complex enterprise environments. The ideal candidate will drive cloud adoption, ensure secure and scalable infrastructure, and enable teams across the organization to fully leverage cloud technologies for innovation, operational agility, and cost efficiency.
What are the minimum requirements you need for the role?
- 10+ years of progressive experience in IT infrastructure and cloud technologies, with at least 3–5 years in a leadership role driving cloud-first strategies.
- Bachelor's or Master's degree in Computer Science, Information Security, Engineering, or a related field.
- Deep technical expertise in designing, deploying, and managing cloud platforms (AWS, Azure, GCP), including infrastructure as code (IaC), automation, and containerization (e.g., Terraform, Kubernetes, Docker).
- Proven track record of leading enterprise-wide cloud transformations and operating in a cloud-first environment.
- Strong understanding of cloud security principles, identity and access management (IAM), encryption, and compliance frameworks (e.g., ISO 27001, SOC 2, GDPR).
- Experience implementing and managing modern DevOps practices, CI/CD pipelines, and monitoring tools.
- Proven experience managing outsourced service operations and vendor relationships.
What is your role and your responsibilities?
- Define and lead the execution of a comprehensive cloud enablement strategy aligned with business objectives.
- Champion a cloud-first operating model, driving cultural and process change across the organization.
- Identify and prioritize workloads for cloud migration, modernization, or retirement to support the Technology Foundations and Business Delivery priorities.
- Establish cloud governance frameworks, including tagging, cost allocation, and usage policies.
- Build, mentor, and lead a high-performing team of cloud engineers, architects, and security specialists to deliver prioritised solutions and achieve their company specific career aspirations.
- Responsible for managing outsourced service operations relationships and delivery elements to ensure delivery excellence.
- Working with the senior Technology Leadership team to deliver solutions that support their teams objectives. Serve as a trusted advisor to senior leadership on cloud strategy, innovation, and risk.
- Monitor and optimize cloud performance, availability, and cost efficiency, ensuring alignment with SLAs and budget targets.
- Staying on top of technology trends and developments.
- Enabling capability uplift by collaborating with other accountable members of the Technology team to achieve agreed goals/targets.
- Working with accountable role holders to ensure the use of metrics (e.g., velocity, cycle time, and DORA or equivalent) are institutionalised to optimise team performance and drive continuous improvement.
- Partnering with teams within and outside of Technology to help execute on important strategic initiatives, while driving operational scale and efficiency.
- Communicating clear priorities, activities, and desired outcomes and ensuring appropriate and fit for purpose governance, prioritisation and decision making is in place.
- Developing goals for direct reports / team, and regular reporting of same to monitor overall performance and ensure tracking against achieve desired outcomes.
- Upholding Carne's key cultural and operating principles and values.
- Performing other duties and responsibilities as required.
What Competencies do you require?
- Ability to set direction, influence senior stakeholders, and align service assurance initiatives with broader business and technology goals.
- Proven capability in managing service performance, infrastructure reliability, and continuous improvement through metrics and KPIs.
- Skilled in building and maintaining strong relationships with third-party service providers and internal stakeholders to ensure delivery excellence.
- Strong coaching and mentoring skills to lead high-performing teams and support career development within the function.
- Confident in making timely decisions, managing risk, and taking ownership of outcomes in a complex, fast-paced environment.
Who is Carne Group?
Carne Group has established itself in the funds industry with $2tn in AUM supported by 600+ staff and four regulated management companies. Together with a large team of industry specialists, Carne serves more than 650+ traditional and alternative asset management clients from key fund jurisdictions and financial hubs including Ireland, Luxembourg, Zurich, Lisbon, London, New York, Cayman and Channel Islands.
Excellence and innovation are central to Carne's work and we are committed to attracting and retaining the best talent to deliver an unrivalled service to our clients. Whilst working with Carne, you will be provided with opportunities to develop your skills and experience by working in a dynamic, innovative, and multicultural environment where exciting careers are built.
We love hearing from anyone who is enthusiastic about changing the asset management industry. Not sure if you meet all the requirements? Let us decide Research shows that members of other under-represented groups tend not apply to jobs when they think they may not meet every qualification, when in fact, they do At Carne we are committed to creating a diverse and inclusive environment and strongly encourage you to apply.
8-month Internship Program: Cyber Security Operations Centre Analyst Intern
Posted today
Job Viewed
Job Description
*Who We Are Looking For:
This opportunity is ideal for individuals interested in contributing to our team as a
Cyber Security Operations Center Analyst intern *
within State Street's Global Technology Services organization. Our technology function, Global Technology Services (GTS), is vital to State Street and is the key enabler for our business to deliver data and insights to our clients. We're driving the company's digital transformation and expanding business capabilities using industry best practices and advanced technologies. The ideal candidate leads with integrity, embraces creativity, and invests in personal growth. This role requires a collaborative mindset, a passion for innovation, and the ability to inspire others.
Our
8-month Intern Programme
Is Designed For The High Potential Students, Like You, Into Our Most Impactful Roles Preparing You For Future Success. From Day One You Will Be Exploring Collaborative And Dynamic Environment Company Culture And You Will Receive:
- A structured learning and development programme, specific job-related trainings, professional development and soft skills trainings
- A buddy who can offer you their experience, knowledge and guidance throughout your internship.
- Dedicated networking events for the Interns.
- Leadership and business-related sessions with Senior Management.
- Possibility to grow your professional network by joining an Employee Committees include: Professional PWN, Families Network, Disability & Inclusion Network, Pride & Friends Network, Environmental Sustainability Network.
Programme dates: 12th January 2026 – 31st August 2026
You must be available to participate in the programme in person in Republic of Ireland, starting from day one and for its full duration. You must be available to participate in the program in person, starting from day one and for its full duration and you are required to
work from the office 5 days a week.
*What You Will Do:
In this role, you will perform the following day-to-day activities: *
- Monitor and detect cybersecurity events and incidents in real time using centralized systems.
- Analyze alerts and data from multiple sources including SIEM, intrusion detection systems, endpoint protection, antivirus, and firewalls.
- Respond to and contain security incidents, and assist in identifying eradication and recovery strategies.
- Collaborate with teams across the Cyber Fusion Center, including Advanced Threat, Cyber Threat Intelligence, Vulnerability Management, Content Development, and GRC.
- Communicate incident status and findings to lead analysts and managers.
- Contribute to process improvements and explore new technologies or capabilities to enhance security operations.
- Participate in knowledge sharing and mentorship activities to support the Fusion Center's collaborative and global response model.
*In This Role, You Will Have: *
- Engagement in meaningful daily work: You'll take ownership of specific tasks and projects, gaining hands-on experience and building confidence through real contributions.
- A supportive learning environment: You'll exercise your judgment in a guided setting, with mentorship and supervision to help you grow.
- Focused skill development: This role is designed to help you deepen your expertise in a specific area.
- Clear structure and expectations: You'll work within well-defined parameters, giving you the clarity and focus to succeed.
- Independent contributions: You'll have the opportunity to make an impact through your individual contributions while collaborating with a supportive team.
- Focus on growth: While there are no people management responsibilities with this role, it is a great stepping stone for future leadership opportunities.
- A collaborative team culture: You'll build strong working relationships with your peers and supervisor, gaining valuable experience in a professional environment.
*Education And Preferred Qualifications: *
- 3rd Year Students with a dedicated Internship Placement pursuing degrees in Computer Science or Information Technology with specializations in Network Security, Cloud Security, Data Analytics, Incident Response, or related disciplines who are interested in converting to a full-time role post-graduation
- Enthusiastic about building a long-term career in a dynamic, technology-driven organization
- Effective communicators with the ability to collaborate in a team-oriented environment
- Open to feedback and committed to continuous learning and improvement
- Motivated by real-world problem solving and eager to contribute innovative ideas
Candidates should exhibit working knowledge of the following key skills and proficiencies:
- Network Security
- Forensic Computing
- Cybersecurity
- Cloud Computing
- TCP/IP Networking
- Operating Systems (OS)
*Nice To Have Skills: *
- Data Analytics
- Monitoring Tools
- Incident Management
*About State Street: *
Across the globe, institutional investors rely on us to help them manage risk, respond to challenges, and drive performance and profitability. We keep our clients at the heart of everything we do, and smart, engaged employees are essential to our continued success.
Our promise to maintain an environment where every employee feels valued and able to meet their full potential infuses our company values. It's also part of our commitment to inclusion, development and engagement, and corporate social responsibility. You'll have tools to help balance your professional and personal life, paid volunteer days, and access to employee networks that help you stay connected to what matters to you. Join us.
State Street is an Affirmative Action/Equal Opportunity Employer/Vet/Disability.
Discover more information on Ireland jobs at
*About State Street *
Across the globe, institutional investors rely on us to help them manage risk, respond to challenges, and drive performance and profitability. We keep our clients at the heart of everything we do, and smart, engaged employees are essential to our continued success.
We are committed to fostering an environment where every employee feels valued and empowered to reach their full potential. As an essential partner in our shared success, you'll benefit from inclusive development opportunities, flexible work-life support, paid volunteer days, and vibrant employee networks that keep you connected to what matters most. Join us in shaping the future.
As an Equal Opportunity Employer, we consider all qualified applicants for all positions without regard to race, creed, color, religion, national origin, ancestry, ethnicity, age, disability, genetic information, sex, sexual orientation, gender identity or expression, citizenship, marital status, domestic partnership or civil union status, familial status, military and veteran status, and other characteristics protected by applicable law.
Discover more information on jobs at
Read our CEO Statement
Job ID: R-
8-month Internship Program: Cyber Security Operations Centre Analyst Intern
Posted today
Job Viewed
Job Description
Who We Are Looking For
This opportunity is ideal for individuals interested in contributing to our team as a
Software Engineering intern
within State Street's Global Technology Services organization. Our technology function, Global Technology Services (GTS), is vital to State Street and is the key enabler for our business to deliver data and insights to our clients. We're driving the company's digital transformation and expanding business capabilities using industry best practices and advanced technologies. The ideal candidate leads with integrity, embraces creativity, and invests in personal growth. This role requires a collaborative mindset, a passion for innovation, and the ability to inspire others.
Role
Our
8-month Intern Programme
is designed for the high potential students, like you, into our most impactful roles preparing you for future success. From day one you will be exploring collaborative and dynamic environment company culture and you will receive:
- A structured learning and development programme, specific job-related trainings, professional development and soft skills trainings
- A buddy who can offer you their experience, knowledge and guidance throughout your internship.
- Dedicated networking events for the Interns
- Leadership and business-related sessions with Senior Management
- Possibility to grow your professional network by joining an Employee Committees include: Professional PWN, Families Network, Disability & Inclusion Network, Pride & Friends Network, Environmental Sustainability Network
Programme dates: 12th January 2026 – 31st August 2026
You must be available to participate in the programme in person in Republic of Ireland, starting from day one and for its full duration. You must be available to participate in the program in person, starting from day one and for its full duration and you are required to
work from the office minimum 4 days a week.
What You Will Do
In this role, you will perform the following day-to-day activities:
- Design and develop secure applications that support identity and access management workflows, including authentication, authorization, and user provisioning, aligned with cybersecurity best practices and compliance standards and deploying to Cloud environments.
- Build and manage databases using a combination of database technologies
- Create responsive user interfaces with HTML, CSS, JavaScript, and frameworks like React or Angular
- Write unit and integration tests
- Participate in design and code reviews
- Collaborate with cross-functional teams to manage dependencies, identify risks, and deliver solutions
In This Role, You Will Have
- Engagement in meaningful daily work: You'll take ownership of specific tasks and projects, gaining hands-on experience and building confidence through real contributions.
- A supportive learning environment: You'll exercise your judgment in a guided setting, with mentorship and supervision to help you grow.
- Focused skill development: This role is designed to help you deepen your expertise in a specific area.
- Clear structure and expectations: You'll work within well-defined parameters, giving you the clarity and focus to succeed.
- Independent contributions: You'll have the opportunity to make an impact through your individual contributions while collaborating with a supportive team.
- Focus on growth: While there are no people management responsibilities with this role, it is a great stepping stone for future leadership opportunities.
- A collaborative team culture: You'll build strong working relationships with your peers and supervisor, gaining valuable experience in a professional environment.
Education And Preferred Qualifications
- 3rd Year Students students pursuing degrees in Software Engineering, Application Development, Data Analytics, Artificial Intelligence, or related technical disciplines who are interested in converting to a full-time role post-graduation
- Enthusiastic about building a long-term career in a dynamic, technology-driven organization
- Effective communicators with the ability to collaborate in a team-oriented environment
- Open to feedback and committed to continuous learning and improvement
- Motivated by real-world problem solving and eager to contribute innovative ideas
Certification Nice To Haves
- AWS/Azure Certified practitioner
- AWS/Azure SysOps Administrator or equivalent
- Scrum Master
- B.S. Computer Science/Engineering or related fields
- AI Certifications
- Data Analytics Certifications
- Java Certifications
- Python Certifications
- Cybersecurity certifications
Candidates should exhibit working knowledge of the following key skills and proficiencies:
- Application Development
- Database Management
- Analytical Thinking
- Problem Solving
- Data Analytics
- JavaScript
- Java
Nice To Have Skills
- Software Development Life Cycle (SDLC)
- Cloud Computing
- Identity Access Management (IAM)
About State Street
Across the globe, institutional investors rely on us to help them manage risk, respond to challenges, and drive performance and profitability. We keep our clients at the heart of everything we do, and smart, engaged employees are essential to our continued success.
Our promise to maintain an environment where every employee feels valued and able to meet their full potential infuses our company values. It's also part of our commitment to inclusion, development and engagement, and corporate social responsibility. You'll have tools to help balance your professional and personal life, paid volunteer days, and access to employee networks that help you stay connected to what matters to you. Join us.
State Street is an Affirmative Action/Equal Opportunity Employer/Vet/Disability.
Discover more information on Ireland jobs at
Job ID: R-