174 Software Security jobs in Ireland
Vulnerability Assessment Supervisor, International Protection
Posted today
Job Viewed
Job Description
Reporting Relationship
- Reports to the Manager, Vulnerability Assessments
Working Relationships
- You will work with a multidisciplinary team at City West including the IPAS Welfare Team, Dept of Social Protection, NGOs and other stakeholders.
About the Role:
Supervision and Team Leadership
- Lead, supervise, and support a team of Vulnerability Assessment Officers.
- Monitor team performance to ensure adherence to organisational policies, procedures, and ethical standards.
- Provide regular feedback and conduct performance evaluations.
Operational Oversight
- Ensure assessments are conducted in line with evidence-based approach, respect the "do no harm" principle and best practices.
- Review and approve assessment reports for accuracy, thoroughness, and compliance with legal and ethical guidelines.
Quality Assurance and Compliance
- Implement and maintain quality control processes to uphold high standards of service delivery.
- Stay updated on relevant international human rights and international protection law frameworks, and Ireland's international protection and migration governance systems.
- Ensure team compliance with duty of care principles, informed consent protocols, and best interest determinations, especially for children.
Stakeholder Engagement
- Act as a liaison between the Vulnerability Assessment team and other internal departments or external stakeholders.
- Collaborate with social protection services and other relevant agencies to ensure appropriate placement and support for vulnerable individuals.
Case Management and Support
- Assist with complex or sensitive cases, offering expertise on handling issues related to gender inequality, trauma, and other specific vulnerabilities.
- Ensure the team maintains respect, empathy, and discretion when engaging with individuals from diverse cultural, age, and gender backgrounds.
- Support the Vulnerability Assessment Officers in identifying strengths and coping strategies in individuals to enhance their safety and recovery.
PERSON SPECIFICATIONS
Education & Training:
- A degree level 7 or 8 qualification in Counselling/Social Work/Nursing/Social Care / Social Studies /Teaching/ Psychology/Human Resources or other empathy-centric disciplines that require interaction with people is a requirement for this position.
Experience:
- Minimum 2years experience in the field of social care is essential.
- Proven competence in the care and support of the adults in vulnerable situations and a genuine interest in this area is required.
Competencies and Values:
- Human Rights Based Approach
- Resilience, Positive Attitude & Openness to Change
- Effective Communication & Working Relationships
- Planning, Organising & Reprioritising
- Innovation, Creativity & Problem Solving
Personal Specification:
A strong commitment to caring and an empathetic understanding of those going the International protection system are essential attributes for this role. The successful candidate should possess excellent people skills, be flexible and have experience with rapid and complex changing work environments.
Professional Expectation
You will be expected to keep abreast of current developments and best practice in the area of International Protection. In this respect you may from time to time be required to attend appropriate courses and seminars.
The Project Worker/ Reception Officer must be aware of ethical policies and procedures which pertain to the sector including:
- Vulnerability assessment policy
- Good People Services agreed Policies and Codes of Good Practice.
- Diversity, Equality, Cultural Awareness and Anti-Racism;
- Children First Training &Safeguarding Vulnerable Persons at Risk of Abuse.
- Confidentiality Guidelines.
- Data Protection Guidelines (GDPR).
- Equal Opportunity Principles.
- Health & Safety requirements in compliance with Good People Services instructions.
- Be fully familiar with fire precautions and fire drills.
- Notification of accidents, incidents, and other reportable events.
- Code of Practice for Persons working in Reception Centres;
- First Aid Training Basics and Beyond Customer Care;
- Conflict Management;
- Resilience Training
Confidentiality
In the course of your employment, you may have access to or hear information concerning the medical or personal affairs of service users or staff or other centres business. Such records and information are strictly confidential. In addition, records must never be left in such a manner that unauthorised persons can obtain access to them.
Location: City West/ Dublin City Centre
Salary: €21.50/hr
Languages Required: Georgian, Albanian, Urdu or Portuguese (fluent English as well)
Job Type: Full-time
Pay: From €21.50 per hour
Ability to commute/relocate:
- CO. Dublin, CO. Dublin: reliably commute or plan to relocate before starting work (required)
Education:
- Bachelor's (required)
Experience:
- Social care: 1 year (required)
Language:
- Ukrainian and English, Georgian and English (required)
Work authorisation:
- Ireland (required)
Work Location: In person
Software Engineer – Security-Focused
Posted today
Job Viewed
Job Description
Software Engineer – Security-Focused | Hybrid (Dublin) | Long-Term Opportunity
We're Vertex Agility — a remote-first consultancy partnering with world-class organizations on cutting-edge technology projects. We're now looking for a Software Engineer (Security Focus) to join a global R&D team building the next generation technology systems.
In this role, you'll design and implement security features in .NET (F#/C# - Blazor), configure Windows OS for regulatory compliance, and drive security best practices across the software team. You'll play a key part in shaping secure, future-ready solutions for industrial applications used worldwide.
What You'll Bring:
Strong experience with .NET (F#/C# - Blazor) and Windows OS security configuration
Proven background in networking and security best practices
Hands-on experience with gRPC and its security implementation
Experience with OPC-UA communication and security stack
Solid experience working with Azure and IoT devices
A passion for secure software design and driving architectural improvements
Excellent communication skills to collaborate with stakeholders
This is your chance to
code, secure, and lead
at the same time.
Interested? Let's connect and talk about how you can be part of this exciting journey.
SoftwareEngineer #DotNet #CyberSecurity #Blazor #IoT #Azure #RemoteJobs #VertexAgility #R&D #SecurityEngineering #CSharp #FSharp #gRPC #OPCUASenior Security Software Engineer
Posted today
Job Viewed
Job Description
Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft's mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers' heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world.
Are you passionate about building secure, intelligent systems that identify threats before adversaries do? Do you want to shape the future of security building on AI tools? Our team, IDSEC AI, is on a mission to scale proactive security across Microsoft's products by unifying vulnerability identification and exploit detection. We're building systems that combine AI, large-scale code and binary analysis, and real-time intelligence to find and mitigate security issues across the software supply chain. We are looking for a Senior Software Engineer with a strong foundation in AI and security to help design and deliver scalable systems that operate across millions of assets and billions of signals. You'll be working at the intersection of secure software engineering, advanced detection, and practical AI—enabling defenders to stay ahead of the threat curve. If you've ever wanted to build secure-by-design systems with the latest in machine learning, large language models, and static/dynamic analysis at cloud scale—this is your opportunity.
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
MSFTSecurity, #Hiring #SeniorEngineer #AIEngineering #CyberSecurity #ExploitDetection #SecureCoding #MicrosoftAI #Azure #JoinOurTeam #FutureOfWork #BuildWithPurposeResponsibilities
Conducting Research
Identifies, conducts, and supports others in conducting research into critical security areas, such as competitor products, current attacks, adversary tracking, and academic literature. Partners cross-functionally (e.g., across disciplines, teams, or security versus non-security) to design solutions to prevent attacks. Designs lead to engineering projects. Investigates business-critical security issues (e.g., root cause, motivation, and impact). Advocates priorities. Elevates findings appropriately to address and mitigate issues. Solicits feedback and evaluates results to incorporate into future research. Demonstrates judgment in identifying projects and priorities (e.g., what to test and pursue). Understands interplay across Microsoft technologies and how they give rise to attacker opportunities.
- Drives the evolution of security research by building intelligent tooling and agentic systems that scale across Microsoft's ecosystem. Enables autonomous threat detection, mitigation, and response, transforming manual workflows into adaptive, self-healing processes.
- Works with others to synthesise research findings into recommendations for mitigation of security issues. Shares across teams. Drives change within team based on research findings. Contributes to professional community through publications.
- Analyses complex issues using multiple data sources to develop insights and identify security problems and threats. Creates new solutions to mitigate security issues. Makes trade-offs to balance security and operational needs. Identifies and recommends process improvements and adopts best practices. Leverages the work of others to improve existing processes. Helps to drive resolution to systemic security issues through cross-team collaboration. Anticipates previously unknown potential artefacts that could be present in data as indicators of attacker activity. May contribute to professional community through conference and forum presentations.
- Recommends prioritisation and validation methods for technical indicators. Synthesises threat data to generate trends, patterns and insights that align to intelligence requirements or customer requests. Reviews findings and identifies nuanced variants. Designs and develops scalable automation pipelines and agentic systems to accelerate threat analysis, variant detection, and mitigation workflows. Leverages AI-driven agents to autonomously triage, correlate, and respond to emerging threats.
- Leads efforts to clean, structure, and standardise data and data sources. Leads data quality efforts to ensure timely and consistent access to data sources. Curates sources of data and partners to develop and sustain data access across teams. Incorporates new data sources consistent with corporate data privacy standards.
- Takes product schedules, dependencies and risk assessments into consideration in performing security design and analysis. Creates a schedule for analysis of large feature areas that accounts for dependencies and meets milestones. Conducts security research of Microsoft and competitor products. Researches, analyses, and summarises security threats and shares with security assurance and security tooling teams as enhancements to the security compliance programme.
- Identifies, prioritises, and targets complex security issues that cause negative impact to customers. Creates and drives adoption of relevant mitigations. Suggests and drives appropriate guidance, models, response, and remediation for issues. Drives automation-first approaches to mitigation, integrating agentic frameworks that adaptively respond to threat signals. Builds reusable tooling and autonomous agents that generalise across classes of security issues.
Solution Generation
- Identifies, prioritises, and targets complex security issues that cause negative impact to customers. Creates and drives adoption of relevant mitigations. Suggests and drives appropriate guidance, models, response, and remediation for issues. Drives programme and process of mitigation through automation.
- Solves classes of issues systematically and with transparency to customers in technical implementation and automation of solutions related to specific kinds of security issues (e.g., signature detection, malware, threat analysis, reverse engineering). Begins to develop substantial skills in other kinds of security issues outside areas of expertise. Works across disciplines to build improvements in solutions and methods. Uses results from research and experimentation to drive architecture or product direction for Microsoft.
- Collaborates with engineering teams to embed agentic capabilities into security products, enabling continuous learning and self-improving defences.
- Engages with customers and partners to improve security issues. Analyses security issues or patterns. Advocates for customers and partners. Develops feedback channels and translates feedback into better security practices. Escalates issues as needed. Fosters adoption of security features (e.g., multi-factor authentication (MFA)). Develops and provides guidance and education that result from resolution of security issues.
Orchestration
- Helps to make connections and assist in developing agreements between groups to clarify priorities and identify dependencies. Provides coordination across groups. Articulates key security issues to teams and to upper management. Autonomously drives coordination and collaboration across teams. Participates in internal or external collaboration in representing Microsoft's interests.
- Leads the development and deployment of internal tooling platforms that support agentic workflows, including automated incident response, telemetry enrichment, and security posture evaluation.
- Protects tools, techniques, information, and results of security practices. Assesses efficacy of operational security (e.g., red-on-red pen testing). Develops new techniques to evaluate operational security. Teaches others to master techniques.
- Effectively manages multiple workstreams and resources during incidents, applies diagnostic expertise, provides guidance to other engineers working to mitigate and resolve issues, and maintains a commitment to the quality of products and services throughout the lifecycle. Ensures proper notes from incidents are documented and drives the execution of quality postmortem and root cause analysis processes across teams. Performs analysis of historical incident data to identify trends, patterns, and issues that should be addressed at high priority.
- Leads large-scale security reviews. Leads work on architectural and design security reviews for feature areas. Where appropriate, ensures best practices for security architecture, design and development are in place. Measures return on investment (ROI). Determines value of investment. Measures customer satisfaction. Evaluates security risks and their impact to the affected services and works with DevOps leads, engineering leads and researchers to mitigate risks. Monitors and responds to security events, potential vulnerabilities, exposures, and policy compliance issues.
Industry Leadership
- Uses subject matter expertise to identify potential security issues, tools, mitigations, and processes (e.g., architecture, failure modes, attack chain, threat modelling, vulnerabilities). Stays current in knowledge and expertise as the security landscape evolves. Makes expertise available to others and drives change through sharing, coaching, conferences, and other means. Coaches and mentors others in area of expertise. Models appropriate risk-taking and ethical behaviour.
- Uses business knowledge and technical expertise to assist with analysing the work of the team to identify potential tools to assist future vulnerability analyses. Helps define deployment best practices and security configuration standards to ensure technologies are deployed in a secure fashion. Researches and maintains deep knowledge of industry trends, technologies, tools, securities, and advances.
- Influences the broader security community by advocating for agentic approaches to threat detection and response, contributing to the evolution of autonomous security standards.
Qualifications
Required Qualifications
Relevant experience in the software development lifecycle, distributed systems, cloud services, large-scale computing, modeling, cybersecurity, and/or anomaly detection
OR a Master's Degree in Statistics, Mathematics, Computer Science, or a related field
Proficiency in one or more modern programming languages such as C#, Python, Go, or Rust
- Experience working with large-scale data processing pipelines or AI/ML inference systems
- Strong understanding of security fundamentals, including secure coding practices, authentication/authorization, and common vulnerability classes (e.g., memory corruption, IDOR, SSRF)
- Demonstrated ability to deliver secure, high-quality code in a fast-paced environment
Preferred Qualifications
- Experience applying AI to code (e.g., code understanding, analysis, or generation)
- Background in ML model evaluation, interpretability, or adversarial robustness
- Experience with Azure or other cloud platforms
- Familiarity with modern CI/CD pipelines, secure software supply chain practices, and SBOM tooling
- Experience in building or scaling systems for vulnerability management, security automation, or detection engineering
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.
Senior Security Software Engineer
Posted 2 days ago
Job Viewed
Job Description
Are you passionate about building secure, intelligent systems that identify threats before adversaries do? Do you want to shape the future of security building on AI tools? Our team, IDSEC AI, is on a mission to scale proactive security across Microsoft's products by unifying vulnerability identification and exploit detection. We're building systems that combine AI, large-scale code and binary analysis, and real-time intelligence to find and mitigate security issues across the software supply chain. We are looking for a Senior Software Engineer with a strong foundation in AI and security to help design and deliver scalable systems that operate across millions of assets and billions of signals. You'll be working at the intersection of secure software engineering, advanced detection, and practical AI-enabling defenders to stay ahead of the threat curve. If you've ever wanted to build secure-by-design systems with the latest in machine learning, large language models, and static/dynamic analysis at cloud scale-this is your opportunity.
Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond.
#MSFTSecurity, #Hiring #SeniorEngineer #AIEngineering #CyberSecurity #ExploitDetection #SecureCoding #MicrosoftAI #Azure #JoinOurTeam #FutureOfWork #BuildWithPurpose
**Responsibilities**
+ **Conducting Research**
+ Identifies, conducts, and supports others in conducting research into critical security areas, such as competitor products, current attacks, adversary tracking, and academic literature. Partners cross-functionally (e.g., across disciplines, teams, or security versus non-security) to design solutions to prevent attacks. Designs lead to engineering projects. Investigates business-critical security issues (e.g., root cause, motivation, and impact). Advocates priorities. Elevates findings appropriately to address and mitigate issues. Solicits feedback and evaluates results to incorporate into future research. Demonstrates judgment in identifying projects and priorities (e.g., what to test and pursue). Understands interplay across Microsoft technologies and how they give rise to attacker opportunities.
+ Drives the evolution of security research by building intelligent tooling and agentic systems that scale across Microsoft's ecosystem. Enables autonomous threat detection, mitigation, and response, transforming manual workflows into adaptive, self-healing processes.
+ Works with others to synthesise research findings into recommendations for mitigation of security issues. Shares across teams. Drives change within team based on research findings. Contributes to professional community through publications.
+ Analyses complex issues using multiple data sources to develop insights and identify security problems and threats. Creates new solutions to mitigate security issues. Makes trade-offs to balance security and operational needs. Identifies and recommends process improvements and adopts best practices. Leverages the work of others to improve existing processes. Helps to drive resolution to systemic security issues through cross-team collaboration. Anticipates previously unknown potential artefacts that could be present in data as indicators of attacker activity. May contribute to professional community through conference and forum presentations.
+ Recommends prioritisation and validation methods for technical indicators. Synthesises threat data to generate trends, patterns and insights that align to intelligence requirements or customer requests. Reviews findings and identifies nuanced variants. Designs and develops scalable automation pipelines and agentic systems to accelerate threat analysis, variant detection, and mitigation workflows. Leverages AI-driven agents to autonomously triage, correlate, and respond to emerging threats.
+ Leads efforts to clean, structure, and standardise data and data sources. Leads data quality efforts to ensure timely and consistent access to data sources. Curates sources of data and partners to develop and sustain data access across teams. Incorporates new data sources consistent with corporate data privacy standards.
+ Takes product schedules, dependencies and risk assessments into consideration in performing security design and analysis. Creates a schedule for analysis of large feature areas that accounts for dependencies and meets milestones. Conducts security research of Microsoft and competitor products. Researches, analyses, and summarises security threats and shares with security assurance and security tooling teams as enhancements to the security compliance programme.
+ Identifies, prioritises, and targets complex security issues that cause negative impact to customers. Creates and drives adoption of relevant mitigations. Suggests and drives appropriate guidance, models, response, and remediation for issues. Drives automation-first approaches to mitigation, integrating agentic frameworks that adaptively respond to threat signals. Builds reusable tooling and autonomous agents that generalise across classes of security issues. **Solution Generation**
+ Identifies, prioritises, and targets complex security issues that cause negative impact to customers. Creates and drives adoption of relevant mitigations. Suggests and drives appropriate guidance, models, response, and remediation for issues. Drives programme and process of mitigation through automation.
+ Solves classes of issues systematically and with transparency to customers in technical implementation and automation of solutions related to specific kinds of security issues (e.g., signature detection, malware, threat analysis, reverse engineering). Begins to develop substantial skills in other kinds of security issues outside areas of expertise. Works across disciplines to build improvements in solutions and methods. Uses results from research and experimentation to drive architecture or product direction for Microsoft.
+ Collaborates with engineering teams to embed agentic capabilities into security products, enabling continuous learning and self-improving defences.
+ Engages with customers and partners to improve security issues. Analyses security issues or patterns. Advocates for customers and partners. Develops feedback channels and translates feedback into better security practices. Escalates issues as needed. Fosters adoption of security features (e.g., multi-factor authentication (MFA)). Develops and provides guidance and education that result from resolution of security issues.Orchestration
+ Helps to make connections and assist in developing agreements between groups to clarify priorities and identify dependencies. Provides coordination across groups. Articulates key security issues to teams and to upper management. Autonomously drives coordination and collaboration across teams. Participates in internal or external collaboration in representing Microsoft's interests.
+ Leads the development and deployment of internal tooling platforms that support agentic workflows, including automated incident response, telemetry enrichment, and security posture evaluation.
+ Protects tools, techniques, information, and results of security practices. Assesses efficacy of operational security (e.g., red-on-red pen testing). Develops new techniques to evaluate operational security. Teaches others to master techniques.
+ Effectively manages multiple workstreams and resources during incidents, applies diagnostic expertise, provides guidance to other engineers working to mitigate and resolve issues, and maintains a commitment to the quality of products and services throughout the lifecycle. Ensures proper notes from incidents are documented and drives the execution of quality postmortem and root cause analysis processes across teams. Performs analysis of historical incident data to identify trends, patterns, and issues that should be addressed at high priority.
+ Leads large-scale security reviews. Leads work on architectural and design security reviews for feature areas. Where appropriate, ensures best practices for security architecture, design and development are in place. Measures return on investment (ROI). Determines value of investment. Measures customer satisfaction. Evaluates security risks and their impact to the affected services and works with DevOps leads, engineering leads and researchers to mitigate risks. Monitors and responds to security events, potential vulnerabilities, exposures, and policy compliance issues. **Industry Leadership**
+ Uses subject matter expertise to identify potential security issues, tools, mitigations, and processes (e.g., architecture, failure modes, attack chain, threat modelling, vulnerabilities). Stays current in knowledge and expertise as the security landscape evolves. Makes expertise available to others and drives change through sharing, coaching, conferences, and other means. Coaches and mentors others in area of expertise. Models appropriate risk-taking and ethical behaviour.
+ Uses business knowledge and technical expertise to assist with analysing the work of the team to identify potential tools to assist future vulnerability analyses. Helps define deployment best practices and security configuration standards to ensure technologies are deployed in a secure fashion. Researches and maintains deep knowledge of industry trends, technologies, tools, securities, and advances.
+ Influences the broader security community by advocating for agentic approaches to threat detection and response, contributing to the evolution of autonomous security standards.
**Qualifications**
**Required Qualifications**
+ Relevant experience in the software development lifecycle, distributed systems, cloud services, large-scale computing, modeling, cybersecurity, and/or anomaly detection
+ OR a Master's Degree in Statistics, Mathematics, Computer Science, or a related field
+ Proficiency in one or more modern programming languages such as C#, Python, Go, or Rust
+ Experience working with large-scale data processing pipelines or AI/ML inference systems
+ Strong understanding of security fundamentals, including secure coding practices, authentication/authorization, and common vulnerability classes (e.g., memory corruption, IDOR, SSRF)
+ Demonstrated ability to deliver secure, high-quality code in a fast-paced environment
**Preferred Qualifications**
+ Experience applying AI to code (e.g., code understanding, analysis, or generation)
+ Background in ML model evaluation, interpretability, or adversarial robustness
+ Experience with Azure or other cloud platforms
+ Familiarity with modern CI/CD pipelines, secure software supply chain practices, and SBOM tooling
+ Experience in building or scaling systems for vulnerability management, security automation, or detection engineering
Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations ( .
Security Manager - Software
Posted 8 days ago
Job Viewed
Job Description
Responsibilities:
* Lead, mentor, and grow a global team of security engineers and specialists.
* Review and assess IBM Network Automation, services, and applications as per defined by the IBM's Security and Privacy by Design (SPbD) framework.
* Identify security design gaps in existing and proposed architectures and recommend changes or enhancements.
* Lead the efforts to streamline the security processes and tooling through the active participation in "Design Thinking" sessions for process and tooling changes and enhancements.
* Engage, collaborate, and build trusted relationships with product managers, developers, and security engineers.
* Develop guidance and enablement material to produce secure software, services and applications that align with IBM's commitments to customers and IBM's IT Security Standards
* Align company standards, frameworks and security with overall business and technology strategy.
* Identify and communicate current and emerging security threats.
* Assess risk and develop mitigation and remediation plans for security findings in services and applications.
Business Awareness:
* You have an understanding about the business that you are trying to secure. For example, working knowledge of cloud technologies, the ability to describe what the security concerns and impact might be for an organization looking to move from on- premises compute to public cloud.
* Distributed Systems / Software Design: understand the compromises that teams make every day in order to make things work. Security Engineers should have strong opinions about the right way to build.
* Threats, Risks, and Modelling: know the difference between a threat and risk. The ability to understand what organizations need to protect, who they need to protect it from, and how that protection should work.
* Vulnerabilities and Exploitation: the ability to discern between a weakness, flaw, or error found within a system, software, host, etc. which have the potential to be leveraged by an attacker in order to compromise a network, application, an infrastructure, etc.
* Collaboration: being personable, approachable, and empathetic are extremely valuable qualities in a Security Manager. The Security Manager role requires a lot of cooperation and engagement within the organization that they support.
* Experience with Incident Response / Operations or addressing breaches, incidents.
* Experience with forensic analysis - strong critical thinking and analytical skills.
* Understanding of current software (on-premises) and cloud technologies and Software-as-a-Service (SaaS) concepts
**Your role and responsibilities**
The IBM Network Automation team is looking for a Security Manager, one who can take on a leadership role in responding to security issues across a large product portfolio, and its many products and services. The right candidate must thrive in high-pressure situations, think like both an attacker and defender, to drive engineering, development, and business teams to take the right actions in the right timeframes to mitigate risks. We are looking for an individual who can balance technical risks against business risks and consistently drive for the right results. Has a passion for developing solutions to complex security challenges, recognize and fill gaps from a defence-in-depth perspective.
**Required technical and professional expertise**
* Education: Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience).
* Experience: extensive in software application security, with at least few years in a leadership or management role within a SaaS or cloud-native enterprise environment.
* Proven expertise in cloud and application security, including AWS, Azure, or GCP.
* Deep understanding of SaaS architectures, including microservices, multi-tenancy, containerization (Docker/Kubernetes), and API security.
* Strong background in DevSecOps practices and security automation using CI/CD tools (Jenkins, GitHub Actions, GitLab CI, Azure DevOps, etc.).
* Hands-on experience with security technologies such as:
* SAST/DAST
* Container & Kubernetes security (e.g., Aqua, Twistlock)
* Excellent understanding of OWASP Top 10, NIST CSF, and MITRE ATT&CK frameworks.
* Strong ability to manage complex projects, cross-functional teams, and stakeholder expectations.
**Preferred technical and professional experience**
* Master's degree in Cybersecurity, Information Systems, or related discipline.
* Professional certifications such as CISSP, CSSLP, CISM, CCSP, or OSCP.
* Experience managing security for enterprise-grade SaaS applications handling sensitive or regulated data (e.g., healthcare, finance, government).
* Working knowledge of Zero Trust, API security frameworks, and identity management (OIDC, SAML, OAuth 2.0).
* Demonstrated experience designing or implementing cloud-native security architectures
* Proven success influencing security practices across distributed or global engineering organizations.
IBM is committed to creating a diverse environment and is proud to be an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, caste, genetics, pregnancy, disability, neurodivergence, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
Staff Security Infrastructure Software Engineer
Posted today
Job Viewed
Job Description
Company
QT Technologies Ireland Limited
Job Area
Engineering Group, Engineering Group > Software Engineering
General Summary
About the Role
Are you an experienced Java developer with experience in creating Java-based server applications that use the most sensitive of security assets — cryptographic keys? We are looking for a passionate and skilled software engineer to join the development branch of Qualcomm's Cryptographic Operations Group. This team creates the services that support device image signing and factory provisioning with keys protected by Hardware Security Modules (HSMs) across the entire Qualcomm organisation. Our services our mostly exposed through Java implementations running on standalone, on-premises servers with attached HSMs which have to meet very high security and assurance requirements.
You will be an integral part of a highly-skilled team and will contribute to all facets of the system: architecture, development, testing, integration, and debugging. You will also contribute to the architecture of Qualcomm's products by working with the device engineering teams about what is possible and efficient with our secure infrastructure systems.
Please note that this position is part of the Qualcomm engineering team. It is not a cybersecurity IT position.
Minimum Qualifications
- Bachelor's degree in Science, Engineering, or related field and 4+ years of ASIC design, verification, validation, integration, or related work experience.
OR
Master's degree in Science, Engineering, or related field and 3+ years of ASIC design, verification, validation, integration, or related work experience.
OR
PhD in Science, Engineering, or related field and 2+ years of ASIC design, verification, validation, integration, or related work experience.
What are we looking for?
- Strong programming skills in Java and related build / integration tools.
- Programming skills in Python and C.
- Clear understanding of cryptographic key management including public key infrastructures, certificates, and symmetric key hierarchies.
- Excellent verbal and written communication skills.
- Team player that is able to work independently and collaborate with colleagues in different geographic regions.
Ideally, You Will Be Able To Demonstrate The Following
- Experience with Java-based frameworks (Spring, XML, RESTEasy).
- Experience with JCA/JCE.
- Experience with Java-centric build tool chains.
- Experience collaborating with teams that operate both on-site and virtual servers.
- Experience with network programming and security.
- Experience with PKCS11 and Hardware Security Module (HSM) integration.
- Familiarity with the latest developments in Post-Quantum Cryptography.
- References to a particular number of years experience are for indicative purposes only. Applications from candidates with equivalent experience will be considered, provided that the candidate can demonstrate an ability to fulfill the principal duties of the role and possesses the required competencies.
Qualcomm is an equal opportunity employer. If you are an individual with a disability and need an accommodation during the application/hiring process, rest assured that Qualcomm is committed to providing an accessible process. You may e-mail disability- or call Qualcomm's toll-free number found here. Upon request, Qualcomm will provide reasonable accommodations to support individuals with disabilities to be able participate in the hiring process. Qualcomm is also committed to making our workplace accessible for individuals with disabilities. (Keep in mind that this email address is used to provide reasonable accommodations for individuals with disabilities. We will not respond here to requests for updates on applications or resume inquiries).
Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law.
To all Staffing and Recruiting Agencies
: Our Careers Site is only for individuals seeking a job at Qualcomm. Staffing and recruiting agencies and individuals being represented by an agency are not authorized to use this site or to submit profiles, applications or resumes, and any such submissions will be considered unsolicited. Qualcomm does not accept unsolicited resumes or applications from agencies. Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications.
If you would like more information about this role, please contact Qualcomm Careers.
Staff Security Infrastructure Software Engineer
Posted today
Job Viewed
Job Description
Company:
QT Technologies Ireland Limited
Job Area:
Engineering Group, Engineering Group > Software Engineering
General Summary:
About the Role
Are you an experienced Java developer with experience in creating Java-based server applications that use the most sensitive of security assets — cryptographic keys? We are looking for a passionate and skilled software engineer to join the development branch of Qualcomm's Cryptographic Operations Group. This team creates the services that support device image signing and factory provisioning with keys protected by Hardware Security Modules (HSMs) across the entire Qualcomm organisation. Our services our mostly exposed through Java implementations running on standalone, on-premises servers with attached HSMs which have to meet very high security and assurance requirements.
You will be an integral part of a highly-skilled team and will contribute to all facets of the system: architecture, development, testing, integration, and debugging. You will also contribute to the architecture of Qualcomm's products by working with the device engineering teams about what is possible and efficient with our secure infrastructure systems.
Please note that this position is part of the Qualcomm engineering team. It is not a cybersecurity IT position.
Minimum Qualifications:
- Bachelor's degree in Science, Engineering, or related field and 4+ years of ASIC design, verification, validation, integration, or related work experience.
OR
Master's degree in Science, Engineering, or related field and 3+ years of ASIC design, verification, validation, integration, or related work experience.
OR
PhD in Science, Engineering, or related field and 2+ years of ASIC design, verification, validation, integration, or related work experience.
What are we looking for?
- Strong programming skills in Java and related build / integration tools.
- Programming skills in Python and C.
- Clear understanding of cryptographic key management including public key infrastructures, certificates, and symmetric key hierarchies.
- Excellent verbal and written communication skills.
- Team player that is able to work independently and collaborate with colleagues in different geographic regions.
Ideally, you will be able to demonstrate the following:
- Experience with Java-based frameworks (Spring, XML, RESTEasy).
- Experience with JCA/JCE.
- Experience with Java-centric build tool chains.
- Experience collaborating with teams that operate both on-site and virtual servers.
- Experience with network programming and security.
- Experience with PKCS11 and Hardware Security Module (HSM) integration.
Familiarity with the latest developments in Post-Quantum Cryptography.
References to a particular number of years experience are for indicative purposes only. Applications from candidates with equivalent experience will be considered, provided that the candidate can demonstrate an ability to fulfill the principal duties of the role and possesses the required competencies.
Qualcomm is an equal opportunity employer. If you are an individual with a disability and need an accommodation during the application/hiring process, rest assured that Qualcomm is committed to providing an accessible process. You may e-mail disability- or call Qualcomm's toll-free number found here. Upon request, Qualcomm will provide reasonable accommodations to support individuals with disabilities to be able participate in the hiring process. Qualcomm is also committed to making our workplace accessible for individuals with disabilities. (Keep in mind that this email address is used to provide reasonable accommodations for individuals with disabilities. We will not respond here to requests for updates on applications or resume inquiries).
Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law.
To all Staffing and Recruiting Agencies: Our Careers Site is only for individuals seeking a job at Qualcomm. Staffing and recruiting agencies and individuals being represented by an agency are not authorized to use this site or to submit profiles, applications or resumes, and any such submissions will be considered unsolicited. Qualcomm does not accept unsolicited resumes or applications from agencies. Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications.
If you would like more information about this role, please contact Qualcomm Careers.
Be The First To Know
About the latest Software security Jobs in Ireland !
Director of Infrastructure Security Software Engineering
Posted today
Job Viewed
Job Description
Job Title: Director of Infrastructure Security Software Engineering - hands on role with no direct reports.
Location: Dublin
Contract Type: Permanent
Working Pattern: Full Time
Are you a visionary leader with a passion for cybersecurity and software engineering? Our client, a dynamic organisation in the cybersecurity sector, is on the lookout for a strategic and technically adept Director of Software Engineering. This is your chance to make a significant impact in a fast-paced environment while building secure, scalable, and high-performing software systems
Key Responsibilities:
*Oversee the design, development, testing, deployment, and operation of enterprise-standard applications.
*Focus on engineering excellence, improving automation, test coverage, and production health.
*Be a proactive creator and doer, addressing real-life problems and consumer needs.
*Build strong relationships with key business partners, establishing trust for effective delivery.
*Provide technical leadership to the Infrastructure Security Engineering and SecureTrak squads within the Application and Infrastructure Security Product Area.
*Collaborate with other leaders to establish engineering standards and best practises, influencing strategic decisions to deliver world-class security solutions.
*Oversee the design and development of the Vulnerability Intelligence Platform, ensuring it serves as a central operational data store for the product area.
*Drive the SecureTrak application to continuously scan infrastructures and resources, identifying known vulnerabilities and informing technology product owners on remediation and mitigation.
Skills:
*Extensive experience in leading the design and development of enterprise-standard applications using major programming languages (e.g., Python, Go, Java) and pipeline/build tools (e.g., Git, Jenkins, Terraform).
*Proficiency in building scalable applications on Kubernetes or similar platforms.
*Familiarity with AWS technologies (EKS, SNS, SQS, IAM) or equivalent Azure/GCP services.
*Experience with data technologies (Oracle, PostgreSQL, AWS RDS) and data pipelines/ETL/ELT.
*Hands-on experience with test automation and CI/CD practises, including tools like JUnit, PyUnit, or similar.
*Strong engineering skills with a proven track record of deploying maintainable, scalable multi-tiered applications.
*Experience in an agile environment (Scrum) with a focus on operational excellence.
*Excellent communication skills to positively influence peers and decision-makers.
*Strong analytical skills with a knack for tackling issues and making timely decisions.
*A passion for continuous learning and mentoring team members.
Why Join?
*Be part of a vibrant, collaborative team where your ideas matter
*Work in a stimulating environment that values innovation and excellence.
*Enjoy opportunities for professional growth and continuous learning.
If you are excited about leading high-performing engineering teams and making a difference in the cybersecurity landscape, we want to hear from you Apply today and take the next step in your career with us
Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment process to support candidates of all backgrounds and all abilities to apply. Adecco is committed to building a supportive environment for you to explore the next steps in your career. If you require reasonable adjustments at any stage, please let us know and we will be happy to support you.
Adecco Ireland is acting as an Employment Agency in relation to this vacancy.
Senior Software Development Engineer, AWS Security
Posted 1 day ago
Job Viewed
Job Description
Join us to drive high-impact innovation that secures our cloud by building solutions that enable an ecosystem of services to protect against sophisticated threats. The Informatics team owns the security telemetry mission in AWS. We collect, enrich and vend massive volumes of security related data from millions of hosts across globally distributed regions.
As a Security Software Development Engineer on the Informatics team, you will develop software that collects, enriches and vends Linux security telemetry data. The solutions you deliver are foundational in supporting the security and audit missions of AWS teams.
Amazon will provide relocation support for successful applicants relocating within the European Union.
Key job responsibilities
- Scale and Impact - Our team builds solutions that enable AWS service teams to leverage security related data to protect against threats. In this role, you will challenge yourself to develop simple solutions to complex problems in the area of collecting, enriching and vending massive volumes of security related data. The solutions you deliver will be high-performing, scalable, and meet the availability expectations of AWS. You will raise the bar on storage and compute optimizations in every functionality we deliver. You will champion automation, and generate efficiencies in our execution, for us and our customers. You will work to solve some of the biggest and most complex security challenges that exist today.
- Growth - You will have end-to-end ownership of scoping, design, development, test and deployment of our features across our regions globally. You will be part of a team that values strong intuition, but is data-driven and seeks metrics to challenge our biases. Everything we do is customer-centric, and you will raise the bar for us!
- Collaboration - You will also work with a talented and diverse team of software development engineers who are passionate about data and application security. You will share your knowledge through documentation, design reviews, code reviews, and pairing.
A day in the life
As an experienced Software Development engineer, you will build and own software related to Linux security telemetry data collection, enrichment and vending. You will work with a team of world-class software developers who thrive on creating innovative and scalable solutions for real-world security challenges. You will build, validate, and support continuous integration and continuous delivery solutions to collect, enrich and vend Linux security telemetry data using Go, Python and Type Script. You will get to build the way you want using the full library of AWS technologies!
About the team
Diverse Experiences
Amazon Security values diverse experiences. Even if you do not meet all of the qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn't followed a traditional path, or includes alternative experiences, don't let it stop you from applying.
Why Amazon Security?
At Amazon, security is central to maintaining customer trust and delivering delightful customer experiences. Our organization is responsible for creating and maintaining a high bar for security across all of Amazon's products and services. We offer talented security professionals the chance to accelerate their careers with opportunities to build experience in a wide variety of areas including cloud, devices, retail, entertainment, healthcare, operations, and physical stores.
Inclusive Team Culture
In Amazon Security, it's in our nature to learn and be curious. Ongoing DEI events and learning experiences inspire us to continue learning and to embrace our uniqueness. Addressing the toughest security challenges requires that we seek out and celebrate a diversity of ideas, perspectives, and voices.
Training & Career Growth
We're continuously raising our performance bar as we strive to become Earth's Best Employer. That's why you'll find endless knowledge-sharing, training, and other career-advancing resources here to help you develop into a better-rounded professional.
Work/Life Balance
We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there's nothing we can't achieve.
Mentorship & Career Growth
We're continuously raising our performance bar as we strive to become Earth's Best Employer. That's why you'll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.
Basic Qualifications
- Bachelor's degree in computer science or equivalent
- 6+ years of professional software development experience
- 6+ years of design or architecture (design patterns, reliability and scaling) of new and existing systems experience
- Experience programming with at least one software programming language
- This role requires you to be a national of an EU member state
Preferred Qualifications
- 6+ years of full software development life cycle, including coding standards, code reviews, source control management, build processes, testing, and operations experience
- Kernel expertise, Windows/UNIX/LINUX
- Knowledge of C/C++/Rust/Go
Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is central to our success. We make recruiting decisions based on your experience and skills. We value your passion to discover, invent, simplify and build. Protecting your privacy and the security of your data is a longstanding top priority for Amazon. Please consult our Privacy Notice ( ) to know more about how we collect, use and transfer the personal data of our candidates.
Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other legally protected status.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.
Software Engineering Manager, Application Security Testing: Composition Analysis
Posted today
Job Viewed
Job Description
GitLab is an open-core software company that develops the most comprehensive AI-powered DevSecOps Platform, used by more than 100,000 organizations. Our mission is to enable everyone to contribute to and co-create the software that powers our world. When everyone can contribute, consumers become contributors, significantly accelerating human progress. Our platform unites teams and organizations, breaking down barriers and redefining what's possible in software development. Thanks to products like Duo Enterprise and Duo Agent Platform, customers get AI benefits at every stage of the SDLC.
The same principles built into our products are reflected in how our team works: we embrace AI as a core productivity multiplier, with all team members expected to incorporate AI into their daily workflows to drive efficiency, innovation, and impact. GitLab is where careers accelerate, innovation flourishes, and every voice is valued. Our high-performance culture is driven by our values and continuous knowledge exchange, enabling our team members to reach their full potential while collaborating with industry leaders to solve complex problems. Co-create the future with us as we build technology that transforms how the world develops software.
An Overview Of This Role
The Engineering Manager for Composition Analysis and Dynamic Analysis specializes in leading teams focused on application security scanning technologies. This role oversees multiple security-focused engineering groups and is responsible for balancing priorities across these specialized teams.
This role is an extension of the Engineering Manager position.
Groups Overview
Composition Analysis
The Composition Analysis Group Is Responsible For
- Software Composition Analysis
- Container Scanning
Dynamic Analysis
The Dynamic Analysis Group Is Responsible For
- API Security
- Dynamic Analysis Security Testing (DAST)
- Fuzz Testing
What You'll Do
- Manage engineers across both the Composition Analysis and Dynamic Analysis groups
Drive key initiatives including:
Auto-remediation of vulnerable software packages
- Scanning of unmanaged dependencies in C/C++
- Static reachability analysis with function-level granularity
- Snippet detection for open source dependencies
Improve the DAST crawler for efficiency, stability, and consistent web application traversal
Balance priorities across multiple security-focused engineering teams
- Author project plans for epics across both groups, ensuring alignment and avoiding duplication of effort
- Run agile project management processes for multiple teams
- Provide guidance on security product architecture
- Coordinate between Composition Analysis and Dynamic Analysis teams to ensure consistent and complementary approaches to application security
What You'll Bring
- In-depth understanding of application security concepts, particularly in software composition analysis techniques to evaluate the security risks associated with application dependencies and dynamic analysis security testing (DAST) tools.
- Understanding of the challenges in developing and maintaining security scanning tools
- Experience managing multiple technical teams simultaneously
- Familiarity with containerization technologies and dependency management systems
- Knowledge of web application security testing techniques and tools
- Experience with open source security tooling (such as OWASP ZAP, Trivy, or similar)
- Experience in DevSecOps practices and implementation
- Experience in vulnerability management and remediation
The base salary range for this role's listed level is currently for residents of listed locations only. Grade level and salary ranges are determined through interviews and a review of education, experience, knowledge, skills, abilities of the applicant, equity with other team members, and alignment with market data. See more information on our benefits and equity. Sales roles are also eligible for incentive pay targeted at up to 100% of the offered base salary.
California/Colorado/Hawaii/New Jersey/New York/Washington/DC/Illinois/Minnesota pay range
$131,600—$282,000 USD
Country Hiring Guidelines:
GitLab hires new team members in countries around the world. All of our roles are remote, however some roles may carry specific location-based eligibility requirements. Our Talent Acquisition team can help answer any questions about location after starting the recruiting process.
Privacy Policy:
Please review our Recruitment Privacy Policy. Your privacy is important to us.
GitLab is proud to be an equal opportunity workplace and is an affirmative action employer. GitLab's policies and practices relating to recruitment, employment, career development and advancement, promotion, and retirement are based solely on merit, regardless of race, color, religion, ancestry, sex (including pregnancy, lactation, sexual orientation, gender identity, or gender expression), national origin, age, citizenship, marital status, mental or physical disability, genetic information (including family medical history), discharge status from the military, protected veteran status (which includes disabled veterans, recently separated veterans, active duty wartime or campaign badge veterans, and Armed Forces service medal veterans), or any other basis protected by law. GitLab will not tolerate discrimination or harassment based on any of these characteristics. See also GitLab's EEO Policy and EEO is the Law. If you have a disability or special need that requires accommodation, please let us know during the recruiting process.