Key elements of the job/duties and responsibilities:
- Proactive Monitoring – This role is responsible for continuous monitoring of staff’s devices and cloud resources (laptops, pc’s, tablets, phones etc…) to ensure they remain compliant with security policies.
- Proactively identify issues to be addressed before they become actual issues which avoids operational disruption and reduces costs associated with disruptions.
- Follow up with users if their devices don't have the correct endpoint protection in place to ensure third party Security Operations Centre (SOC) partner can monitor or react to security incidents that originate on these devices.
- Ensure there are no gaps in the process for deploying and updating laptops to help avoid security incidents.
- Review Microsoft 365 users that don't have (Multi Factor Authentication – MFA) enforced and address gaps with users
- Complete periodic checks of devices that are not compliant with Mobile Device Management (MDM) Policy and address gaps.
- Work with third party Security Operations Centre (SOC) partner investigating and actioning all SOC queries raised in a timely manner and taking appropriate actions where necessary.
- Ensure adherence to cyber strategy which is aligned to the Governments Baseline Standards and the National Cyber Security Centre (NCSC) recommendations and advisories, ensure all are reviewed and acted upon where appropriate.
- Own and run the third parties’ security review programme, ensure all are completed correctly, triage the responses, and manage actions to completion to ultimately enable the to assess third party security posture.
- Own and run the staff cyber awareness campaigns to an agreed schedule.
- Track staff completion of mandatory cyber training if compromised during tests.
- Update cyber related policies and procedures as appropriate
- Work with other members of the technical team on cross competency projects and tasks as assigned
- Assign and follow up on Azure defender vulnerability recommendations as per approved process
- Run and share Azure Landing Report compliance reports with third party suppliers to confirm alignment with NIS2 and Government Baseline Standards.
- Work on other assigned tasks as deemed necessary by your manager
Key Skills & Requirements:
- Has experience of working in a similar role as outlined here
- Threat Analysis and Response
- Strong analytical skills to identify, assess, and mitigate security threats and vulnerabilities.
- Experience in conducting risk assessments and security audits.
- Incident Management
- Expertise in incident response processes, including detection, containment, eradication, and recovery.
- Ability to perform root cause analysis and develop strategies to prevent future incidents.
- Communication and Collaboration Skills
- Excellent written and verbal communication skills to effectively convey complex security concepts to technical and non-technical stakeholders.
- Ability to create detailed reports, documentation, and security advisories.
- Strong interpersonal skills to work collaboratively with technical teams, management, and external partners.
- Experience in leading security awareness training and promoting a security-first culture within the organization.
- Project Management
- Ability to manage multiple security projects & tasks simultaneously, ensuring timely and effective completion.
- Provide accurate and transparent project/tasks status reports to stakeholders
- Results driven to ensure all projects/tasks are fully completed to agreed scope
- Organizational Skills
- Strong organizational and time management skills to prioritize tasks and meet deadlines.
- Attention to detail and a methodical approach to problem-solving.
- Adaptability & Problem Solving
- Ability to adapt to a rapidly changing threat landscape and stay updated with the latest cybersecurity trends and technologies.
- Problem-Solving Skills: Capable of resolving complex problems and ensuring solutions not only fix but prevents re-occurrence.
Desirable.
- Experience with security tools and technologies, such as firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM (Security Information and Event Management) systems, and endpoint protection.
- Familiarity with cloud security (AWS, Azure) and securing virtual environments.
- Understanding of Cloud Environment Architecture, Azure Landing Zone and Cloud Network Concepts
- Ability to configure and manage Azure Defender and Office 365 security tools.
- Knowledge of industry standards and frameworks such as ISO 27001, NIST , CIS Controls, and GDPR
- Experience maintaining and updating ISMS (Information Security Management System).
- Certifications
- Relevant and recent certifications in the cyber domain would be advantageous
For more info hit APPLY today!
*please note this is a hybrid role in Co. Mayo area
*please note you must be eligible to work full time in Ireland (EU/Stamp 4)
#LI-LB2
#CplGalTech24