Security Jobs in Donaghmede
Dublin, Dublin
How we Hire at Google valuable tips on crafting a standout resume and navigating each stage of the interview, increasing your chances of landing your dream job at Google: Watch the below video! Identify security issues and implement and design security controls, tools, and services to improve security systems and processes.
FRS Recruitment
Dublin, Dublin
Experience with compliance frameworks such as ISO 27001 and SOC 2. Relevant certifications such as CISSP, CEH, Azure Security Engineer Associate, CompTIA Security+, OSCP, or equivalent. * Work closely with cross-functional teams, including IT, Development, DevOps and Data Team, to integrate security practices.
Dublin, Dublin
Working closely with intrusion detection analysts, privacy, product and legal experts and many other teams across the company to coordinate and drive resolution on a diverse range of incidents. Play a key role in responding to large-scale incidents, including writing comprehensive reports and contributing to post-incident analysis.
itContracting
Dublin, Dublin
If you choose to apply to this opportunity and share your CV or other personal information with eir evo talent, eir evo and our clients, these details will be held by us in accordance with our privacy policy used by our recruitment team to contact you regarding this or other relevant opportunities at eir evo talent and eir evo. Assist in management and configuration of Microsoft Defender for Endpoint, Defender for Identity, Defender for Cloud, Entra Privileged Identity Management (PIM), Entra Conditional Access and Azure Bastion.
Dublin, Dublin
Establish and mature cross-company processes around vulnerability management including operating models, maturity models, Service Level Agreement (SLA)/Service Level Objectives (SLOs), discovery, managing and reporting processes, roles/responsibilities, etc. In this role, you will work with teams across Google to proactively identify, triage and fix security flaws and vulnerabilities, ensuring threats posed by software and infrastructure vulnerabilities are resolved.