Role: Security Analyst
Location: Dublin – Hybrid
Duration: 6 Months
Rate: €335 per day
Responsibilities
Security Monitoring & Incident Response to monitor and respond to security alerts, breaches, and incidents across on-premises and cloud environments.
Conduct root cause analysis and implement corrective actions to prevent recurrence.
Maintain and enhance incident response and disaster recovery plans.
Threat & Vulnerability Management.
Participate in vulnerability and patch management processes, assessing risks and coordinating remediation.
Analyse threat intelligence feeds and apply insights to strengthen security posture.
Security Awareness & Phishing Defence.
Lead phishing simulation campaigns, analyse results, and report metrics.
Support user awareness initiatives through targeted training and communications.
Provide actionable insights to improve user behavior and reduce risk.
Support the implementation and maintenance of security controls (preventive, detective, corrective, compensating).
Ensure compliance with relevant standards and frameworks (e.g. ISO *****, NIST, GDPR).
Assist in audits, risk assessments, and policy reviews.
Skills Required
3 years' experience in a Cyber Security Analyst role
Demonstrated experience in a client-side internal Information Security function, covering:
Governance, Risk & Compliance (GRC)
Security policy development and enforcement
Incident response, threat detection, and vulnerability management
Supplier/vendor security assessment
Data protection and privacy (e.g. GDPR)
Security awareness and training
Cloud security (IaaS, PaaS, SaaS in AWS, Azure, GCP)
Frameworks & Standards: ISO/IEC *****, ISO/IEC *****, NIST CSF, NIST SP ******, PCI-DSS, CIS Controls, CSA Cloud Security Standards
Security Tools knowledge: SIEM platforms, AI-driven tools for threat detection, anomaly analysis, phishing simulation, reporting, and productivity enhancement, IDS/IPS, EDR, vulnerability scanning, patch management
Operating systems (Windows, Linux)
Network devices (firewalls, switches, routers)
Web applications, middleware, databases
End-user computing environments
Access & Identity Management
#J-*****-Ljbffr