General information
Vacancy Reference number
005409 What we offer
As well as offering you a competitive salary career advancement opportunities and staff travel benefits (with Aer Lingus and many other international airlines) you will also have the opportunity to work in a dynamic and collaborative environment and to join a team of amazing professionals who are passionate about the aviation industry. To learn more about the exciting benefits and opportunities that await you at Aer Lingus please visit our website.
At Aer Lingus we embrace diversity and believe in providing equal opportunities to all qualified individuals. We are dedicated to cultivating an inclusive and respectful work environment that values employees unique backgrounds experiences and perspectives. We do not discriminate based on race gender sexual orientation age disability or any other protected status. As an equal opportunity employer we encourage applications from all candidates who share our passion for aviation. If you have any questions or require any accommodations to support you in your application please contact us at
Role title
Cyber Incident Response Analyst
Your role
The Cyber Incident Response Analyst is a key practitioner within the Cyber Defence function responsible for hands-on incident management activities and collaborating day to day with the within a hybrid delivery model they will support incident management services that include 24x7 monitoring rapid incident response and drive proactive improvements of detection and response processes through automation integration and strong operational governance.
This role will work crossfunctionally with teams across Cyber Defence Cyber Engineering and IT supporting ongoing maturity of cyber monitoring coverage and incident management playbooks for timely detection and response processes in addition to improving our security posture by simulating threat actor techniques that test our organisations technical controls and processes to support continuous improvements to the overall cyber security posture.
- Perform incident triage and investigations alongside the SOC to ensure comprehensive and accurate analysis and forensics across EI systems and assets as required.
- Act as the point of escalation for the Aer Lingus SOC co-ordinating with the outsourced vendor and internal Cyber and IT teams on response activities and remediations.
- Interact with the SOC on day-to-day operations ensuring delivery of high quality and effective monitoring management and responses processes and continuous development of incident response playbooks
- Partner with other Cyber Defence and Engineering roles to identify opportunities for process and systems integrations to improve service quality and responsiveness
- Ensure Cyber Defence evidence reporting and assurance are fit for purpose (incident records integrity audit trails lessons learned and continuous improvement actions).
- Identify and validate internal and external security weaknesses using both manual techniques and appropriate tooling
- Ensure findings are appropriately documented with clear risk descriptions reproduction steps business and technical impact & pragmatic remediation guidance
- Part of on-call rota for escalations in the event of a major cyber event
- Partner with the outsourced SOC and Threat Management services with daily weekly and monthly operational cadences to ensure full visibility of the current incident landscape and tracking of service KPIs and SLAs
- Support improvements to monitor detect and respond to threats in real time leveraging SIEM EDR SOAR and automation to deliver at scale.
- Assist in the development and maintenance of cyber testing playbooks checklists and standard operating procedures.
- Support planning and delivery of tabletop exercises and simulation tests to enhance readiness with technology and operational teams
- Stay current with emerging threats vulnerabilities and offensive techniques relevant to the organisations tech stack.
Your qualifications and key criteria
- 8 years cybersecurity and/or IT experience with at least 4 years in SOC Incident Response or Offensive Security roles
- Proven experience in direct involvement in cyber incidents fulfilling investigation digital forensics event triaging and response responsibilities
- Practical experience with common offensive security tools and techniques (e.g. Burp Suite Nmap Metasploit custom scripts).
- Relevant Cyber qualifications e.g. GIAC CISSP OSCP CEH or similar
- Familiarity with MITRE ATT&CK framework and modern attacker techniques.
- Experience developing dashboards for reporting on service metrics and trends
- Experience working with outsourced SOC security services
- Scripting and developing skills for integrating cyber tools and automating playbook responses.
- Comfortable being the primary internal response lead on low-medium severity incidents
- Proven proactive and independent thinker willing to speak up and bring new ideas
- Handson proficiency with Cyber Defence technologies (e.g. SIEM Threat Intelligence SOAR EDR platforms such as CrowdStrike ZeroFox Splunk or equivalent).
- Working knowledge of at least one scripting or programming language (e.g. Python Bash PowerShell).
- Demonstrated ability in improving operational processes and playbooks.
- Ability to translate threat intelligence control testing and incident learnings into requirements to improve incident management services.
Division / Department
Digital & Information - IT Other
Contract type
employee recruitment - permanent
Job location
Republic of Ireland Dublin Dublin
Required Experience:
IC
General information Vacancy Reference number 005409 What we offerAs well as offering you a competitive salary career advancement opportunities and staff travel benefits (with Aer Lingus and many ...
General information
Vacancy Reference number
005409 What we offer
As well as offering you a competitive salary career advancement opportunities and staff travel benefits (with Aer Lingus and many other international airlines) you will also have the opportunity to work in a dynamic and collaborative environment and to join a team of amazing professionals who are passionate about the aviation industry. To learn more about the exciting benefits and opportunities that await you at Aer Lingus please visit our website.
At Aer Lingus we embrace diversity and believe in providing equal opportunities to all qualified individuals. We are dedicated to cultivating an inclusive and respectful work environment that values employees unique backgrounds experiences and perspectives. We do not discriminate based on race gender sexual orientation age disability or any other protected status. As an equal opportunity employer we encourage applications from all candidates who share our passion for aviation. If you have any questions or require any accommodations to support you in your application please contact us at
Role title
Cyber Incident Response Analyst
Your role
The Cyber Incident Response Analyst is a key practitioner within the Cyber Defence function responsible for hands-on incident management activities and collaborating day to day with the within a hybrid delivery model they will support incident management services that include 24x7 monitoring rapid incident response and drive proactive improvements of detection and response processes through automation integration and strong operational governance.
This role will work crossfunctionally with teams across Cyber Defence Cyber Engineering and IT supporting ongoing maturity of cyber monitoring coverage and incident management playbooks for timely detection and response processes in addition to improving our security posture by simulating threat actor techniques that test our organisations technical controls and processes to support continuous improvements to the overall cyber security posture.
- Perform incident triage and investigations alongside the SOC to ensure comprehensive and accurate analysis and forensics across EI systems and assets as required.
- Act as the point of escalation for the Aer Lingus SOC co-ordinating with the outsourced vendor and internal Cyber and IT teams on response activities and remediations.
- Interact with the SOC on day-to-day operations ensuring delivery of high quality and effective monitoring management and responses processes and continuous development of incident response playbooks
- Partner with other Cyber Defence and Engineering roles to identify opportunities for process and systems integrations to improve service quality and responsiveness
- Ensure Cyber Defence evidence reporting and assurance are fit for purpose (incident records integrity audit trails lessons learned and continuous improvement actions).
- Identify and validate internal and external security weaknesses using both manual techniques and appropriate tooling
- Ensure findings are appropriately documented with clear risk descriptions reproduction steps business and technical impact & pragmatic remediation guidance
- Part of on-call rota for escalations in the event of a major cyber event
- Partner with the outsourced SOC and Threat Management services with daily weekly and monthly operational cadences to ensure full visibility of the current incident landscape and tracking of service KPIs and SLAs
- Support improvements to monitor detect and respond to threats in real time leveraging SIEM EDR SOAR and automation to deliver at scale.
- Assist in the development and maintenance of cyber testing playbooks checklists and standard operating procedures.
- Support planning and delivery of tabletop exercises and simulation tests to enhance readiness with technology and operational teams
- Stay current with emerging threats vulnerabilities and offensive techniques relevant to the organisations tech stack.
Your qualifications and key criteria
- 8 years cybersecurity and/or IT experience with at least 4 years in SOC Incident Response or Offensive Security roles
- Proven experience in direct involvement in cyber incidents fulfilling investigation digital forensics event triaging and response responsibilities
- Practical experience with common offensive security tools and techniques (e.g. Burp Suite Nmap Metasploit custom scripts).
- Relevant Cyber qualifications e.g. GIAC CISSP OSCP CEH or similar
- Familiarity with MITRE ATT&CK framework and modern attacker techniques.
- Experience developing dashboards for reporting on service metrics and trends
- Experience working with outsourced SOC security services
- Scripting and developing skills for integrating cyber tools and automating playbook responses.
- Comfortable being the primary internal response lead on low-medium severity incidents
- Proven proactive and independent thinker willing to speak up and bring new ideas
- Handson proficiency with Cyber Defence technologies (e.g. SIEM Threat Intelligence SOAR EDR platforms such as CrowdStrike ZeroFox Splunk or equivalent).
- Working knowledge of at least one scripting or programming language (e.g. Python Bash PowerShell).
- Demonstrated ability in improving operational processes and playbooks.
- Ability to translate threat intelligence control testing and incident learnings into requirements to improve incident management services.
Division / Department
Digital & Information - IT Other
Contract type
employee recruitment - permanent
Job location
Republic of Ireland Dublin Dublin
Required Experience:
IC
View more
View less