This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Security Operations Support Administrator will play an essential role within the Security Operations Center (SOC) team by assisting with the monitoring and analysis of security systems, incident response, and threat management. The role involves working closely with senior analysts and other IT staff to ensure the security of GNI’s information and operational systems.
Job Responsibility:
Monitor, triage, and analyse security alerts from tools such as SIEM, IDS/IPS, firewalls, and endpoint protection platforms
Identify anomalous or suspicious activity, escalating findings to senior analysts as needed
Assist with initial investigation of security incidents and support containment and remediation activities
Document incident timelines, impacts, and actions in accordance with established response procedures
Gather and interpret threat intelligence from internal and external sources
Support development or tuning of detection rules/use cases to improve SOC visibility
Run vulnerability scans, review results, assist with remediation tracking, and verify closure of findings
Help maintain the organization’s vulnerability and patch management cycle
Produce regular security dashboards, metrics, and status updates for internal stakeholders
Maintain accurate SOPs, process documentation, and incident records
Contribute to the evolution of SOC workflows and playbooks
Support technical evaluations during security‑related tenders and assessments
Participate in ongoing training, certifications, and skill‑development programs
Promote a culture of safety, security, and compliance across GNI
Participate in On-Call rotation or after‑hours incident response when required
Requirements:
1–2 years' experience in IT, cybersecurity, or network administration
NFQ Level 6 qualification in Cybersecurity, IT, or equivalent experience
Basic understanding of security principles, attack vectors, and common threats
Familiarity with modern cloud environments (Azure, AWS, or equivalent)
Exposure to tools such as SIEM, firewalls, EDR/AV, or vulnerability scanners
Understanding of network protocols, log analysis, and system hardening
Awareness of frameworks such as NIST CSF, ISO 27001, or MITRE ATT&CK
Strong analytical and problem‑solving mindset
Clear communication skills with the ability to explain technical issues to non‑technical audiences
Team‑oriented, proactive, and committed to high standards of delivery
Eagerness to learn, adapt, and grow within the cybersecurity domain
Nice to have:
Experience with scripting or automation (PowerShell, Python) is beneficial but not required
What we offer:
Opportunities for career growth and advancement within the cybersecurity field
Part of an organisation with a strong commitment to supporting and developing our workforce
Opportunity to get involved in our ambitious iBelong programme ensuring a diverse, equitable and inclusive environment
Time to Talk Mental Health programme and our wellbeing initiatives