Permanent

Hybrid

IT

Swords, County Dublin, Ireland

If you need support in completing the application or if you require a different format of this document, please get in touch with at UKI.recruitment@tcs.com with the subject line: “Application Support Request”.

Job Type: Permanent 
Location: Dublin - Onsite   


Careers at TCS: It means more
TCS is a purpose-led transformation company, built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities they serve - our clients include some of the biggest brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership.
  • Gain access to endless learning opportunities. 
  • Fast track your growth with diverse career opportunities internally. 
  • Grow your career, while being exposed to new technologies. 

The Role
The Cyber Operations Engineer is responsible for the continuous improvement, governance, and operational effectiveness of the Cyber security tooling, configurations, and control implementations, focused on strengthening cyber defences by ensuring the cyber tools are configured and performing optimally, across the airline landscape.
Reporting into the Senior Manager of Cyber Defence, this role will work closely with the SOC, Cyber Engineering & Architecture, and IT Technology teams to ensure security tools are correctly configured, governed, and operating as intended. The Cyber Operations Engineer acts as a key bridge between detection/response, engineering design, and day‑to‑day technology operations, and supporting processes to translate threat intelligence, threat actor techniques and recurring incident causes into tangible cyber tooling improvements.

Initial Success factors
  • Establish a baseline of current tooling performance, controls coverage and effectiveness
  • Identify opportunities for removing manual configuration management and cyber control changes, to improve incident response and remediation effort.
Key Responsibilities:
  • Maintain and continuously improve the configuration and effectiveness of cyber security tools and platforms across
    • Email security controls
    • Endpoint and device security (EDR/MDR, hardening)
    • Data, Identity and access security controls
    • Cloud security controls and native security services
    • Network security & Application security tooling (where applicable)
  • Collaborating with Threat Intelligence & Hunting team, Vulnerability team and Cyber Engineering & Architecture to
    • Identify current tooling and/or control gaps and weaknesses
    • Recommend and implement configuration or policy improvements
    • Design and implement preventive and detective control improvements based on incident learnings.
  • Partner with the SOC to
    • Improve detection coverage and fidelity
    • Reduce false positives and alert fatigue
    • Ensure controls align with real‑world attack techniques
  • Support governance and oversight of security tooling by
    • Ensuring configurations align with approved standards and policies
    • Maintaining documentation of control intent and configuration rationale
  • Support Cyber Engineering & Architecture with insights and contributions on cyber tooling selection, control design decisions and effectiveness of cyber platforms.
  • Contribute to the development and maintenance of security configuration standards, baseline cyber standards and operational runbooks
  • Assist in the roll-out of new cyber tooling, to transition into operational and support management, with supporting third parties.
  • Support audits and assessments by providing evidence of control configurations and operational procedures
Your Profile
Essential skills/knowledge/experience:
  • Extensive experience in cybersecurity and/or IT industry experience, with at least 4 years hands on experience in relevant roles (security operations, security engineering, infrastructure or cloud engineering)
  • Demonstrable experience configuring, operating, and improving enterprise‑scale security controls
  • Experience working in close partnership with SOC and IT operations teams
  • Practical experience with cyber platforms such Crowdstrike, Microsoft Purview, Palo Alto
  • Relevant Cyber qualifications e.g. CISSP, GCIH, Cloud Security certs, Security+, or similar relevant qualifications
  • This role is not entry‑level and assumes prior hands‑on experience configuring and tuning IT and/or security tooling across multiple cyber domains (network, cloud, endpoint, email, identity).
  • Strong understanding of modern enterprise security controls and how they fail in practice
  • Comfortable working with configuration management, change control, and operational governance processes.
Desirable skills/knowledge/experience:
  • Working knowledge of at least one scripting or programming language (e.g. Python, Bash, PowerShell)
  • Familiarity with MITRE ATT&CK framework and modern attacker techniques.
Experience working with outsourced providers

Rewards & Benefits
TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care, life assurance, laptop and access to extensive training resources and discounts within the larger Tata network.
We offer health & wellness initiatives and sports events; we are the proud sponsor of the London Marathon and partner with our local communities in Ireland.

Diversity, Inclusion and Wellbeing 
Tata Consultancy Services UK&I is committed to meeting the accessibility needs of all individuals in accordance with the Ireland Employment Equality Acts 1998-2011 (as amended) and the Equal Status Acts 2000-2012 (as amended). 
We welcome and embrace diversity in race, nationality, ethnicity, disability, neurodiversity, gender identity, age, physical ability, gender reassignment, sexual orientation. We are a disability inclusive employer and encourage disabled people to apply for this role. 
As a Disability Confident Employer, we offer an interview to applicants with disabilities or long-term conditions who meet the minimum criteria for the role. Please email us at UKI.recruitment@tcs.com if you would like to opt in.

If you are an applicant who needs any adjustments to the application process or interview, please contact us at UKI.recruitment@tcs.com with the subject line: “Adjustment Request” or email jennifer.long@tcs.com to request an adjustment. We welcome requests prior to you completing the application and at any stage of the recruitment process. 


Beware of Fraudulent offers
This is to notify you that TCS does not ask for any sort of payment or security deposit from candidates at any stage of the recruitment process. The firm never sends out job offers from free internet email services like Gmail, Yahoo Mail, and so on. TCS has not authorised any third-party company to collect money on their behalf. As a vigilant job seeker, beware of fraudulent recruitment activity and protect your interests! You can write to UKI.recruitment@tcs.com to report any fraudulent activity.
Due to the high volume of applications, we will be unable to contact each applicant individually on the status of their application. If you have not received a direct response within 30 days, then it should be deemed unsuccessful on this occasion.

Join us and do more of what matters. Apply online now.