If you need support in completing the application or if you require a different format of this document, please get in touch with at UKI.recruitment@tcs.com with the subject line: “Application Support Request”.
Job Type: Permanent
Location: Dublin - Onsite
Careers at TCS: It means more
TCS is a purpose-led transformation company, built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities they serve - our clients include some of the biggest brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership.
Gain access to endless learning opportunities.
Fast track your growth with diverse career opportunities internally.
Grow your career, while being exposed to new technologies.
The Role
The Cyber Operations Engineer is responsible for the continuous improvement, governance, and operational effectiveness of the Cyber security tooling, configurations, and control implementations, focused on strengthening cyber defences by ensuring the cyber tools are configured and performing optimally, across the airline landscape.
Reporting into the Senior Manager of Cyber Defence, this role will work closely with the SOC, Cyber Engineering & Architecture, and IT Technology teams to ensure security tools are correctly configured, governed, and operating as intended. The Cyber Operations Engineer acts as a key bridge between detection/response, engineering design, and day‑to‑day technology operations, and supporting processes to translate threat intelligence, threat actor techniques and recurring incident causes into tangible cyber tooling improvements.
Initial Success factors
Establish a baseline of current tooling performance, controls coverage and effectiveness
Identify opportunities for removing manual configuration management and cyber control changes, to improve incident response and remediation effort.
Key Responsibilities:
Maintain and continuously improve the configuration and effectiveness of cyber security tools and platforms across
Email security controls
Endpoint and device security (EDR/MDR, hardening)
Data, Identity and access security controls
Cloud security controls and native security services
Network security & Application security tooling (where applicable)
Collaborating with Threat Intelligence & Hunting team, Vulnerability team and Cyber Engineering & Architecture to
Identify current tooling and/or control gaps and weaknesses
Recommend and implement configuration or policy improvements
Design and implement preventive and detective control improvements based on incident learnings.
Partner with the SOC to
Improve detection coverage and fidelity
Reduce false positives and alert fatigue
Ensure controls align with real‑world attack techniques
Support governance and oversight of security tooling by
Support Cyber Engineering & Architecture with insights and contributions on cyber tooling selection, control design decisions and effectiveness of cyber platforms.
Contribute to the development and maintenance of security configuration standards, baseline cyber standards and operational runbooks
Assist in the roll-out of new cyber tooling, to transition into operational and support management, with supporting third parties.
Support audits and assessments by providing evidence of control configurations and operational procedures
Your Profile
Essential skills/knowledge/experience:
Extensive experience in cybersecurity and/or IT industry experience, with at least 4 years hands on experience in relevant roles (security operations, security engineering, infrastructure or cloud engineering)
Demonstrable experience configuring, operating, and improving enterprise‑scale security controls
Experience working in close partnership with SOC and IT operations teams
Practical experience with cyber platforms such Crowdstrike, Microsoft Purview, Palo Alto
Relevant Cyber qualifications e.g. CISSP, GCIH, Cloud Security certs, Security+, or similar relevant qualifications
This role is not entry‑level and assumes prior hands‑on experience configuring and tuning IT and/or security tooling across multiple cyber domains (network, cloud, endpoint, email, identity).
Strong understanding of modern enterprise security controls and how they fail in practice
Comfortable working with configuration management, change control, and operational governance processes.
Desirable skills/knowledge/experience:
Working knowledge of at least one scripting or programming language (e.g. Python, Bash, PowerShell)
Familiarity with MITRE ATT&CK framework and modern attacker techniques.
Experience working with outsourced providers
Rewards & Benefits
TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care, life assurance, laptop and access to extensive training resources and discounts within the larger Tata network.
We offer health & wellness initiatives and sports events; we are the proud sponsor of the London Marathon and partner with our local communities in Ireland.
Diversity, Inclusion and Wellbeing
Tata Consultancy Services UK&I is committed to meeting the accessibility needs of all individuals in accordance with the Ireland Employment Equality Acts 1998-2011 (as amended) and the Equal Status Acts 2000-2012 (as amended).
We welcome and embrace diversity in race, nationality, ethnicity, disability, neurodiversity, gender identity, age, physical ability, gender reassignment, sexual orientation. We are a disability inclusive employer and encourage disabled people to apply for this role.
As a Disability Confident Employer, we offer an interview to applicants with disabilities or long-term conditions who meet the minimum criteria for the role. Please email us at UKI.recruitment@tcs.com if you would like to opt in.
If you are an applicant who needs any adjustments to the application process or interview, please contact us at UKI.recruitment@tcs.com with the subject line: “Adjustment Request” or email jennifer.long@tcs.com to request an adjustment. We welcome requests prior to you completing the application and at any stage of the recruitment process.
Beware of Fraudulent offers
This is to notify you that TCS does not ask for any sort of payment or security deposit from candidates at any stage of the recruitment process. The firm never sends out job offers from free internet email services like Gmail, Yahoo Mail, and so on. TCS has not authorised any third-party company to collect money on their behalf. As a vigilant job seeker, beware of fraudulent recruitment activity and protect your interests! You can write to UKI.recruitment@tcs.com to report any fraudulent activity.
Due to the high volume of applications, we will be unable to contact each applicant individually on the status of their application. If you have not received a direct response within 30 days, then it should be deemed unsuccessful on this occasion.
Join us and do more of what matters. Apply online now.