Senior IT Security Specialist

Galway
1 day ago
Create job alert

Senior IT Security Specialist - Ireland or Malta

Competitive salary + performance bonus
Approx. 30-40% travel across European sites (IE, UK, MT, FR, ES, IT)
Must be eligible to work in the EU and internationally

A fantastic opportunity for a Senior IT Security Specialist to support, enhance, and secure mission‑critical systems across multiple European entities within a fast‑growing global technology organisation. This role combines hands‑on technical security, compliance leadership, auditing, incident response, and cross‑functional collaboration in a dynamic, international environment.

Key Responsibilities

Information Security Governance & Compliance

Lead and support certification and recertification activities across European sites (Ireland, UK, Malta, France, Spain, Italy).
Conduct internal audits and produce comprehensive reports covering all aspects of Information Security.
Ensure adherence to ISO27001, ISO14001, ISO9001, ISO14298, NIST CSF, EAL and other relevant standards.
Monitor compliance with corporate security policies among employees, contractors, and third parties; initiate corrective actions where required.
Maintain awareness of regional legal, regulatory, and safety requirements and ensure organisational alignment.Security Operations & Awareness

Promote information security awareness through training, communication, and proactive engagement across the organisation.
Support and occasionally lead global security incident response activities.
Track advancements in security technologies and emerging threats, providing recommendations for continuous improvement.
Perform risk assessments, analyse remediation options, and generate executive security reports.
Conduct third‑party security reviews and document findings and mitigation plans.

Technical Security Activities

Act as part of the team responsible for Toppan Security's global security architecture.
Support and perform vulnerability assessments, compliance scans, and VAPT activities (including coordination with external partners).
Review new systems, applications, and infrastructure for security impact.
Maintain hardware and software inventories and ensure accurate security asset management.Additional Responsibilities (Occasional Mandate)

Isolated / Non‑Internet‑Connected Environments

Monitor system availability and backup integrity.
Perform basic maintenance, patching, software deployment, and updates.
Manage user access, permissions, and account administration.Level 1 Technical Support (Local Site Support)

Act as first‑line IT support for local users, escalating to Global IT when required.
Troubleshoot Windows/Mac issues, printers, peripherals, and application problems.
Support installation and configuration of laptops, workstations, and network equipment.
Troubleshoot physical and wireless network connectivity.
Liaise with third‑party vendors for specialised technical services.Reporting Structure

For technical IT operational duties within this scope, the role will report directly to the Global IT Manager, in addition to standard organisational reporting lines.

Qualifications & Experience

Required

Minimum 5 years' experience in information security, risk management, or compliance.
Strong familiarity with security frameworks, management systems, and auditing practices (ISO27001, ISO14001, ISO9001, ISO14298, NIST CSF, EAL).
Solid understanding of cloud security, application security, and enterprise architecture (IAM, directory services, network and systems concepts).
Proven track record delivering critical IT Security projects across multiple business units.
Demonstrated ability to manage conflict, drive decisions, and guide complex, cross‑functional initiatives.
Experience operating across international sites.Skills & Competencies

Fluent English communication skills, both written and verbal.
Excellent auditing, analytical, and documentation abilities.
Strong stakeholder management and ability to communicate professionally at all organisational levels.
Highly organised with strong planning, forecasting, and budget awareness.
Ability to anticipate risks, propose solutions, and act decisively.
Energetic, goal‑driven, resilient, and comfortable working in a fast‑paced, dynamic environment.
Team-oriented with a positive attitude and a collaborative mindset.
Strong critical thinking and problem‑solving capabilities.Work Environment & Expectations

Primarily office‑based with travel requirements across European entities.
Regular international travel required; valid passport essential.
Must comply with all corporate policies related to Quality, Security, Safety, Business Continuity, and Environmental Management.
Must be legally eligible to work in the country of hire.

Services advertised by Gold Group are those of an Agency and/or an Employment Business.
We will contact you within the next 14 days if you are selected for interview. For a copy of our privacy policy please visit our website

Related Jobs

View all jobs

IT Support Technician

Interim Head of IT

Head of IT

Product Manager

Vetting & Security Administrator

IT Specialist

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.