Advisory Blue Team Co-op

Kilkenny, County Kilkenny, Ireland

Security Risk Advisors

Cybersecurity Consulting and 24x7x365 CyberSOC. SRA is a leader in advanced security testing, operations, and program development.

View company page

SRA’s mission is to level up every day to protect our clients and their customers. This begins with our team members and their experience. SRA prides itself on maintaining a culture where team members have a shared sense of support and belonging, consistent with our It’s Personal company value. At SRA, we prioritize transparent career pathing, varied DEI programming and community groups, competitive benefits including mental health support, and an emphasis on a sustainable, healthy, and engaging work culture. SRA has twice been named a Best Place to Work by the Philadelphia Business Journal. 

These Essential Functions, Requirements, and Skills are guidelines. If you are a candidate who does not meet this exact job description but can demonstrate excellent organization, attention to detail, professionalism, flexibility, and self-direction in your professional background, we hope you apply. SRA values a diverse workplace and strongly encourages women, people of color, LGBTQ+ individuals, people with disabilities, members of ethnic minorities, and veterans to apply.  



The Cyber Defense Engineering Co-op position will be part of Security Risk Advisors’ Threat Management team which is comprised of Advisory and Engineering services. Our style of consulting is dynamic, innovative, fast- paced, and highly rewarding for both our clients and our team. This is an outstanding opportunity to work with a wide variety of tool sets and across various well-known client organizations. 

Essential Functions  

Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.  


  • Apply Threat Management’s services across multiple client engagements involving Incident Response (IR), Data Loss Prevention (DLP), Endpoint Detection and Response (EDR), Network Traffic Analysis, Security Information and Event Management (SIEM), Enterprise Security Architecture and Perimeter Management. 
  • Collaborate with team members to assist with the design and implementation of security strategy and architecture across platforms for a variety of solutions. 
  • Conduct requirements gathering, analysis, and assist in development of security strategy for clients. 
  • Work effectively as part of a team to deliver projects. 
  • Use tools such as FireEye, Fidelis, Splunk, Intel/McAfee, IBM, Symantec, Palo Alto, Resilient, Cybereason, Tanium, CarbonBlack, Bro and Snort. 
  • Thoroughly document work in formal reports and present findings to management suitable for customer consumption. 
  • Remain current on information security and emerging threat trends, tools and methodologies. 
  • Protect organization's value by keeping information confidential.  


Supervisory Responsibility  

Not Applicable. 


Work Environment  

This job operates in a professional office environment, and all co-ops are expected to work in the office every day. This role routinely uses standard office equipment.  


Physical Demands  

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. While performing the duties of this job, the employee is regularly required to talk and hear; use hands to finger, handle, or feel; and reach with hands and arms. The employee frequently is required to stand and walk. This is a largely sedentary role. 


Candidates with disabilities are encouraged to apply and email with any questions. Reasonable accommodations may be made to enable disabled individuals to perform the essential functions of this role.  


Position Type/Expected Hours of Work  

This is a full-time position and hours of work and days are Monday through Friday 8:30am to 5pm. Occasional evening and weekend work may be required as job duties demand.  





  • In-progress or completed formal cybersecurity training program, including an undergraduate program or cybersecurity certification/boot camp. 
  • Strong organization skills with attention to detail. 
  • Some knowledge around incident investigation, forensics, and advanced threat controls. 
  • Interest in taking the initiative for personal growth and development. 
  • Flexibility to accommodate changing schedules of client and project needs. 
  • Strong written and verbal communication skills with a high level of professionalism. 
  • Willingness to travel depending on assignments and specializations. 
  • Punctuality and timely attendance to external client and internal stakeholder needs. 


Preferred Qualifications and Experience  

  • Previous information security experience is a plus.  


Other Duties  

Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.  


Equal Employment Opportunity Statement  

Security Risk Advisors is an Equal Opportunity Employer and prohibits discrimination or harassment of any kind. All employment decisions at SRA are based on business needs, job requirements, and individual qualifications, without regard to race, color, sex, sexual orientation, gender identity or expression, age, religion, national origin, disability, marital or family status, veteran status, medical condition, or any similar category protected by law.    

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Blue team Cyber defense EDR Forensics Incident response Security strategy SIEM Snort Splunk Strategy

Perks/benefits: Career development Health care Startup environment

Region: Europe
Country: Ireland
Job stats:  15  2  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.