Find Your Next Job
Cybersecurity Engineer, Workday Sirt
Posted on June 10, 2025
- Dublin, Ireland
- 0 - 0 USD (yearly)
- Full Time

Apply to 500+ LinkedIn Jobs Automatically
Please be aware of sites that may ask for you to input your data in connection with a job posting that appears to be from Workday but is not.
In addition, Workday will never ask candidates to pay a recruiting fee, or pay for consulting or coaching services, in order to apply for a job at Workday.
This is a highly technical role with the understanding that you are already conversant in incident response, security automation, system security, network security, and threat hunting. The role primarily focuses on supporting the tooling and automation requirements of the Workday SIRT. However you will be expected to take part as required in the investigative and response operations of the team. We offer a hybrid/flexible schedule for employees.
This is a highly technical role with the understanding that you are already conversant in incident response, security automation, system security, network security, and threat hunting. The role primarily focuses on supporting the tooling and automation requirements of the Workday SIRT. However you will be expected to take part as required in the investigative and response operations of the team. We offer a hybrid/flexible schedule for employees.
You will engage in the following activities:
- Design, implement, deploy, and maintain critical SIRT infrastructure and tooling (e.g., SOAR, SIEM, EDR), ensuring optimal performance and availability for 24/7/365 SIRT operations.
- Develop, integrate, and manage custom automations, scripts, and playbooks to enhance operational efficiency, automate response actions, and improve forensic capabilities.
- Serve as a subject matter expert for key security technologies, providing advanced support, configuration management, and optimization to the SIRT..
- Proactively identify and implement enhancements to security detection and response capabilities by optimizing tool configurations, developing new detection logic, and integrating threat intelligence feeds.
- Lead the evaluation, selection, and implementation of new security tools and technologies, ensuring they align with strategic security objectives and integrate effectively into the existing ecosystem.
- Participate in a scheduled on-call rotation, providing expert-level support for SIRT tooling and assisting with complex technical escalations during incident response activities in a global, follow-the-sun model.
- Collaborate with incident responders, threat hunters, and other internal teams to understand their tooling needs, gather requirements, and deliver effective engineering solutions.
- Actively participate in incident response activities, including digital forensic investigations and security event analysis, leveraging and enhancing security tools to support these efforts.
- Bachelor’s Degree in Computer Science, Cybersecurity, Information Technology, or a related STEM field, or equivalent demonstrable practical experience and engineering excellence.
- 3+ years of hands-on experience in an incident response, security engineering, security operations, or a similar technical role with a strong focus on security tooling and automation.
- Proven experience in designing, implementing, and maintaining core security technologies such as SIEM, SOAR platforms, and EDR solutions.
- Proficiency in Linux/Unix administration and strong scripting/programming skills in languages such as Python, Go, or PowerShell, with experience in developing security automation and integrations.
- Demonstrable experience with configuration management tools (e.g., Ansible, Chef, Puppet, Terraform) and version control systems (e.g., Git).
- Relevant industry certifications such as GIAC (e.g., GCIH, GCIA, GCDA, GDAT), Offensive Security (e.g., OSCP, OSWE), or vendor-specific certifications for SIEM/SOAR technologies.
- Experience with security in public cloud environments (AWS, GCP, Azure), including native security services and infrastructure-as-code practices.
- Solid understanding of network protocols (TCP/IP, DNS, HTTP/S), security principles, and common attack vectors (MITRE ATT&CK Framework).
- Experience participating in incident response processes, including evidence collection, analysis, and containment, supported by strong tooling.
- Excellent problem-solving skills, with the ability to troubleshoot complex technical issues related to security tools and infrastructure.
- Strong communication and collaboration skills, with the ability to explain complex technical concepts to both technical and non-technical audiences.
- Experience with continuous integration/continuous deployment (CI/CD) pipelines and methodologies (e.g., Jenkins, GitLab CI).
- A proactive mindset with a passion for continuous learning and staying updated on the latest security threats, vulnerabilities, and technologies.
Our Approach to Flexible Work
With Flex Work, we’re combining the best of both worlds: in-person time and remote. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. We know that flexibility can take shape in many ways, so rather than a number of required days in-office each week, we simply spend at least half (50%) of our time each quarter in the office or in the field with our customers, prospects, and partners (depending on role). This means you'll have the freedom to create a flexible schedule that caters to your business, team, and personal needs, while being intentional to make the most of time spent together. Those in our remote "home office" roles also have the opportunity to come together in our offices for important moments that matter.
Apply to 500+ LinkedIn Jobs Automatically
Share with Friends!