IT Manager; Security
Listed on 2026-02-18
-
IT/Tech
Cybersecurity, Information Security
Manager, IT Security (International)
Location: United Kingdom
Function: IT
Reports to: VP, Global Security Infrastructure & Operations
The RoleWe are seeking an experienced Manager, IT Security (International) to play a critical role in protecting our global technology environment from cyber threats. This is a senior, hands‑on cybersecurity role where you will design, deploy, and operate enterprise‑grade security systems while acting as a subject matter expert for security, privacy, and emerging technologies such as AI.
This is an individual contributor role with accountability for regional IT security outcomes and the work of third‑party security partners. You will not directly manage employees but will have significant influence across IT Operations, Infrastructure, Applications, and leadership teams.
Hain is the company behind many well‑known household brands, including Ella’s Kitchen, Linda McCartney’s, Harleys, Sun‑Pat, Yorkshire Provender, Cully & Sully and many more. This role offers the opportunity to work across a diverse, exciting portfolio of brands within a growing FMCG environment.
You will work in a global, multi‑country enterprise environment
, helping define and maintain a consistent, high‑performing security posture while leading investigations, strengthening defenses, and driving best practices across the organization.
- Deploy, tune and manage enterprise security platforms including SIEM, IDS/IPS, MDR/XDR, CSPM, email security, firewalls, and network security tools
- Monitor alerts, investigate suspicious activity, and adjust detection logic to reduce false positives and negatives
- Lead incident response activities including containment, forensic analysis, recovery, and root cause analysis
- Perform forensic analysis on network traffic, endpoints, logs, memory and malware samples
- Investigate and document security breaches and cybersecurity incidents
- Support breach response, evidence handling, and communications with internal and external stakeholders
- Participate in security architecture reviews for new systems and projects
- Support vulnerability assessments, penetration tests, and audits
- Work with IT teams to remediate vulnerabilities and reduce risk
- Support SOX, GDPR, CCPA and other compliance activities
- Contribute to third‑party risk management and vendor due diligence
- Develop security standards, policies, and best‑practice documentation
- Support security awareness training and phishing simulations
- Participate in disaster recovery and business continuity planning and testing
You will meet one of the following:
- Associate degree + 4 years in Information Security
- Bachelor’s degree + 2 years in Information Security
- Or 6+ years in a relevant technical security role
- GIAC (GSEC, GCIH, GCED)
- (ISC)² (CISSP, SSCP, CCSP, CGRC, ISSAP, ISSEP, ISSMP)
- EC‑Council (CEH, CPENT, CHFI, CND, ECIH, CTIA)
- CompTIA (Security+, CASP+)
You will bring strong expertise in:
- SIEM and security monitoring
, alert tuning and investigation - Incident response and breach management
- Vulnerability scanning tools (Nessus, Qualys, Rapid7)
- Security frameworks such as NIST, ISO 27001, COBIT
- Data protection,
DLP
, and privacy regulations (
GDPR, CCPA, HIPAA
) - Microsoft 365
, SSO, MFA and identity security - Windows & Linux systems, networking (TCP/IP), and security infrastructure
- Digital forensics, evidence handling, and eDiscovery
- Security awareness training and phishing simulations
- Understanding and safe use of AI tools and technologies
You will also have:
- Excellent communication skills with technical and non-technical audiences
- Strong analytical and problem‑solving ability
- The ability to stay calm and effective in high‑pressure situations
- A passion for staying ahead of evolving cybersecurity threats
- Global, multi‑country IT environment
- On‑call responsibilities including nights, weekends and holidays
- Occasional international travel
- Some overtime or adjusted hours may be required
- 70% – Security operations, incident response, technical projects
- 20% – Collaboration with IT Operations and Security teams
- 10% – Planning, documentation, reporting and research
If this role sounds like it’s for you, we’d love to hear from you — apply now and take the next step in your cybersecurity career.
#J-18808-LjbffrTo Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: