Manager, IT Security (International)
Location: United Kingdom
Function: IT
Reports to: VP, Global Security Infrastructure & Operations
The Role
We are seeking an experienced Manager, IT Security (International) to play a critical role in protecting our global technology environment from cyber threats. This is a senior, hands-on cybersecurity role where you will design, deploy, and operate enterprise-grade security systems while acting as a subject matter expert for security, privacy, and emerging technologies such as AI.
This is an individual contributor role with accountability for regional IT security outcomes and the work of third-party security partners. You will not directly manage employees but will have significant influence across IT Operations, Infrastructure, Applications, and leadership teams.
Hain is the company behind many well-known household brands, including Ella’s Kitchen, Linda McCartney’s, Harleys, Sun-Pat, Yorkshire Provender, Cully & Sully and many more. This role offers the opportunity to work across a diverse, exciting portfolio of brands within a growing FMCG environment.
You will work in a global, multi-country enterprise environment, helping define and maintain a consistent, high-performing security posture while leading investigations, strengthening defenses, and driving best practices across the organization.
What You’ll Be Doing
Security Operations & Threat Management
-
Deploy, tune and manage enterprise security platforms including SIEM, IDS/IPS, MDR/XDR, CSPM, email security, firewalls, and network security tools
-
Monitor alerts, investigate suspicious activity, and adjust detection logic to reduce false positives and negatives
-
Lead incident response activities including containment, forensic analysis, recovery, and root cause analysis
Incident Response & Forensics
-
Perform forensic analysis on network traffic, endpoints, logs, memory and malware samples
-
Investigate and document security breaches and cybersecurity incidents
-
Support breach response, evidence handling, and communications with internal and external stakeholders
Security Architecture & Risk Management
-
Participate in security architecture reviews for new systems and projects
-
Support vulnerability assessments, penetration tests, and audits
-
Work with IT teams to remediate vulnerabilities and reduce risk
Governance, Compliance & Third-Party Risk
-
Support SOX, GDPR, CCPA and other compliance activities
-
Contribute to third-party risk management and vendor due diligence
-
Develop security standards, policies, and best-practice documentation
Training, Awareness & Resilience
What We’re Looking For
Required Experience
You will meet one of the following:
-
Associate degree + 4 years in Information Security
-
Bachelor’s degree + 2 years in Information Security
-
Or 6+ years in a relevant technical security role
Preferred Certifications
-
GIAC (GSEC, GCIH, GCED)
-
(ISC)² (CISSP, SSCP, CCSP, CGRC, ISSAP, ISSEP, ISSMP)
-
EC-Council (CEH, CPENT, CHFI, CND, ECIH, CTIA)
-
CompTIA (Security+, CASP+)
Technical & Professional Skills
You will bring strong expertise in:
-
SIEM and security monitoring, alert tuning and investigation
-
Incident response and breach management
-
Vulnerability scanning tools (Nessus, Qualys, Rapid7)
-
Security frameworks such as NIST, ISO 27001, COBIT
-
Data protection, DLP, and privacy regulations (GDPR, CCPA, HIPAA)
-
Microsoft 365, SSO, MFA and identity security
-
Windows & Linux systems, networking (TCP/IP), and security infrastructure
-
Digital forensics, evidence handling, and eDiscovery
-
Security awareness training and phishing simulations
-
Understanding and safe use of AI tools and technologies
You will also have:
-
Excellent communication skills with technical and non-technical audiences
-
Strong analytical and problem-solving ability
-
The ability to stay calm and effective in high-pressure situations
-
A passion for staying ahead of evolving cybersecurity threats
Working Environment
-
Global, multi-country IT environment
-
On-call responsibilities including nights, weekends and holidays
-
Occasional international travel
-
Some overtime or adjusted hours may be required
How Your Time Will Be Spent
-
70% – Security operations, incident response, technical projects
-
20% – Collaboration with IT Operations and Security teams
-
10% – Planning, documentation, reporting and research
Ready to Apply?
If this role sounds like it’s for you, we’d love to hear from you — apply now and take the next step in your cybersecurity career.