Similar Jobs

Job description
The Role
We are seeking an experienced Manager, IT Security (International) to play a critical role in protecting our global technology environment from cyber threats. This is a senior, hands-on cybersecurity role where you will design, deploy, and operate enterprise-grade security systems while acting as a subject matter expert for security, privacy, and emerging technologies such as AI.
This is an individual contributor role with accountability for regional IT security outcomes and the work of third-party security partners. You will not directly manage employees but will have significant influence across IT Operations, Infrastructure, Applications, and leadership teams.
Hain is the company behind many well-known household brands, including Ella’s Kitchen, Linda McCartney’s, Harleys, Sun-Pat, Yorkshire Provender, Cully & Sully and many more. This role offers the opportunity to work across a diverse, exciting portfolio of brands within a growing FMCG environment.
You will work in a global, multi-country enterprise environment, helping define and maintain a consistent, high-performing security posture while leading investigations, strengthening defenses, and driving best practices across the organization.
What You’ll Be Doing
Security Operations & Threat Management
Deploy, tune and manage enterprise security platforms including SIEM, IDS/IPS, MDR/XDR, CSPM, email security, firewalls, and network security tools
Monitor alerts, investigate suspicious activity, and adjust detection logic to reduce false positives and negatives
Lead incident response activities including containment, forensic analysis, recovery, and root cause analysis
Incident Response & Forensics
Perform forensic analysis on network traffic, endpoints, logs, memory and malware samples
Investigate and document security breaches and cybersecurity incidents
Support breach response, evidence handling, and communications with internal and external stakeholders
Security Architecture & Risk Management
Participate in security architecture reviews for new systems and projects
Support vulnerability assessments, penetration tests, and audits
Work with IT teams to remediate vulnerabilities and reduce risk
Governance, Compliance & Third-Party Risk
Support SOX, GDPR, CCPA and other compliance activities
Contribute to third-party risk management and vendor due diligence
Develop security standards, policies, and best-practice documentation
Training, Awareness & Resilience
Support security awareness training and phishing simulations
Participate in disaster recovery and business continuity planning and testing
What We’re Looking For
Required Experience
You will meet one of the following:
Associate degree + 4 years in Information Security
Bachelor’s degree + 2 years in Information Security
Or 6+ years in a relevant technical security role
Preferred Certifications
GIAC (GSEC, GCIH, GCED)
(ISC)² (CISSP, SSCP, CCSP, CGRC, ISSAP, ISSEP, ISSMP)
EC-Council (CEH, CPENT, CHFI, CND, ECIH, CTIA)
CompTIA (Security+, CASP+)
Technical & Professional Skills
You will bring strong expertise in:
SIEM and security monitoring, alert tuning and investigation
Incident response and breach management
Vulnerability scanning tools (Nessus, Qualys, Rapid7)
Security frameworks such as NIST, ISO 27001, COBIT
Data protection, DLP, and privacy regulations (GDPR, CCPA, HIPAA)
Microsoft 365, SSO, MFA and identity security
Windows & Linux systems, networking (TCP/IP), and security infrastructure
Digital forensics, evidence handling, and eDiscovery
Security awareness training and phishing simulations
Understanding and safe use of AI tools and technologies
You will also have:
Excellent communication skills with technical and non-technical audiences
Strong analytical and problem-solving ability
The ability to stay calm and effective in high-pressure situations
A passion for staying ahead of evolving cybersecurity threats
Working Environment
Global, multi-country IT environment
On-call responsibilities including nights, weekends and holidays
Occasional international travel
Some overtime or adjusted hours may be required
How Your Time Will Be Spent
70% – Security operations, incident response, technical projects
20% – Collaboration with IT Operations and Security teams
10% – Planning, documentation, reporting and research
