Job description

The Role

We are seeking an experienced Manager, IT Security (International) to play a critical role in protecting our global technology environment from cyber threats. This is a senior, hands-on cybersecurity role where you will design, deploy, and operate enterprise-grade security systems while acting as a subject matter expert for security, privacy, and emerging technologies such as AI.

This is an individual contributor role with accountability for regional IT security outcomes and the work of third-party security partners. You will not directly manage employees but will have significant influence across IT Operations, Infrastructure, Applications, and leadership teams.

Hain is the company behind many well-known household brands, including Ella’s Kitchen, Linda McCartney’s, Harleys, Sun-Pat, Yorkshire Provender, Cully & Sully and many more. This role offers the opportunity to work across a diverse, exciting portfolio of brands within a growing FMCG environment.

You will work in a global, multi-country enterprise environment, helping define and maintain a consistent, high-performing security posture while leading investigations, strengthening defenses, and driving best practices across the organization.

 

What You’ll Be Doing

Security Operations & Threat Management

Deploy, tune and manage enterprise security platforms including SIEM, IDS/IPS, MDR/XDR, CSPM, email security, firewalls, and network security tools

Monitor alerts, investigate suspicious activity, and adjust detection logic to reduce false positives and negatives

Lead incident response activities including containment, forensic analysis, recovery, and root cause analysis

Incident Response & Forensics

Perform forensic analysis on network traffic, endpoints, logs, memory and malware samples

Investigate and document security breaches and cybersecurity incidents

Support breach response, evidence handling, and communications with internal and external stakeholders

Security Architecture & Risk Management

Participate in security architecture reviews for new systems and projects

Support vulnerability assessments, penetration tests, and audits

Work with IT teams to remediate vulnerabilities and reduce risk

Governance, Compliance & Third-Party Risk

Support SOX, GDPR, CCPA and other compliance activities

Contribute to third-party risk management and vendor due diligence

Develop security standards, policies, and best-practice documentation

Training, Awareness & Resilience

Support security awareness training and phishing simulations

Participate in disaster recovery and business continuity planning and testing

 

What We’re Looking For

Required Experience

You will meet one of the following:

Associate degree + 4 years in Information Security

Bachelor’s degree + 2 years in Information Security

Or 6+ years in a relevant technical security role

 

Preferred Certifications

GIAC (GSEC, GCIH, GCED)

(ISC)² (CISSP, SSCP, CCSP, CGRC, ISSAP, ISSEP, ISSMP)

EC-Council (CEH, CPENT, CHFI, CND, ECIH, CTIA)

CompTIA (Security+, CASP+)

 

Technical & Professional Skills

You will bring strong expertise in:

SIEM and security monitoring, alert tuning and investigation

Incident response and breach management

Vulnerability scanning tools (Nessus, Qualys, Rapid7)

Security frameworks such as NIST, ISO 27001, COBIT

Data protection, DLP, and privacy regulations (GDPR, CCPA, HIPAA)

Microsoft 365, SSO, MFA and identity security

Windows & Linux systems, networking (TCP/IP), and security infrastructure

Digital forensics, evidence handling, and eDiscovery

Security awareness training and phishing simulations

Understanding and safe use of AI tools and technologies

 

You will also have:

Excellent communication skills with technical and non-technical audiences

Strong analytical and problem-solving ability

The ability to stay calm and effective in high-pressure situations

A passion for staying ahead of evolving cybersecurity threats

Working Environment

Global, multi-country IT environment

On-call responsibilities including nights, weekends and holidays

Occasional international travel

Some overtime or adjusted hours may be required

 

How Your Time Will Be Spent

70% – Security operations, incident response, technical projects

20% – Collaboration with IT Operations and Security teams

10% – Planning, documentation, reporting and research

Benefits:

Login/Register

Choose user role to login or start registration