The Role
We are seeking an experienced Manager, IT Security (International) to play a critical role in protecting our global technology environment from cyber threats. This is a senior, hands-on cybersecurity role where you will design, deploy, and operate enterprise-grade security systems while acting as a subject matter expert for security, privacy, and emerging technologies such as AI.
This is an individual contributor role with accountability for regional IT security outcomes and the work of third-party security partners. You will not directly manage employees but will have significant influence across IT Operations, Infrastructure, Applications, and leadership teams.
Hain is the company behind many well-known household brands, including Ella’s Kitchen, Linda McCartney’s, Harleys, Sun-Pat, Yorkshire Provender, Cully & Sully and many more. This role offers the opportunity to work across a diverse, exciting portfolio of brands within a growing FMCG environment.
You will work in a global, multi-country enterprise environment, helping define and maintain a consistent, high-performing security posture while leading investigations, strengthening defenses, and driving best practices across the organization.
What You’ll Be Doing
Security Operations & Threat Management
1. Deploy, tune and manage enterprise security platforms including SIEM, IDS/IPS, MDR/XDR, CSPM, email security, firewalls, and network security tools
2. Monitor alerts, investigate suspicious activity, and adjust detection logic to reduce false positives and negatives
3. Lead incident response activities including containment, forensic analysis, recovery, and root cause analysis
Incident Response & Forensics
4. Perform forensic analysis on network traffic, endpoints, logs, memory and malware samples
5. Investigate and document security breaches and cybersecurity incidents
6. Support breach response, evidence handling, and communications with internal and external stakeholders
Security Architecture & Risk Management
7. Participate in security architecture reviews for new systems and projects
8. Support vulnerability assessments, penetration tests, and audits
9. Work with IT teams to remediate vulnerabilities and reduce risk
Governance, Compliance & Third-Party Risk
10. Support SOX, GDPR, CCPA and other compliance activities
11. Contribute to third-party risk management and vendor due diligence
12. Develop security standards, policies, and best-practice documentation
Training, Awareness & Resilience
13. Support security awareness training and phishing simulations
14. Participate in disaster recovery and business continuity planning and testing
What We’re Looking For
Required Experience
You will meet one of the following:
15. Associate degree + 4 years in Information Security
16. Bachelor’s degree + 2 years in Information Security
17. Or 6+ years in a relevant technical security role
Preferred Certifications
18. GIAC (GSEC, GCIH, GCED)
19. (ISC)² (CISSP, SSCP, CCSP, CGRC, ISSAP, ISSEP, ISSMP)
20. EC-Council (CEH, CPENT, CHFI, CND, ECIH, CTIA)
21. CompTIA (Security+, CASP+)
Technical & Professional Skills
You will bring strong expertise in:
22. SIEM and security monitoring, alert tuning and investigation
23. Incident response and breach management
24. Vulnerability scanning tools (Nessus, Qualys, Rapid7)
25. Security frameworks such as NIST, ISO 27001, COBIT
26. Data protection, DLP, and privacy regulations (GDPR, CCPA, HIPAA)
27. Microsoft 365, SSO, MFA and identity security
28. Windows & Linux systems, networking (TCP/IP), and security infrastructure
29. Digital forensics, evidence handling, and eDiscovery
30. Security awareness training and phishing simulations
31. Understanding and safe use of AI tools and technologies
You will also have:
32. Excellent communication skills with technical and non-technical audiences
33. Strong analytical and problem-solving ability
34. The ability to stay calm and effective in high-pressure situations
35. A passion for staying ahead of evolving cybersecurity threats
Working Environment
36. Global, multi-country IT environment
37. On-call responsibilities including nights, weekends and holidays
38. Occasional international travel
39. Some overtime or adjusted hours may be required
How Your Time Will Be Spent
40. 70% – Security operations, incident response, technical projects
41. 20% – Collaboration with IT Operations and Security teams
42. 10% – Planning, documentation, reporting and research
Ready to Apply?
If this role sounds like it’s for you, we’d love to hear from you — apply now and take the next step in your cybersecurity career.
Qualifications
Benefits
Not Specified