National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Security Operations Manager

South West Water
Devon
2 days ago
Create job alert

At South West Water we believe that the strongest businesses are built on solid, stable foundations - with a vision and a culture that gives them the freedom to change, improve and innovate. We’re proud to be responsible for providing reliable, efficient and high-quality drinking water and wastewater services for the beautiful South West area. And we have huge ambitions. Not only are we committed to reaching net-zero by 2030, but we’ve also partnered with Wildlife Trusts, National Parks and local partners to help ensure a better future for generations to come. So, if you want to be part of a diverse team where opportunities flow and fresh ideas are welcomed, #JustAddWater.New opportunity for aSecurity Operations Managerto join our IT Security Operations Team based inExeter. This is apermanent full timewith a salary ranging from£55,000-£65,000 plus benefits.The roleAs Security Operations Manager, you will lead and manage the Security Operations Team and have responsibility for security event monitoring, management and incident response. Reporting to the Chief Information Security officer, you will focus on ensuring the Pennon Group’s Corporate and Operational Technology information systems are available, integral and confidential.

What you’ll be doing

Lead and provide first line supervision to the Security Operations Team that is primarily responsible for security event monitoring, management and incident response. Act as the focal point for any investigations involving information security. Provide management oversight for information security incident identification, assessment, and response, reporting, communication, mitigation and monitoring. Play a significant role in long-term Security Operations strategy and planning, including initiatives geared toward operational excellence. Ensure information security incidents are compliant with SLAs and process adherence. Revise and develop processes to strengthen the current Security Operations procedures to achieve operational efficiency and effectiveness. Oversee management, administration & maintenance of security devices under the management of the Information Security function. Creation of reports, dashboards, metrics for security operations and presentation to Senior Management and the Exec Board. 

What we’re looking for

Extensive IT knowledge and experience in Cyber Security and Information Security standards and frameworks such as ISO27001 and Cyber Essentials. Confident in leading and managing teams Proficient in Incident Management and Response procedures and familiarity of ITIL. Extensive and broad-based IT and business experience, delivering diverse corporate and operational IT services in a medium/large organisation. In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management and incident management. Knowledge of organisation applications, databases, operating systems to address security threats against the same. Experience building relationships with and influencing senior leaders and stakeholders. Educated to degree level standard or able to demonstrate working to degree level and ideally hold recognised Information Security qualification ( CISSP, CEH, CISM, GIAC)  Ability to complete UK Government Security Clearance (SC) process successfully

What’s in it for you

We know that the support and commitment of our staff is key to our success so you will receive the opportunity for ongoing development and training for a long-term career with us. We’re one of the largest companies in the South West and are proud to have been awarded Investors in People recognition.In return, we offer an excellent range of benefits including:Generous holiday allowance plus bank holidays A discretionary Bonus Competitive Contributory Pension Share-save Scheme Various health benefits Wellbeing support programmes A range of Group Discounts Cycle to Work Scheme Financial support services And plenty more!

Closing date:15th July 2025Be yourself, we like it that way.Together, we will build a culture of belonging, where inclusion is instinctive. Diversity is our strength and a reflection of our communities. We care, we value everyone, we celebrate uniqueness.Our core values which are essential to our success are:Be Rock Solid- Build trust and be trusted. Be the one we all look to and can depend on.Be You- We want you to bring your best everyday. Be yourself and make your mark in your individual way.Be the Future- Embrace change. Drive Progress. Own the challenge.

Related Jobs

View all jobs

Security Operations Manager

Security Operations Manager

Security Operations Manager

Security Operations Manager

Security Operations Manager

Security Operations Manager

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.

Cyber Security Jobs Employer Hotlist 2025: 50 UK Companies Actively Hiring Right Now

Bookmark this guide—refreshed every quarter—so you always know who’s really expanding their cyber security teams. Ransomware payouts broke records in 2024, the UK’s new Cyber Security Bill imposed mandatory breach disclosure, and the National Cyber Force’s move to Samlesbury has super‑charged the northern skills market. Result? Demand for security architects, SOC analysts, penetration testers, cloud‑security engineers, threat hunters & GRC specialists is at an all‑time high in 2025. Below you’ll find 50 organisations that have posted UK‑based cyber security vacancies or announced head‑count growth during the past eight weeks. They’re organised into five quick‑scan categories. For every employer you’ll see: Main UK hub Example live or recent vacancy Why it’s worth a look (tech stack, culture, mission) Search any company on CyberSecurityJobs.tech to view current ads, or set a free alert so fresh openings land straight in your inbox.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.