Technical Security Manager

White Stone, Herefordshire
2 weeks ago
Create job alert

About The Role
We are seeking a passionate and people-oriented Technical Security Manager to lead our cyber security team in protecting our company’s critical systems and data.
This pivotal role involves managing security operations, implementing security measures, and leveraging Microsoft Azure’s security features to safeguard the organization’s data and infrastructure.
Not only on the technical side this is also a great opportunity for someone who enjoys mentoring, fostering collaboration and empowering others while ensuring the company stays ahead of cyber threats.

Key Responsibilities
 Operations and Incident Management

Actively engaged in continuous monitoring and protection of networks, systems, and applications
 Lead the response to security incidents, ensuring your team works effectively with other departments to resolve issues quickly while minimalising disruptions. This could include investigation, containment and remediation of security breaches.Technical Security Implementation and Risk Management

Design, implement and support new and existing security solutions. (Privileged Access Management, Vulnerability Management, Threat Intelligence, etc).
Expert in Microsoft Azure’s security tools and services. (Entra, Privileged Identity Management, conditional access, Microsoft defender, Sentinel, etc).
Identify new security tools that can support the future growth of the organisation.
Ensure compliance with recognised industry standards and lead/support on audits where relevant both internally and externally.Security Management

Utilise Microsoft Azure’s security features, including Azure Security Centre, Azure Sentinel, and Active Directory, Entra ID to enhance the organization’s security posture.
Monitor and respond to security alerts generated by Azure security tools.
Perform forensic analysis to determine the root cause of incidents and develop strategies to prevent recurrence. Build a collaborative Security Culture

In conjunction with the wider IT and Compliance leadership teams, develop and implement cyber security policies, procedures, and protocols.
Advocate for security awareness at all levels of the organisation, ensuring our people understand their role in protecting company data and assets.
Organise and lead security training programs and workshops that are engaging and tailored to various teams’ needs.
Promote a security first mindset across all teams by championing knowledge sharing and collaboration.Team Development

Lead, mentor and support a small team of security professionals, helping them achieve both their individual and team goals.
Identify team strengths and development areas, providing regular feedback and supporting the team with personal and professional development opportunities to grow.

About The Candidate
Proven experience in IT security, with a focus on technical cybersecurity roles.
Proven experience in implementing and managing security solutions.
Proven experience of managing incidents with successful resolutions and implementation of lessons learnt to support continuous improvement.
 Strong knowledge of Microsoft Azure security tools and services.
 Proficiency in network security, system administration.
 Experience with security monitoring tools, incident response, and forensic analysis.
 Relevant certifications such as CISSP, CISM, Microsoft Certified: Azure Security Engineer Associate, or equivalent are preferred but not essential.
 Excellent communication skills and the ability to engage stakeholders at all levels.
 The ability to stay up to date on emerging threats, exploits and security trends to adapt the strategy as the organisation evolves.
 Proven team mentoring and coaching experience.
 Experience in a financial services environment or owner led organisation would be advantageous.

About The Company
People are at the heart of allpay and we reward our employee with a competitive benefits package which includes, a defined contribution group pension scheme, income protection, life assurance, an array of health and wellbeing options including private healthcare cover and an onsite gym. This is coupled with our excellent Learning and Development offering.
We work with some great recruitment agencies. We do not choose to partner with everyone. Explicit consent or confirmation must be received from our HR department before we accept CV’s. Contractual terms and specific campaigns must have been signed and agreed before you are considered a partner. We never accept unsolicited CV’s, EVER! Even from our trusted partners. We consider it “spoiling,” which does not endear you to us. By sending us unsolicited CV’s we deem these a free gift. If we choose to engage these candidates directly we will not pay you any fees. You will be deemed to have accepted this zero fee by providing unsolicited or spoiled candidates.
 
We are a company committed to Equal Opportunities.

All roles at allpay Limited are subject to successful background checks including a DBS and Credit Check

Related Jobs

View all jobs

Cyber Security Manager

Information Security Manager

Information Security Manager

Information Security Manager/Specialist (ISMS)

IT Infrastructure & Security Manager

Physical & Personnel Security Manager

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.