<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel>
    <title>Cyber Security Manager - Hays Specialist Recruitment Limited RSS Feed</title>
    <link>https://jobs.co.uk/job/cyber-security-manager-hays-specialist-recruitment-limited--7b872e11-0641-4445-835f-b8b240b30e03</link>
    <description>RSS feed for Cyber Security Manager at Hays Specialist Recruitment Limited.</description>
    <language>en-gb</language>
    <lastBuildDate>Thu, 21 May 2026 17:34:04 GMT</lastBuildDate>
    <item>
      <title>Cyber Security Manager - Hays Specialist Recruitment Limited</title>
      <link>https://jobs.co.uk/job/cyber-security-manager-hays-specialist-recruitment-limited--7b872e11-0641-4445-835f-b8b240b30e03</link>
      <guid>https://jobs.co.uk/job/cyber-security-manager-hays-specialist-recruitment-limited--7b872e11-0641-4445-835f-b8b240b30e03</guid>
      <pubDate>Wed, 20 May 2026 11:53:14 GMT</pubDate>
      <description>Location: Birmingham | Salary: 650.00-650.00 Daily | Type: Permanent | £650 - £750 per day (Inside IR35)Hybrid - 2-3 days on-site6-month initial contract (likely extension)Location: Birmingham (You must be able to travel to Birmingham for on-site work 2-3 days)We''re working with a government client seeking an experienced Cybersecurity Manager to lead and mature their operational security capability across a modern hybrid estate.This is a hands-on leadership role where you''ll combine technical depth with stakeholder engagement, driving security operations, incident response, and continuous improvement across infrastructure, cloud, and workplace environments.The RoleYou''ll take ownership of cybersecurity operations, leading a small engineering team and working closely with an outsourced SOC/MSSP to ensure robust monitoring, response, and continuous improvement.ResponsibilitiesLeading technical incident response (containment, eradication, recovery) and post-incident analysis Owning and improving security controls across endpoints, identity, networks, and cloud platforms Driving vulnerability management, patching, and remediation to agreed SLAs Managing SOC performance, alert triage, escalation, and threat intelligence integration Enforcing Identity an...</description>
      <category>Permanent</category>
    </item>
  </channel>
</rss>