Head of Information Security Operations

Rudheath, England, United Kingdom · Technology


The Hut Group aims to be the World’s leading Online Health & Beauty Destination. We are currently the UK’s leading multi-website online retailer with rapidly growing global operations and a unique proprietary technology platform. With over 16 million customers worldwide and 400 million visits to our sites annually, we understand the importance of reliable technology and a data-driven expertise.

Our software is the core of our business and enables the company to continue to grow and thrive. The Group’s industry leading and proprietary technology platform powers its own consumer sites plus global media partners and brand owners, including: Unilever, Nintendo and the Daily Mail Group. We develop all of our own applications in-house with our Development Delivery Teams. In order to enable our Delivery Teams to continue to achieve, we are always looking for bright and intellectual people who are happy to push boundaries and really challenge the status quo.

Led by world-class technologists with a diverse range of backgrounds ranging from Silicon Valley tech giants (Google, Amazon) through to Hedge funds and Algorithmic Trading Firms. You will be surrounded by highly intellectual and passionate colleagues, all with the common goal to help us grow this business globally, fast.


The Hut Group is looking for an Information Security Operations Head to join its Security Operations Team. The team’s focus is to identify and monitor threats to the group, to respond to information security incidents and to provide continuous feedback with regards to existing security controls. The team is also responsible for monitoring and maintaining various technical security solutions.

This is a pivotal role in the implementation of people, process and technology security measures. You will be responsible for the day to day running of the Incident Response Team and working proactively to ensure future security incidents are prevented by the implementation of technical security measures.


Essential Criteria

Desirable Criteria


What’s in it for you

Apply for this job