CrawlJobs Logo

Cyber Assurance Manager

unilever.com Logo

Unilever

Location Icon

Location:
United Kingdom , England

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Role Overview Using a risk-led and threat-informed approach, this role will drive periodic assurance activities in support of the Global Risk & Compliance (GRC) team, aligned with Unilever’s risk appetite. The objective is to enable informed decision-making and foster secure behaviour across the global business. The Cyber Assurance Manager will be responsible for assuring compliance with Cyber Security policies, standards, and international regulations, while collating and reporting risks and metrics derived from these assurance activities. This position oversees periodic assurance across all areas of the business globally, ensuring resilience and compliance in a rapidly evolving threat landscape. The role functions within a matrix structure, reporting to the Cyber Resilience Assurance Lead Manager while supporting the Cyber Production Assurance Lead Manager on project deliverables. It is responsible for maintaining strong governance and ensuring consistent execution across key assurance activities.

Job Responsibility:

  • Drive periodic assurance activities in support of the Global Risk & Compliance (GRC) team, aligned with Unilever’s risk appetite
  • Assure compliance with Cyber Security policies, standards, and international regulations, while collating and reporting risks and metrics derived from these assurance activities
  • Oversee periodic assurance across all areas of the business globally, ensuring resilience and compliance in a rapidly evolving threat landscape
  • Work with Cyber Resilience Assurance and Cyber Production Assurance Lead Managers to deliver a comprehensive suite of assurance activities including: Cyber crisis response readiness/effectiveness, cyber resilience in Business Continuity Planning (BCP), IT/cloud resilience and data recovery assurance, continuous controls monitoring and reporting, Operational Technology (OT), Internet of Things (IoT) assurance, and AI assurance
  • Responsible for ensuring the assessment and effective reporting of Unilever’s compliance against Unilever’s standards and relevant global cyber regulations and best practices, enabling wider Risk and Compliance based insights
  • Develop, maintain, and manage assurance documentation, reports, and audit evidence to support compliance objectives
  • Conduct and support risk assessments, control validations, and compliance checks across cyber assurance initiatives
  • Design, track, and maintain key cyber assurance metrics for both Cyber Resilience and Production Assurance workstreams
  • Prepare and deliver executive-level reports summarizing the organization’s overall cyber assurance posture
  • Drive continuous improvement of assurance processes, frameworks, and methodologies to enhance resilience and compliance

Requirements:

  • Significant experience in ITES industry, including experience in a senior Cyber Security or Information Security role
  • Strong experience in managing operational risks and controls, including end-to-end risk identification, assessment, and mitigation
  • Strong knowledge of enterprise cloud environments, with some hands-on experience using leading platforms such as Azure, GCP, AWS etc
  • Proven track record in Cyber Security, including cyber risk management and governance
  • Experience in IT & Cyber Automation, enabling real-time telemetry ingestion and correlation using APIs, data pipelines, or event hubs
  • Excellent strategic and operational business awareness, with deep understanding of digital business drivers and constraints
  • Strong communication skills and experience presenting to senior leaders
  • Knowledge of technical landscapes and experience delivering Cyber Security projects
  • Cybersecurity and resilience certifications such as Security+, CISA, CISM, CISSP (or equivalent), ISO22301, CBCP etc

Nice to have:

  • Cyber automation and data analysis/visualization expertise
  • Strong knowledge of common vulnerabilities and exploitation techniques
  • Understanding of industry-standard AI governance and risk frameworks
  • familiarity with Azure AI services and security architecture
  • Ability to manage conflicting priorities and work collaboratively with globally distributed teams
  • Deep knowledge of IT Disaster Recovery programs, Business Continuity Planning, and resilience frameworks, with subject matter expertise in BCM, Crisis Management, Resilience, Risk, and Compliance domains
  • A strong grasp of enterprise security technologies is essential, including GRC platforms (such as ServiceNow, MetricStream, SureCloud), SOC solutions (SIEM and SOAR), endpoint detection and response (EDR), vulnerability management tools, identity security solutions, network and web security technologies, and cloud security platforms such as CSPM and CNAPP
  • Strong presentation skills and ability to work with vague requirements to build prototypes and iterate solutions

Additional Information:

Job Posted:
January 07, 2026

Employment Type:
Fulltime
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Assurance Manager

Risk & Assurance Manager - IT & Infosec

This role focuses on managing and enhancing the IT and Information Security risk...
Location
Location
United Kingdom , Manchester; Marlow
Salary
Salary:
Not provided
softcat.com Logo
Softcat
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 5 years of experience in second-line risk management or internal audit, with a strong focus on IT or Information Security
  • Experience in consultancy or professional services, with a proven ability to support complex transformation or change programmes is preferred
  • Demonstrated leadership in delivering IT risk or audit initiatives, including managing projects, mentoring team members, and driving outcomes
  • Strong knowledge of industry frameworks and standards, such as ISO 27001, NIST, CIS Controls, and regulatory requirements like GDPR
  • Proven ability to engage and influence stakeholders across IT, Information Security, and business functions, building trusted relationships at all levels
Job Responsibility
Job Responsibility
  • Partnering with senior IT, Security, and business leaders to embed risk management practices into operational processes and strategic initiatives
  • Owning and maintaining IT Risk and Control Matrices (RCMs), ensuring they remain current, comprehensive, and aligned with industry standards and audit expectations
  • Reviewing effectiveness of first line functions in testing and validation of key IT controls (e.g., access management, change control, incident response, vulnerability management), ensuring effectiveness and consistency
  • Leading in the review and enhancement of IT and infosec risk and control frameworks (e.g., ISO 27001, ITIL, ISO22301, NIST), ensuring alignment with business objectives and regulatory requirements
  • Coordinating and representing IT risk in internal, external audits and certification processes (e.g., ISO 27001, Cyber Essentials, ISO22301, etc.), acting as the primary point of contact
What we offer
What we offer
  • Pension
  • Share incentive plan
  • Life Assurance
  • Healthcare
  • Holiday
  • Trips
  • Vouchers
  • Partner/family Benefits
  • Perklife
  • Maternity, Paternity and Adoption support
  • Fulltime
Read More
Arrow Right

Senior Technical Program Manager – IT & Cyber Support

Barbaricum is hiring a Senior Technical Program Manager to support enterprise IT...
Location
Location
United States , Washington, DC
Salary
Salary:
Not provided
barbaricum.com Logo
Barbaricum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active DoD Top Secret Clearance
  • 10+ years of technical program management in DoD environments
  • Bachelor’s degree in computer science, IT, information systems, or a related field
  • 8+ years in planning, directing, and managing complex IT projects and operations of similar nature
  • Possess one or more of the following certifications: GSLC, CCISO, CISSP, CISM, or CISA
Job Responsibility
Job Responsibility
  • Oversee IT and IA contract support staff and performance metrics
  • Lead project teams in Agile, CMMI, and ITIL environments
  • Manage implementation of RMF compliance, cybersecurity controls, and CC SRG adherence
  • Drive organizational change management and quality assurance processes
  • Serve as primary escalation and reporting point for technical and contractual issues
  • Ensure projects remain within scope, schedule, and compliance standards
Read More
Arrow Right

Sr. Associate, Cyber Intelligence

L3Harris Greenville, Texas, is seeking an Information System Security Officer (I...
Location
Location
United States , Greenville
Salary
Salary:
Not provided
l3harris.com Logo
L3Harris
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active DoD Secret Security Clearance
  • Bachelor’s degree in a technology related field or equivalent
  • 2 years’ experience in information assurance or Cyber Security under RMF and 32 CFR (NISPOM) or other relevant fields. 6 years prior related experience in lieu of degree
  • 4 years’ experience in collateral (DCSA) information assurance or Cyber Security under RMF and 32 CFR (NISPOM). 8 years’ prior related experience in lieu of degree
  • Minimum DoD 8570 IAM I certification (Security+)
  • Experience with Risk Management Framework, NIST 800-53, and 32 CFR (NISPOM)
  • Familiarity with personnel security and physical security accreditation
  • Familiarity with applicable IC, and DoD policies, procedures, and operating instruction related to IT, and IA
  • The position requires strong critical thinking/analytical skills, attention to detail, creativity, and a sustained commitment to excellence and quality
  • The position requires excellent oral and written communication skills
Job Responsibility
Job Responsibility
  • Maintain the operational security posture for programs and information systems
  • Prepare, review, and maintain documentation to include System Security Plans (SSPs), Risk Assessment Reports, Assessment and Authorization packages, and other documentation to support Information System accreditation
  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals
  • and ensure audit records are collected, reviewed, and documented (to include any anomalies)
  • Tracks and works off Plans of Action & Milestones (POAMs) against accredited information systems
  • Develop and maintain a directorate focused information systems security program to ensure compliance of IT assets with accreditation requirements specified under ICD 503, DAAPM, IC, and DoD regulations, policies, and procedures
  • The selected candidate will act as a member of a diverse security team and participate in Engineering and Configuration Review Boards and Working Groups to develop secure system solutions
Read More
Arrow Right

Cyber Operations and Intelligence Project Manager

The Project Manager role will be responsible for supporting strategic and tactic...
Location
Location
United Kingdom , Sheffield
Salary
Salary:
Not provided
experis.co.uk Logo
Experis
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong experience in delivering cloud-based solutions
  • Experience in technology delivery in a complex organisation
  • Experience in business requirements definition and testing
  • Delivery of business process documentation
  • Excellent planning and reporting skills
  • Ability to work in fast paced environment and ever-changing priorities and having extremely flexible to manage workload.
  • Able to support aggressive delivery timelines without compromising on quality.
  • Quick learner
  • Work with different stakeholders (Vendors, Project Manager, ITSO & ITSO Delegates, Support teams) & resolve all technical queries in timely manner.
  • Excellent communication skills - both written and verbal (English)
Job Responsibility
Job Responsibility
  • Collaborate with Project Managers, key control owners and stakeholders to define clear business outcomes, requirements and ensure these remain traceable throughout the delivery of the initiative.
  • Attend various governance forums and provide programme insight to the ExCo and Steering Committee.
  • Capture actions on behalf of Exco members and work with relevant teams/stakeholders to close them in a timely manner
  • Develop and support business case submissions
  • Proactively monitor the programme's progress and communicate to all stakeholders
  • Resolve issues and initiate corrective action as required.
  • Ensure effective quality assurance
  • Articulate and capture risk and dependencies between programmes and functions/teams etc.
  • The Project Manager will be responsible for delivering a range of medium sized projects across Build and Operate workstream to support key system integrations, product optimisation and automated workflows for education controls & key cybersecurity priorities.
  • Produce full project plans.
Read More
Arrow Right

Head of cyber threat exposure and attack surface management

Lead the enterprise-wide Continuous Threat Exposure Management (CTEM) strategy, ...
Location
Location
United Kingdom , Knutsford
Salary
Salary:
Not provided
barclays.co.uk Logo
Barclays
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience in cybersecurity with direct exposure to vulnerability management, red teaming, or threat exposure reduction
  • Proven track record leading programs integrating CSPM, SSPM, ASM, BAS, or exposure correlation technologies
  • Strong understanding of attack paths, adversary emulation, and continuous validation concepts
Job Responsibility
Job Responsibility
  • Own and drive the global CTEM strategy, establishing a continuous, threat-driven exposure management lifecycle aligned with NIST, MITRE, and CISA Secure-by-Design principles
  • Lead and develop a high-performing CTEM team, fostering collaboration, technical excellence, and an outcome-driven culture
  • Integrate and oversee key exposure management technologies, including Cloud Security Posture Management (CSPM), SaaS Security Posture Management (SSPM), Attack Surface Management (ASM), Breach & Attack Simulation (BAS), and other exposure correlation platforms
  • Correlate assets, identity, vulnerability, and configuration to identify high-impact, exploitable attack paths and inform prioritized remediation strategies
  • Collaborate with Application Security, Vulnerability Management, Red Team, and Security Operations to synchronize discovery, validation, and remediation of exposures across the enterprise
  • Align CTEM outputs with real-world adversary behaviors, leveraging Red Team and Threat Intelligence input to validate attack paths and focus on exploitable conditions
  • Drive automation and AI-enabled analytics to continuously map, assess, and measure reductions in the organization’s attack surface
  • Translate technical findings into business risk language, enabling senior leadership and risk committees to make data-driven investment decisions
  • Define and lead CTEM governance and operating models, ensuring exposure assessments, validation, and remediation tracking are embedded in operational processes
  • Establish clear KRIs and maturity metrics that demonstrate continuous improvement in visibility, validation, and response effectiveness
What we offer
What we offer
  • Competitive holiday allowance
  • Life assurance
  • Private medical care
  • Pension contribution
  • Fulltime
Read More
Arrow Right

Technical Security Implementation Manager

The Technical Security Implementation Manager is responsible for the onboarding ...
Location
Location
United Kingdom , Oxfordshire
Salary
Salary:
Not provided
e2e-assure.com Logo
e2e-assure
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Understanding of cyber security and SIEM
  • Practical experience of at least 3 of the following products: Microsoft Sentinel, Sentinel data connectors, Azure Infrastructure, Azure Log Analytics, Entra ID, Microsoft Defender for Cloud, Microsoft Defender 365, Microsoft Office 365, AWS IAM, AWS SQS
  • Planning and organisational skills to deliver multiple concurrent time sensitive projects and meet deadlines
  • Ability to work under pressure whilst maintaining excellent internal and external communication
  • Experience to analyse customer requirements/statements of work and produce Project Initiation and technical architecture/design documentation
  • You must be willing to work with customers both face to face and remotely and have the confidence and skills to be a positive ambassador for e2e-assure
Job Responsibility
Job Responsibility
  • Onboarding Design/Architecture: Interpreting solution requirements to create and document an onboarding design in the form of customer facing high-level design documents, covering the high-level infrastructure architecture, proposed log source onboarding methods, and proposed security use cases. Production of capacity models reflecting into the design
  • Technical Implementation Management/Systems Integrator: Producing project initiation documents and socialising the design. Producing organisational level and detailed project plans and managing projects through to resolution and delivering into service with the SOC and support teams. Holding regular customer and internal project management calls with actions and issues. Documentation of operational procedures and obtaining customer contact/ escalation details for in-life service utilisation. Conducting acceptance into service meetings
  • Team Management: Managing the team’s ticket queue, task allocation for tickets and tasks required to onboard new customers and maintain/upgrade existing customers. Allocating tasks to team members and tracking their progress through to resolution
  • Service Validation: Testing and checking the work performed by the onboarding team, providing test reports for customers
  • Ongoing audit activities across all customer environments
  • Service Improvement: Researching and recommending new and useful operational improvements, to enable faster turnaround of new customers and existing customer upgrades
  • Working Relationships: Building and sustaining good working relationships with internal teams and customers
  • Fulltime
Read More
Arrow Right

Information Assurance Specialist

The Information Assurance/Security Engineer will provide security engineering an...
Location
Location
United States , Bethesda
Salary
Salary:
Not provided
anavationllc.com Logo
AnaVation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI Clearance with CI Polygraph
  • Bachelor’s degree in Network Engineering, Computer Science or related technical field plus 5-7 years of Cyber Security/Operations support
  • DoD 8140 IAT Level II Certification (CCNA-Security, CySA+, CND, Security+)
  • Documenting network schemas and cyber operation tool solutions
  • Knowledgeable regarding compliance with: ICD 503, FISMA, OMB, NIST, and DoD (8150.01 March 12, 2014) [Risk Management Framework and Cyber Network Defense…], and other mandated security regulations and standards
  • Knowledge and experience with managing and monitoring compliance with Privileged User Access (PUA), Data Transfer Access (DTA), and Removable Media Custodian (RMC) privileges, forms, and signatures
  • Support to vulnerability management, patching, information assurance and/or ATO process for Classified DoD or IC environments
  • Demonstrated documentation writing for security plans, tests, and reports
  • Must demonstrate strong teamwork, communication (both verbal and written), and presentation skills
  • Must demonstrate strong initiative to accept new technical challenges in complex security engineering assignments
Job Responsibility
Job Responsibility
  • Provide security engineering and information assurance support to the Government’s Assessment and Authorization (A&A) process to maintain Authority to Operate (ATO) and Authority to Connect (ATC) for mission applications and services
  • Designs, develops, monitors and documents security controls, security testing, security reporting, and plan of actions and milestones (POA&Ms) throughout systems and application lifecycles in support of mission systems
  • Provides security engineering design inputs, security design reviews, and security best practices as part of technical and change requests
  • Configures and validates secure systems, physical controls, and tests security products and systems to detect security weaknesses
  • Maintains XACTA security records for supported systems
What we offer
What we offer
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance
  • Fulltime
Read More
Arrow Right

Configuration Manager

AnaVation is seeking a Configuration Management Lead responsible for maintaining...
Location
Location
United States , Bethesda
Salary
Salary:
Not provided
anavationllc.com Logo
AnaVation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI Clearance with CI Polygraph
  • Bachelor’s degree in Network Engineering, Computer Science or related technical field plus 5-7 years of Cyber Security/Operations support
  • DoD 8140 IAT Level II Certification (CCNA-Security, CySA+, CND, Security+)
  • Documenting network schemas and cyber operation tool solutions
  • Leads the oversight of the Configuration Management process to ensure the integrity and security of IT systems, software, and infrastructure as well as federal regulations and agency polices
  • Co-leads in the establishment and maintenance of the CMDB to ensure accurate tracking of assets and configurations
  • Maintains and manages software libraries, licensing trackers, systems documentation repositories, and maintain hardware and software inventory and project management documentation to ensure adherence to federal procurement and licensing guidelines
  • Knowledgeable regarding compliance with: ICD
  • Must demonstrate strong teamwork, communication (both verbal and written), and presentation skills
  • Must demonstrate strong initiative to accept new technical challenges in complex security engineering assignments
Job Responsibility
Job Responsibility
  • Maintaining the Configuration Management Database (CMDB), licensing, hardware and software inventory, and authoring and maintaining policy documentation detailing the SOPs for information assurance, configuration management, and computer network defense operations
  • Supports the customer’s IT service development, management, and sustainment while helping implement DevSecOps, ITIL, and Agile best practices in their GOTs software development process
What we offer
What we offer
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance
  • Fulltime
Read More
Arrow Right