National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior IT Security Manager to improve their internal security policies & processes and oversee incident response activities

S.i. Systems
Greater London
2 months ago
Create job alert

S.i. System's mining client is looking for aSenior IT Security Manager to improve their internal security policies & processes and oversee incident response activities.

This role will be crucial in protecting their applications from targeted application-layer threats. The successful candidate will oversee that all security programs, tools, and technologies are working correctly, providing the necessary protections to the company's computer systems, databases, and networks from cyberattacks or security breaches. They will also manage access control on company assets and data and monitor any unauthorized activity within the company network.

This is a permanent role. Open to candidates in Tumbler Ridge willing to work 2 weeks remote/ 2 weeks on-site OR candidates from Vancouver willing to do 2 weeks on-site at their Vancouver office, 2 weeks travel to Tumbler Ridge BC.

Must Have:

3+ years of experience withIT Security ManagementExperience with mapping outsecurity levels, hands-onincident response,end-point protection, vulnerability management, and security posture assessment.Experience with software applications/tools like CrowdStrike, Ironscale, Proof point, and CISCO ISE Advanced knowledge and experience supporting various operating systems and technologies (MS Exchange, Active Directory, Azure AD, SharePoint, SQL Database). Advanced networking experience with CISCO Switches/Routers and Gateways, Firewall. Experience with the network administration.

Nice to Have:

Mining, Oil & Gas experience Bachelor Degree with a technical major, such as engineering or computer science, or equivalent Cisco certification Project Management certification is an asset (PMP) 

Responsibilities:

Working with the IT Operations team - Leads the strategy, roadmap, and development of a comprehensive Cyber/Application security program/policies. Implement role-based access control (RBAC). Implement and manage identity and access management systems Audit policies and controls continuously.  Monitor all operations and infrastructure. This involves reviewing alerts and logs from different security systems to monitor the organization’s digital security footprint. Maintain all security tools and technology.  Monitor internal and external policy compliance. Ensure that vendors and employees understand and operate within that cybersecurity compliance framework.  Prepares and delivers metrics and reports for senior management to show efficiency and compliance of security functions.  Detail out the security incident response program Train team members and employees on cybersecurity Ensure regulatory compliance. Liaise with a company's legal, auditing, and human resources teams to ensure security policy compliance.  Create plans for disaster recovery in case of cyberattacks or security breaches.

Related Jobs

View all jobs

Cyber Security Consultant - GRC

Cyber Security Consultant - GRC

Operational Technology Security Consultant

Senior Security Engineer

Lead Security Architect

Regional Information Security Officer

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

10 Cyber Security Recruitment Agencies in the UK You Should Know (2025 Job‑Seeker Guide)

UK cyber security hiring remains resilient in 2025, driven by nation-state threats, cloud security investments, and NCSC regulatory pressures. Lightcast reports +42 % YoY growth in UK roles mentioning “SOC”, “cyber risk”, “offensive security” or “GRC”. Yet despite 30,000 active cyber professionals, monthly live vacancies remain in the 2,500–2,900 range. The result: strong demand across public and private sector. We reviewed 50 + consultancies and included only those that: Are registered in the UK (Companies House) Operate a dedicated Cyber Security / InfoSec / Risk & Compliance desk Posted at least 5 UK cyber security roles between March and June 2025 This guide includes 2025 salary ranges, key skills, interview prep tips, and a verified recruiter directory.

Cyber Security Jobs Skills Radar 2026: Emerging Frameworks, Tools & Certifications to Learn Now

Cyber threats are evolving—and so must the people defending against them. As ransomware, AI-enhanced phishing, and supply chain attacks grow more advanced, UK employers are urgently hiring cyber security professionals with the right mix of strategic and hands-on skills. Welcome to the Cyber Security Jobs Skills Radar 2026, your go-to guide for the most in-demand tools, frameworks, certifications, and technologies shaping the UK's cyber workforce. Whether you're a SOC analyst, penetration tester, or cloud security architect, this annual radar is designed to help you stay ahead of the market.

How to Find Hidden Cyber Security Jobs in the UK Using Professional Bodies like BCS, CIISec & More

The demand for skilled cyber security professionals in the UK has never been higher. With threats increasing in sophistication and frequency, organisations are urgently hiring ethical hackers, threat analysts, GRC specialists, and security architects. But many of the most valuable roles—particularly in government, defence, and critical infrastructure—are never publicly advertised. Instead, these jobs are shared behind the scenes through trusted networks, private communities, and professional bodies. In this article, we explore how to uncover hidden cyber security jobs in the UK using organisations like the BCS (The Chartered Institute for IT), CIISec (The Chartered Institute of Information Security), ISACA, and ISC² UK Chapter. We’ll show you how to use membership directories, special interest groups, CPD events and informal networks to gain early access to roles most people never see.