×
Register Here to Apply for Jobs or Post Jobs. X

Systems and Data Security Manager

Job in Calgary, Alberta, D3J, Canada
Listing for: Mod Op
Full Time position
Listed on 2026-02-27
Job specializations:
  • IT/Tech
    Cybersecurity, Data Security, Information Security, Security Manager
Salary/Wage Range or Industry Benchmark: 60000 - 80000 CAD Yearly CAD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

At Mod Op, we're reimagining the future of marketing by fusing creativity, technology, and intelligence to transform how work gets done and the value clients receive. Our AI & Innovation Team builds AI-enabled platforms and agentic systems that automate, optimize, and evolve the marketing process—from creative development to media execution to performance analytics.

The Systems and Data Security Manager is a hands‑on IT security position responsible for operating and maintaining the organization's security controls across systems, cloud infrastructure, data, and development environments. Reporting to the Senior IT Director, this role owns day‑to‑day security operations, SOC 2 Type II compliance execution, cloud and identity security, and security monitoring.

This role also leads the implementation and automation of compliance and security processes to increase efficiency, visibility, and scalability across the organization. The position works closely with Development and the compliance‑focused IT team to ensure controls are effective, documented, and continuously validated.

Responsibilities Security Governance & Compliance
  • Manage day‑to‑day operation of an established SOC 2 Type II control environment
  • Own continuous evidence collection, documentation, and audit readiness
  • Coordinate third‑party assessments, including penetration testing, and track remediation through completion
  • Maintain security policies, procedures, and control documentation as systems change
  • Work directly with auditors, Development, and the compliance‑focused IT team to support audits and close findings
  • Create, assign, audit, and revoke IAM roles and service accounts across cloud platforms, ensuring least‑privilege access.
  • Conduct vendor risk assessments, including security reviews and documentation tracking
  • Oversee infrastructure vulnerability scanning and enforce patch management SLAs across cloud and hosted environments
  • Lead and document quarterly access reviews across systems and cloud platforms
  • Implement and manage compliance automation platforms such as Vanta, Drata, or Secureframe
  • Automate evidence collection, access reviews, and compliance reporting processes
  • Build and maintain compliance dashboards to provide leadership visibility into control health and audit readiness
  • Measure and report efficiency gains achieved through compliance and security automation
Identity & Cloud Security
  • Operate and maintain security controls for Microsoft Entra , AWS and Google Cloud Platform environments
  • Manage identity, access, and privilege controls across cloud and enterprise systems, including GCP IAM roles, policies and service accounts
  • Ensure secure configuration, hardening, and access reviews are performed regularly
Security Monitoring & Incident Response
  • Manage Entra , AWS and GCP security logging, monitoring, and alerting
  • Investigate and respond to security alerts and incidents
  • Perform root cause analysis and implement corrective actions
  • Investigate and remediate access‑related incidents, including misconfigured roles or unauthorized permissions.
  • Leverage AI‑powered security tools for threat detection, anomaly identification, and alert triage
Development & AI Security
  • Implement and maintain security controls within development and automated build and deployment processes
  • Partner with Development on vulnerability management, code scanning, and application security
  • Apply security controls and governance for AI systems, including data access, model usage, and risk management
Application Usage & Budget Management
  • Monitor application usage and spend across agency‑hosted environments for internal and client‑facing applications
  • Define acceptable usage thresholds and budget bands for applications and environments
  • Implement alerts, automation, and reporting for usage or cost variances
  • Investigate, resolve, and document usage and budget variances
  • Own application budgets related to hosted environments and route issues or overages to appropriate stakeholders
Agency & Client Onboarding & Offboarding
  • Support onboarding of new agencies and clients by evaluating applications, technologies, and usage requirements
  • Assess security, compliance, and SOC 2 Type II impact to existing…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary