Re-Advert Manager: IT Security and Monitoring
Listed on 2025-12-19
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, IT Project Manager
Re-Advert Manager: IT Security and Monitoring
Listing reference:
Listing status: Online
Apply by: 11 December 2025
Position summaryJob category: IT-Management
Location: Bedfordview
Contract: Permanent
Remuneration: Market Related
EE position: No
IntroductionApplications are invited for the position of Manager: IT Security and Monitoring (Peromnes Grade
7) based at Head Office, Bruma. The successful applicant will be reporting to the Head of Sec Dev Ops Purpose To provide assurance that ATNS information assets are adequately protected through the development, establishment and maintenance of enterprise-wide information security governance and protocols that include IT security policies, technology, compliance, and cybersecurity operational intelligence plans and initiatives. To develop and implement risk-based cybersecurity governance and protocols able to protect the organisation’s data and information at all times.
To manage and ensure compliance with relevant legislation and Technology & Information standards, protocols and governance requirements. To develop data governance frameworks to ensure data security and the optimisation of data confidentiality, integrity and availability. To provide assurance that best practice control objectives for system integrity, availability, confidentiality and accountability are met. To ensure a secure, reliable and stable IT environment through the continuous scanning and monitoring of all IT cyber security domains, i.e. networks, firewalls, anti-virus, mobile devices, patch management, and the regular updating of network anti-virus spyware, malware and greyware software.
To manage security platforms and identify and mitigate cyber security risks through the deployment of effective technologies, processes, and the creation of awareness. To ensure continuous vulnerability management on CNS systems by performing regular cybersecurity obligations, threat context. and exposure and risk to establish maturity. To investigate security incidents/events in order to ensure that the IT security posture remains intact and to improve the security status of the organization.
To ensure that identified Business Continuity risks are mitigated and addressed and that data recovery plans are in place to ensure business continuity in case of a disaster of any kind. To develop, implement and monitor information security and disaster recovery plans for organisational information, communications and information technology in accordance with ATNS and regulatory information security standards and relevant governance requirements.
To ensure the implementation of awareness campaigns, and that implementation of ATNS Safety, Security, Health and Environment Plan initiatives are enforced across the organization.
Cyber Security Management - Develop and implement risk-based cybersecurity strategy, governance and protocols able to protect the organisation’s data and information at all times. Manage cybersecurity threats and incidences through the understanding, detection and analysis of potential emerging and actual information security threats and vulnerabilities, and the implementation of control measures to minimize or avoid the impact thereof on systems availability and business operations.
Lead and direct the selection, utilisation and adoption of cybersecurity products and associated licensing models for the organization. Guide the development of monitoring and tracking systems for potential and emerging cybersecurity threats and control measures and manage cyber incidents efficiently to minimize its impact on the availability of systems and disruption of business operations. Manage the operations and controls of the Information Security Management System (ISMS) in line with KING III and ISO 27000.
Manage the implementation of key information security projects. Obtain internal and external security intelligence for investigation of security incidents. Manage investigations, responses and actions of information security incidents. Write incident reports and submit to the Head for decision‑making purposes. Identify, apply and ensure adherence to good information security practices. Source…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).