Post job

Computer security manager vs certified information systems security professional

The differences between computer security managers and certified information systems security professionals can be seen in a few details. Each job has different responsibilities and duties. While it typically takes 6-8 years to become a computer security manager, becoming a certified information systems security professional takes usually requires 4-6 years. Additionally, a certified information systems security professional has an average salary of $102,992, which is higher than the $97,951 average annual salary of a computer security manager.

The top three skills for a computer security manager include computer security, incident response and encryption. The most important skills for a certified information systems security professional are windows, NIST, and linux.

Computer security manager vs certified information systems security professional overview

Computer Security ManagerCertified Information Systems Security Professional
Yearly salary$97,951$102,992
Hourly rate$47.09$49.52
Growth rate16%32%
Number of jobs82,088234,446
Job satisfaction--
Most common degreeBachelor's Degree, 48%Bachelor's Degree, 54%
Average age4742
Years of experience86

Computer security manager vs certified information systems security professional salary

Computer security managers and certified information systems security professionals have different pay scales, as shown below.

Computer Security ManagerCertified Information Systems Security Professional
Average salary$97,951$102,992
Salary rangeBetween $66,000 And $144,000Between $77,000 And $136,000
Highest paying City--
Highest paying state--
Best paying company--
Best paying industry--

Differences between computer security manager and certified information systems security professional education

There are a few differences between a computer security manager and a certified information systems security professional in terms of educational background:

Computer Security ManagerCertified Information Systems Security Professional
Most common degreeBachelor's Degree, 48%Bachelor's Degree, 54%
Most common majorComputer Information SystemsComputer Information Systems
Most common collegeCarnegie Mellon UniversityUniversity of Washington

Computer security manager vs certified information systems security professional demographics

Here are the differences between computer security managers' and certified information systems security professionals' demographics:

Computer Security ManagerCertified Information Systems Security Professional
Average age4742
Gender ratioMale, 84.2% Female, 15.8%Male, 87.3% Female, 12.7%
Race ratioBlack or African American, 6.6% Unknown, 5.2% Hispanic or Latino, 9.9% Asian, 12.7% White, 65.4% American Indian and Alaska Native, 0.2%Black or African American, 9.2% Unknown, 6.1% Hispanic or Latino, 9.0% Asian, 9.6% White, 65.7% American Indian and Alaska Native, 0.4%
LGBT Percentage11%9%

Differences between computer security manager and certified information systems security professional duties and responsibilities

Computer security manager example responsibilities.

  • Redesign the university computer labs, manage student lab teams, and administer Novell and UNIX accounts.
  • Manage and provide direct security oversight for contract requirements supporting all functions of clear facilities operations and management e.g.
  • Review current and project life cycle management and spending planning.
  • Provide system support and troubleshoot user account set-up, peripheral unit control internally and externally.
  • Provide advisement to senior leadership of DOD regarding storage of sensitive materials, supervise and oversee security response integration.
  • Perform weekly routine garden/property patrol to identify problem areas or potential issues as well as to observe successful security personnel performance.
  • Show more

Certified information systems security professional example responsibilities.

  • Manage security audit projects to industry standards and federal regulations (SOX, SSAE16, FFIEC).
  • Implement a manage endpoint encryption solution utilizing TrendMicro MobileArmor to secure university workstations against sensitive data loss.
  • Utilize IBM's SIEM, QRadar, to proactively protect Sherwin-William's assets.
  • Review DOD compliance database for open assets, late reporting and current compliance on newly post IAVAs and short suspense IAVAs.
  • Test and evaluate information systems using NESSUS software to detect vulnerabilities and improve on security.
  • Provide project management assistance and oversight--addressed organization concerns and questions about baseline architecture requirements and its enhance system-computing environments.
  • Show more

Computer security manager vs certified information systems security professional skills

Common computer security manager skills
  • Computer Security, 33%
  • Incident Response, 30%
  • Encryption, 11%
  • Computer System, 6%
  • Capacity Planning, 6%
  • VoIP, 3%
Common certified information systems security professional skills
  • Windows, 12%
  • NIST, 11%
  • Linux, 10%
  • Incident Response, 9%
  • ISO, 7%
  • Risk Assessments, 5%

Browse executive management jobs