Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss


The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become A Director Of Information Technology Security

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As A Director Of Information Technology Security

  • Interacting With Computers
  • Getting Information
  • Establishing and Maintaining Interpersonal Relationships
  • Thinking Creatively
  • Updating and Using Relevant Knowledge
  • Deal with People

  • Mostly Sitting

  • Make Decisions

  • $155,690

    Average Salary

What Does A Director Of Information Technology Security Do At System One Services

* Third Party Risk Management
* Work with business units and third parties to evaluate the risk of vendor relationships.
* Perform risk assessments on third parties and translate IT risks into business risks.
* Translate cyber risk into business risks and communicate this to business units.
* Document identified risks and follow up on remediation activities through completion.
* Application Security Assessments
* Assist in the development of an application security assessment program.
* Perform application security assessment on both internal and external applications.
* Document risks associated with internal and external applications.
* Manage the remediation activities associated with applications.
* Risk Assessments
* Supports internal and external audits, control reviews, risk assessments, and reporting as required
* Tracks and manages action plans for the resolution of issues identified during assessment and audits.
* Performs analysis and reporting of compliance gaps.
* Will assist in the implementation of action plans as well as provide compliance support to projects in order to improve performance of IT controls.
* Collects and performs data analysis to ensure compliance with IT controls.
* Generates and distributes security compliance metrics.
* SOX Control Review
* Complete required SOX controls within the required time frame.
* Work with other departments within IT to obtain the required evidence for SOX controls.
* Perform analysis on SOX control evidence to ensure all controls have been performed according to the requirements.
* Work with both internal and external auditors to provide evidence of compliance.
* Vulnerability Management
* Identify information system vulnerabilities through automatic and manual means.
* Prioritize vulnerabilities based on the risk to SCI information systems and data.
* Follow up on remediation activities to ensure identified risk are mitigated.
* Assist in preparation of metrics and reporting for vulnerability management activities.
* Security Awareness Training
* Assist with the development of security awareness communications.
* Assists with the execution of phishing email exercises.
* Security Policies, Standards, and Procedures
* Works with manager to maintains an up-to-date understanding of industry best practices or frameworks such NIST CSF, ISO, HIPAA, PCI, etc.
* Benchmarks with IS risk management practices of other companies.
* Assist with the development of cyber security policies, standards, and procedures.
* Assist with the annual review of cyber security policies and provide input for improvements.
* Security Incident Response
* Assist with responses to cyber security incidents such as malware detections and malicious activities.
* Respond to security escalations received from the Security Operations Center (SOC).
* Research security incidents, document findings, and provide remediation activities.
* Utilize in-house security tools when researching security incidents (IPS, Antivirus Management Console, etc.)
* Manage the cyber security queue in the IT ticketing system.
* Participate in a rotating on-call schedule to respond to afterhours incidents.
* Core / Critical Competencies
* Build Trust With Others
* Operates with integrity
* Demonstrates honesty; keeps commitments; behaves in a consistent manner.
* Discloses own positions
* Shares thoughts, feelings, and rationale so that others understand personal positions.
* Remains open to ideas
* Listens to others and objectively considers others’ ideas and opinions, even when they conflict with one’s own.
* Supports others
* Treats people with dignity, respect, and fairness; gives proper credit to others; stands up for deserving others and their ideas even in the face of resistance or challenge.
* Communicate Effectively
* Organizes the communication
* Clarifies purpose and importance; stresses major points; follows a logical sequence.
* Maintains audience’s attention
* Keeps the audience engaged through use of techniques such as analogies, illustrations, humor, an appealing style, body language, and voice inflection.
* Adjusts to the audience
* Frames message in line with audience experience, background, and expectations; uses terms, examples, and analogies that are meaningful to the audience.
* Ensures understanding
* Seeks input from audience; checks understanding; presents message in different ways to enhance understanding.
* Adheres to accepted conventions
* Uses syntax, pace, volume, diction, and mechanics appropriate to the media being used.
* Comprehends communication from others
* Attends to messages from others; correctly interprets messages and responds appropriately.
* Contribute to Team Success
* Facilitates goal accomplishment
* Makes procedural or process suggestions for achieving team goals or performing team functions; provides necessary resources or helps to remove obstacles to help the team accomplish its goals.
* Involves others
* Listens to and fully involves others in team decisions and actions; values and uses individual differences and talents.
* Informs others on team
* Shares important or relevant information with the team.
* Models commitment
* Adheres to the team’s expectations and guidelines; fulfills team responsibilities; demonstrates personal commitment to the team.
* Drive for Results
* Prioritizes
* Identifies more critical and less critical activities / tasks; adjusts priorities when appropriate.
* Makes preparations
* Ensures that required equipment and/or materials are in appropriate locations so that own and others’ work can be done effectively.
* Schedules
* Effectively allocates own time to complete work; coordinates own and others’ schedules to avoid conflicts.
* Leverages resources
* Takes advantage of available resources (individuals, processes, departments, and tools) to complete work efficiently.
* Stays focused
* Uses time effectively and prevents irrelevant issues or distractions from interfering with work completion.
* Focus on the Customer
* Uses Key Principles
* Establishes good relationships by helping people feel valued, appreciated, and included in discussions (enhances self-esteem, empathizes, involves, discloses, supports).
* Acknowledges the person
* Greets customers promptly and courteously; gives customers full attention.
* Clarifies the current situation
* Asks questions to determine needs; listens carefully; provides appropriate information; summarizes to check understanding.
* Meets or exceeds needs
* Acts promptly in routine situations; agrees on clear course of action in nonroutine situations; exceeds expectations without making unreasonable commitments.
* Confirms satisfaction
* Asks questions to check for satisfaction; commits to follow-through, if appropriate; thanks customer.
* Takes the HEAT
* Handles upset customers by hearing them out, empathizing, apologizing, and taking personal responsibility for resolving customer problems/issues.
* Makes Sound Decisions
* Identifies issues, problems, and opportunities
* Recognizes issues, problems, or opportunities and determines whether action is needed.
* Gathers information
* Identifies the need for and collects information to better understand issues, problems, and opportunities.
* Interprets information
* Integrates information from a variety of sources; detects trends, associations, and cause-effect relationships.
* Understand the Business
* Understands technical terminology and developments.
* Knows how to apply a technical skill or procedure.
* Knows when to apply a technical skill or procedure.
* Performs complex tasks in area of expertise

What Does A Director Of Information Technology Security Do At Dell

* Provides and integrates subject matter expertise in the troubleshooting complex health, performance, logging, and capacity problems/outages for currently supported firewall platforms (Checkpoint, Juniper Netscreen, and Juniper SRX) and management platform (NSM, STRM, Provider
* technologies as well as quickly learn any new firewall/IDS technology introduced into the network, becoming the team expert on such technologies
* Develops innovative and creative output based on interpretation and analysis , recommends and implements new or revised system software, utilities and automated processes as necessary to ensure Dell’s Security Operations Center personnel are able to quickly, efficiently, and with a high degree of confidence, meet the client(s) requirements
* Provides in-depth diagnosis for operating systems software and hardware failures
* Demonstrate excellent communication and client care skills by documenting all activities within our client delivery systems and communicating with client representatives in a timely manner
* Take ownership of abstract and complex issues and work to resolution

What Does A Director Of Information Technology Security Do At Volt Information Sciences

* Learns how to identify, analyze and apply information technology and business practices to support strategic business process/plans.
* Participates as required to design, develop, test and integrate technology of low complex.
* Participates in the implementation of information technology and business processes of low complexity.
* Supports, evaluates, and continuously improves information technology and business processes to maintain alignment with business plans of low complexity/risk.
* Performs activities according to project plans and schedule.
* Has contact primarily focused around department and functional operations, and limited interaction with business contacts.
* Requirements
* Candidates MUST be able to Interview Onsite

What Does A Director Of Information Technology Security Do At First Data

* The candidate should possess a broad-based and in-depth knowledge of Endpoint Security technologies and concepts, along with complex security technologies, tools and methodologies.
* The candidate will lead and deliver Endpoint Security technologies and programs globally, establishing a world class global defense in depth ecosystem for protecting endpoints.
* The candidate must have a strong technical security background, be able to manage people internationally, communicate effectively and understand Endpoint Security methodology and how to apply in a large diverse environment.
* The candidate must also be capable of driving and applying these principles and expertise on a global basis.
* Scope of Job:
* Resource to focus on driving consistency for all endpoint security strategies and technologies within FDC.
* Critical to ensuring First Data is protected from unauthorized data exfiltration and ensuring recent $20M Symantec purchase is properly implemented, for server configuration management, unsupported legacy infrastructure protection, and advanced threat endpoint monitoring.
* Drive and deliver critical services to deliver asset management data within FDC Lead and drive all endpoint security technology and programs globally, establishing a world class global endpoint security posture to protect against asset misuse, compromise, advanced cyber threats, and malicious code attacks.
* Provide leadership to engineering efforts to the technologies that align for endpoint security Collaborate with multiple cyber, technology, compliance and business teams to drive program and mitigate threats in the endpoint environment.
* Autonomy:
* Interprets the IT strategy and aligns resources and people to meet strategy goals

What Does A Director Of Information Technology Security Do At Gallagher

* Manages the technical security team, including Security Operations, Security Engineers, and Security Architects.
* Implements initiatives from the Information Security Strategy provided by the Security Governance Committee.
* Ensures that all security monitoring systems and processes are functional and effective.
* Ensures information security is addressed as a business issue across the organization, provides overall coordination and management of all security activities within the company and in conjunction with their direct manager, the VP of Global IT Operations.
* Develops and maintains relationships with business partner organizations to understand their business requirements and offer security solutions.
* Ensures Security team participates in the software development lifecycle to verify that developers are trained and following secure coding practices.
* Monitors changes in industry-relevant legislation and accreditation.
* Develops and maintains a Security Incident Response Plan, test the effectiveness of the program and coordinate incident response across the enterprise.
* Directing all IT Security audits and tasks to ensure the integrity, confidentiality, and availability of information to end users is not compromised.
* Establishing IT policies and procedures for the internal audit function, proposing changes to existing policies and procedures to ensure operating efficiency and regulatory compliance.
* Overseeing the selection, development, deployment, monitoring, maintenance, and enhancement of the organization’s security technology

Show More

Show Less

How To Become A Director Of Information Technology Security

Typically, a bachelor’s degree in computer or information science, plus related work experience, is required. Many computer and information systems managers also have a graduate degree.


Computer and information systems managers normally must have a bachelor’s degree in a computer- or information science–related field. Such a degree usually takes 4 years to complete and includes courses in computer programming, software development, and mathematics. Management information systems (MIS) programs usually include business classes as well as computer-related ones.

Many organizations require their computer and information systems managers to have a graduate degree as well. A Master of Business Administration (MBA) is common and takes 2 years beyond the undergraduate level to complete. Many people pursuing an MBA take classes while working, an option that can increase the time required to complete that degree.

Work Experience in a Related Occupation

Most jobs for computer and information systems managers require several years of experience in a related information technology (IT) job. Lower level management positions may require only a few years of experience. Directors are more likely to need 5 to 10 years of related work experience. A chief technology officer (CTO), who oversees the technology plan for a large organization, may need more than 15 years of experience in the IT field before being considered for a job.

The number of years of experience required varies with the organization. Generally, smaller or newer companies do not require as much experience as larger or more established ones.

Computer systems are used throughout the economy, and IT employees may gain experience in a variety of industries. However, an applicant’s work experience should be in the same industry they are applying to work in. For example, an IT security manager should have previously worked in information security. A hospital IT director should have experience in the healthcare field.


Most computer and information systems managers start out as lower level managers and advance to higher positions within the IT department. IT directors or project managers can advance to become CTOs. A CTO or other manager who is especially business minded can advance to become a chief information officer (CIO), the person in charge of all IT-related decisions in an organization. CIOs can advance to become top executives in an organization.

Important Qualities

Analytical skills. IT managers must be able to analyze problems and consider and select the best ways to solve them.

Business skills. IT managers must develop and implement strategic plans to reach the goals of their organizations.

Communication skills. IT managers must be able to explain their work to top executives and give clear instructions to their subordinates.

Decisionmaking skills. Some IT managers must make important decisions about how to allocate resources in order to reach their organizations’ goals.

Leadership skills. IT managers must be able to lead and motivate IT teams or departments so that workers are efficient and effective.

Organizational skills. Some IT managers must coordinate the work of several different IT departments to make the organization run efficiently.

Show More

Show Less

Director Of Information Technology Security jobs

Add To My Jobs

Director Of Information Technology Security Demographics


  • Male

  • Female

  • Unknown



  • White

  • Hispanic or Latino

  • Asian

  • Unknown

  • Black or African American

Show More

Languages Spoken

  • Spanish

  • Arabic

  • Korean

  • French

Show More

Director Of Information Technology Security

Unfortunately we don’t have enough data for this section.

Director Of Information Technology Security Education

Director Of Information Technology Security

Unfortunately we don’t have enough data for this section.

Job type you want
Full Time
Part Time

Real Director Of Information Technology Security Salaries

Job Title Company Location Start Date Salary
Architect, IT Security Northwell Health Melville, NY Jan 07, 2016 $157,000
Director-IT Security Jos. A. Bank Clothiers, Inc. Hampstead, MD May 29, 2015 $142,542
Director-IT, Compliance and Security Armour-Eckrich Meats LLC Lisle, IL May 15, 2011 $140,000
Director-IT, Compliance and Security Armour Eckrich Meats LLC Lisle, IL May 15, 2011 $140,000
Associate Director, IT Security & Risk Management Purdue Pharma L.P. Stamford, CT Aug 26, 2013 $138,000
Director, IT Security Services & Engineering MGM Resorts International Operations, Inc. Las Vegas, NV Jan 30, 2014 $135,000 -
Smts-It Security Verizon Telematics Inc. Atlanta, GA Nov 14, 2016 $128,000
Associate, IT Security/Vulnerability Morgan Stanley Services Group Inc. New York, NY Aug 25, 2016 $127,000
Associate Director, IT Security Specialist, Arcsig UBS Services LLC Weehawken, NJ Sep 12, 2014 $126,500 -
Director, IT Security Specialist UBS Services LLC Weehawken, NJ Apr 05, 2016 $125,000 -
Director of IT Security Cipherhealth LLC New York, NY Mar 22, 2016 $120,474
Director of IT Security Cipherhealth LLC New York, NY Mar 12, 2015 $120,474
Director of IT Security Cipherhealth New York, NY Aug 25, 2016 $118,830
Director of IT Security Cipherhealth LLC New York, NY Jul 27, 2016 $118,830
Smts-It Security Verizon Telematics Inc. Atlanta, GA Jul 13, 2015 $110,000
IT Security Assessor Coalfire Systems, Inc. New York, NY Aug 15, 2015 $106,000
Director of IT Operations and Network Security Navman Wireless North America Ltd. Glenview, IL Nov 04, 2016 $105,000
Director, IT Security Specialist UBS Services LLC Jersey City, NJ Nov 21, 2012 $104,582 -
IT Security Anayst FMC Corporation Philadelphia, PA Jun 15, 2011 $95,000
IT Security Administator Thyssenkrupp Elevator Atlanta, GA Aug 26, 2015 $94,016
IT Security Assessor Coalfire Systems, Inc. Dallas, TX Nov 28, 2011 $87,500
IT Security Assessor Coalfire Systems, Inc. Dallas, TX Nov 14, 2011 $87,500
IT Security Assessor Coalfire Systems, Inc. Redwood City, CA Oct 09, 2016 $86,000
IT Security Assessor Coalfire Systems Inc. New York, NY Sep 08, 2015 $86,000
Director of IT Systems Security Lamar University Beaumont, TX Mar 24, 2014 $74,400
IT Security Assessor Coalfire Systems, Inc. Alpharetta, GA Oct 09, 2016 $74,000
Associate, IT Security and Compliance Soaprojects, Inc. Mountain View, CA Sep 13, 2016 $73,653

No Results

To get more results, try adjusting your search by changing your filters.

Show More

Top Skills for A Director Of Information Technology Security


Show More

Top Director Of Information Technology Security Skills

  1. Regulatory Compliance
  2. Network Infrastructure
  3. Procedures
You can check out examples of real life uses of top skills on resumes here:
  • Started a policy/procedures review to enhance and conform to regulatory compliance mandates on an evergreen basis.
  • Developed and enhanced network infrastructure and secure remote connectivity.
  • Document technical procedures and departmental policies.
  • Transformed the existing security group from tactical account transactions to a strategic information security program chartered by executive leadership.
  • Recognized need for comprehensive IT disaster recovery and business continuity, sold concept to senior management.

Top Director Of Information Technology Security Employers

Director Of Information Technology Security Videos

What is information security and how is it different from information technology?

Cybersecurity Careers

A day in the life of IT security