Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss


The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become An Information Security Consultant

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As An Information Security Consultant

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $107,610

    Average Salary

What Does An Information Security Consultant Do At Quicken Loans

* Provide an interface between the business, project management, architect, and information security teams for new projects
* Evaluate project plans and technical details to guarantee security is baked-in across the board
* Consult to the business on proper information handling, transmission, and storage
* Work with the Information Security Analysts to develop new audits that address new projects
* Perform risk assessments on systems, services, and applications
* Collaborate with Information Security Architects to build new policies and standards

What Does An Information Security Consultant Do At Wells Fargo

* _
* Will interact effectively across the organization including management while demonstrating the ability to build strong relationships with business partners
* Will facilitate large group efforts, drive consensus, and resolve conflicts between security and business objectives
* Will work in small teams, with large working groups, and independently
* Will adapt to change while prioritizing effectively and delivering high quality work in tight timeframes
* Analyze and translate Wells Fargo Information Security Policy, Control Standards, Control Solution, and Technical Baseline structure.
* Interact with senior-level support for systems security-related issues

What Does An Information Security Consultant Do At Travelers

* Responsible for the development, automating, compiling, and preparing reports, dashboards, cubes, etc. (Completed with initial direction but actual tasks completed independently).
* Understands solution design satisfying the business requirements and uses knowledge within assigned tasks.
* Contributes to development of unit and integration plans and executes those plans them for assigned tasks; complete system testing working with Quality Assurance specialists as needed.
* Unit tests are written to verity that pieces of code are doing what it is intended to do.
* Integration tests are done to demonstrate that different pieces of the system work together.
* These tests cover whole applications and require more extensive analytic skills to complete.
* Provide input into the development of system testing strategy and plans.
* Validates that developed solutions align with defined business requirements.
* Support the transition and production process; develops documentation (Knowledge Acquisitions Process document) for all deliverables before moving to production so that it can be supported on ongoing basis.
* Responsible for overseeing and consulting with IT to develop solutions on assignments.
* Provides input on root cause analysis of production defects and schedule for correction as needed, under general supervision.
* Participates with team members in developing training and providing user groups with aspects of their technical training as needed.
* Contributes to implementation of strategic plan for Information Delivery.
* Continues to expand knowledge of broader range of Business Intelligence products and tools.
* Other duties as assigned.
* Job Opening ID:
* BR
* Equal Employment Opportunity Statement:
* Travelers is an equal opportunity employer

What Does An Information Security Consultant Do At Capital One

* Collaborate with a team of Information Security Consultants to provide subject matter expertise to project teams
* Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Disaster Recovery, Management of Data, Network Architecture and Design, User Access Management, and Management of Third Parties
* Serve as an expert in Capital One’s Information Security offerings, policies, procedures and standards
* Influence customers to leverage security offerings and escalate to management when you have concerns
* Provide ad hoc support on special Information Security hot topics for the business
* Work with leadership to anticipate their objectives and needs to better server them
* Drive innovation activity as an outcome; Partner extensively with the Security Engineering organization to derive both novel and patent activity as outcomes from research and development or from security engagements
* About You:
* You are results driven
* You are a strong conceptual thinker
* You are able to work well under minimal supervision
* You have team-oriented interpersonal skills and the ability to interface effectively with a broad range of people, roles, and levels of management
* You have strong written and verbal communication skills
* You maintain calmness and clarity of thought under pressure and demonstrate the ability to maintain confidentiality

What Does An Information Security Consultant Do At Dell

* Responsible for discovering and exploiting vulnerabilities affecting Dell software and firmware
* Developing and maintaining tools to assist in vulnerability research and exploit development
* Participate in or work directly on, additional projects, assignments or initiatives as required
* Integrate information security controls into an environment to identify risks and reduce their impact
* Provides analysis of potential information security risks and recommend solutions
* Communicates information security procedures to the business
* Escalate issues to vendors, security team, and engineering through standard escalation processes

Show More

Show Less

How To Become An Information Security Consultant

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.


Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.


Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Information Security Consultant jobs

Add To My Jobs
Job type you want
Full Time
Part Time

Real Information Security Consultant Salaries

Job Title Company Location Start Date Salary
Information Security Research Senior Consultant Secureworks, Inc. Pittsburgh, PA Sep 17, 2016 $150,000
Information Security Research Senior Consultant Secureworks, Inc. Pittsburgh, PA Mar 29, 2016 $150,000
Consultant-Information Security Aujas Networks Private Limited Pleasanton, CA Jul 11, 2016 $130,500
Archer/Information Security Consultant Accelerated Innovators, Inc. Westbury, NY Feb 17, 2016 $126,000
Information Security Research Consultant Secureworks, Inc. Pittsburgh, PA Mar 01, 2014 $120,000
Information Security Consultant SMOJ Enterprises, LLC Houston, TX Nov 03, 2014 $120,000
IT Consulting Security Senior Consultant Protiviti Inc. New York, NY Jul 18, 2016 $118,934 -
IT Security Consultant Advantage Technical Resourcing, Inc. Edison, NJ Aug 20, 2012 $116,267
Information Security Consultant IBM India Private Limited Cambridge, MA Jul 27, 2016 $108,938
Information Security Consultant II Ajilon LLC D/B/A Ajilon Consulting Washington, DC Aug 31, 2010 $105,468
Information Security Consultant Accelerated Innovators, Inc. New York, NY Oct 27, 2014 $105,000
IT Security Consultant Ing North America Insurance Corporation Jacksonville, FL Mar 02, 2015 $105,000
Information Security Consultant IBM India Private Limited Cambridge, MA Aug 11, 2013 $91,416
Information Security Consultant IBM India Private Limited Cambridge, MA Oct 01, 2014 $91,416
Information Security Consultant Ioactive, Inc. Seattle, WA Sep 01, 2014 $89,000
Information Security Consultant Ioactive, Inc. Seattle, WA Oct 01, 2014 $89,000
Information Security Consultant IBM India Private Limited Cambridge, MA Jun 29, 2015 $87,724
Information Security Consultant Zolon Tech Solutions, Inc. Herndon, VA Aug 07, 2015 $87,381
IT Security & Compliance Senior Consultant Access Technologies, Inc. Waukee, IA Jul 03, 2016 $85,000
Consultant-Information Security Aujas Networks Private Limited San Ramon, CA Dec 07, 2016 $85,000
Consultant, Information Delivery The Travelers Indemnity Company Hartford, CT Oct 28, 2013 $76,274 -
Consultant, Information Delivery The Travelers Indemnity Company Hartford, CT Nov 05, 2013 $76,274 -
Information Security Consultant Worldscape, Inc. Houston, TX Jan 07, 2016 $75,462
Information Security Consultant/Application Arch FPM Technologies North Chicago, IL Sep 11, 2014 $75,000 -
Associate IT Security Consultant Coalfire Systems, Inc. New York, NY Sep 01, 2014 $75,000
IT Security Consultant Suntechpros Inc. Parkton, NC Nov 16, 2011 $75,000
IT Security Consultant Suntechpros Inc. Parkton, NC Sep 01, 2012 $75,000
Consultant-Information Security Aujas Network Private Limited Jersey City, NJ Sep 11, 2015 $73,923

No Results

To get more results, try adjusting your search by changing your filters.

Show More

Top Skills for An Information Security Consultant


Show More

Top Information Security Consultant Skills

  1. Ensure Compliance
  2. Procedures
  3. Network Infrastructure
You can check out examples of real life uses of top skills on resumes here:
  • Administer the key global Information Security (IS) initiatives to ensure compliance with the company's security policies.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Verify and validate network infrastructure and software implementation strategies.
  • Reviewed and updated existing information security policies, made recommendations and developed additional policies and procedures based on the business need.
  • Performed External and Internal Vulnerability Assessments and Management to identify and reduce potential risks.

Top Information Security Consultant Employers

Show More

Information Security Consultant Videos

Become SAP SECURITY consultant

Cyber Security Jobs

Defining a real Security Consultant