Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss


The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become An Information Security Manager

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As An Information Security Manager

  • Interacting With Computers
  • Getting Information
  • Establishing and Maintaining Interpersonal Relationships
  • Thinking Creatively
  • Updating and Using Relevant Knowledge
  • Deal with People

  • Mostly Sitting

  • Make Decisions

  • $155,690

    Average Salary

What Does An Information Security Manager Do At H&R Block

* Build a risk response model that evolves over time based on the needs of the business
* Define the strategy and desired outcomes of assigned initiatives, programs and projects that are aligned to strategically reduce risk for the business.
* Work in partnership with business leaders to obtain and commit necessary associate resources at the appropriate time, level, and expertise to support objectives.
* Deliver activities with a sense of urgency, in a reasonable amount of time, leveraging existing investments, with superior quality and minimal impact to the business.
* Provide a dashboard and regularly report to senior leadership, and the CISO, the current status of all in-flight activities.
* Leverage current/future security technology stack capabilities to enhance the business’ ability to identify, mitigate and/or remediate risk across the enterprise.
* Monitor and mitigate project, program, and operational execution risks.
* Provide oversight to teams of administrative and technical individuals, from cross functional teams as well as vendors, to accomplish the appropriate outcomes.
* Establish appropriate project management tools, processes and procedures for the corporate project management office as well as ensuring compliance with such tools.
* Manage the organizations budget by putting in place financial disciplines and ensuring their execution to meet or beat budget.
* Develop contract and manage vendor relationships and ensure their delivery, on time and on budget.
* Responsible for the delivery of project components

What Does An Information Security Manager Do At Freddie Mac

* Manage a team of 5
* Security professionals that maintain the firm----??s enterprise security tools
* Oversight to confirm tools are up and running, creating alerts, providing reports and also ensuring that the tools are installed and monitoring everything that is in their scope
* Gather requirements from technology and business stakeholders to develop and implement new policies in our tools
* Work with stakeholders to ensure completeness and accuracy in the reports we generate and configure as necessary
* Work with technical support teams to provide solutions for issues with security tools interfering with business processes
* Identify risks and ensure IT General Controls and operational processes are in place to mitigate
* Ensure operational excellence in a heavily regulated company that is audited frequently
* Work closely with Architecture and Engineering teams and provide input into new technologies
* Attract, mentor and retain a team of Information Security professionals
* Understand current Information Security trends and make recommendations for new tools or processes to keep Freddie Mac current with industry best practicesBasic Requirements
* years of IT Operations or Information Security experience
* At least 3 years----?? experience managing IAM teams or projects
* Bachelor----??s degree in Information Security, Information Technology, Management Information Systems or equivalent work experience
* Deep technical knowledge of security, as well as industry trends
* Experience in implementing and managing security tools in a complex enterprise environment
* Experience as a Sys Admin (Windows or Unix)
* Experience with complex security tools (eTrust Privilege Identity Manager, IBM TAM/ISAM, RSPreferred Skills
* Strong technical writing skills
* Ability to work independently with minimal direction
* Strong written and verbal communication skills; highly responsive with a sense of urgency at all times
* Security certifications such as CISSP, CISA or CISM
* Excellent time management, multi-tasking, and prioritization skillsClosing StatementToday, Freddie Mac makes home possible for one in four home borrowers and is one of the largest sources of financing for multifamily housing.
* Join our smart, creative and dedicated team and you----??ll do important work for the housing finance system and make a difference in the lives of others.
* Freddie Mac is an equal opportunity and top diversity employer.

What Does An Information Security Manager Do At Kforce

* Provide information assurance support for systems with various technologies such as Oracle databases (and Exadata), Oracle Fusion middleware, Linux servers, Oracle Enterprise Linux, Microsoft SQL databases, Dell servers, and Windows servers
* Manage information security vulnerability scans and findings, then closely interact with Federal customers and internal teams on resolution/mitigation strategies
* Develop plans to address POA&Ms for all systems as well as hardening guides
* Support maintenance of security authorization packages
* Coordinate assessments & authorization annual reviews
* Lead and support disaster recovery/business continuity planning efforts
* Develop accurate documentation and communications
* Assess for any information security process improvements

What Does An Information Security Manager Do At Zebra Technologies

* This Security Manager role will assist with coordination of activities within the IT Security organization and reports to the Chief Information Security Officer.
* The person occupying this role will be a key contributor to the design, implementation, administration, maintenance, and monitoring of the Security Operations Program.
* The Security Manager role supports the CIO, CISO, Legal, and others for investigations, which may involve significant threats and/or the loss or misappropriation of assets.
* Preferred candidates will have significant experience in a role that required them to effectively identify, investigate, resolve, and track the remediation of security incidents.
* The position requires a high level of technical knowledge in the area of application, operational, physical/facility, network, server, and workstation security.
* Preferred candidates will be capable of assessing risks, designing mitigating security and control practices, influencing the culture of the company through training and education, coordinating with information and business owners on security issues and practices, monitoring compliance, and preparing and enforcing policies.
* Performs security, risk, and vulnerability assessments of wired and wireless networks, information systems, and applications.
* This role is responsible for helping to facilitate compliance with legal, regulatory, and customer contract requirements.
* The candidate is expected to maintain knowledge of complex industry trends, current security issues and security technology development, and be able to provide updates to management on potential threats and risks that could impact the business/operations.
* Other Duties and Responsibilities** :
* Developing, drafting, and maintaining Corporate and Security policies, facility security plans, control standards, and system and application standards.
* Scope of role also requires providing inputs into Contingency Plans, Backup Plans, Disaster Recovery Plans, Incident Plans, and Emergency Mode Operations Plans.
* Performing security, risk, and vulnerability assessments of wired and wireless networks, information systems, and applications.
* Scope of role includes researching and maintaining proficiency in computer network exploitation, tools, techniques, and countermeasures.
* Conducting IT and Security audits, writing reports, reviewing findings, making recommendations to management, and tracking remediation progress in collaborating with IT, Internal Audit, Compliance, business owners, and business unit leads.
* Analyzing and evaluating security operations to identify risks or opportunities for improvement.
* Will perform other duties as assigned
* Qualifications
* Job Requirements

What Does An Information Security Manager Do At Consol Partners

* Due to the new EU data protection basic regulation, a security assessment of an API gateway landscape for the markets Europe and China is required.
* The API gateway is operated in the customer’s local data center.
* This gateway takes over different tasks from the general business.
* Provision of interfaces, authentication and transformation of corresponding requests.
* In addition, a security assessment of a central service is required that allows push notifications to be sent to mobile apps via a unified interface.
* Currently, push notifications to the platforms Apple/iOS (APNS), Google/Android (GCM) and Baidu (China) are supported.
* Deliverables:
* Performing ITS Risk Analysis
* Performing a PEN test
* Support of the classification system for documents
* Verification and, if necessary, updating of proofs for the IT security audit, e. g.
* IT security concept, IT architecture diagram, logging concept
* Close coordination with different Specialist departments and technical specialists of the customer
* Documentation of the results

Show More

Show Less

How To Become An Information Security Manager

Typically, a bachelor’s degree in computer or information science, plus related work experience, is required. Many computer and information systems managers also have a graduate degree.


Computer and information systems managers normally must have a bachelor’s degree in a computer- or information science–related field. Such a degree usually takes 4 years to complete and includes courses in computer programming, software development, and mathematics. Management information systems (MIS) programs usually include business classes as well as computer-related ones.

Many organizations require their computer and information systems managers to have a graduate degree as well. A Master of Business Administration (MBA) is common and takes 2 years beyond the undergraduate level to complete. Many people pursuing an MBA take classes while working, an option that can increase the time required to complete that degree.

Work Experience in a Related Occupation

Most jobs for computer and information systems managers require several years of experience in a related information technology (IT) job. Lower level management positions may require only a few years of experience. Directors are more likely to need 5 to 10 years of related work experience. A chief technology officer (CTO), who oversees the technology plan for a large organization, may need more than 15 years of experience in the IT field before being considered for a job.

The number of years of experience required varies with the organization. Generally, smaller or newer companies do not require as much experience as larger or more established ones.

Computer systems are used throughout the economy, and IT employees may gain experience in a variety of industries. However, an applicant’s work experience should be in the same industry they are applying to work in. For example, an IT security manager should have previously worked in information security. A hospital IT director should have experience in the healthcare field.


Most computer and information systems managers start out as lower level managers and advance to higher positions within the IT department. IT directors or project managers can advance to become CTOs. A CTO or other manager who is especially business minded can advance to become a chief information officer (CIO), the person in charge of all IT-related decisions in an organization. CIOs can advance to become top executives in an organization.

Important Qualities

Analytical skills. IT managers must be able to analyze problems and consider and select the best ways to solve them.

Business skills. IT managers must develop and implement strategic plans to reach the goals of their organizations.

Communication skills. IT managers must be able to explain their work to top executives and give clear instructions to their subordinates.

Decisionmaking skills. Some IT managers must make important decisions about how to allocate resources in order to reach their organizations’ goals.

Leadership skills. IT managers must be able to lead and motivate IT teams or departments so that workers are efficient and effective.

Organizational skills. Some IT managers must coordinate the work of several different IT departments to make the organization run efficiently.

Show More

Show Less

Information Security Manager jobs

Add To My Jobs

Information Security Manager Demographics


  • Male

  • Female

  • Unknown



  • White

  • Hispanic or Latino

  • Asian

  • Unknown

  • Black or African American

Show More

Languages Spoken

  • Spanish

  • Swahili

  • Portuguese

  • Chinese

  • Japanese

  • Thai

  • Mandarin

  • Korean

  • Arabic

Show More

Information Security Manager

Unfortunately we don’t have enough data for this section.

Information Security Manager Education

Information Security Manager

Unfortunately we don’t have enough data for this section.

Job type you want
Full Time
Part Time

Real Information Security Manager Salaries

Job Title Company Location Start Date Salary
Senior Information Security Manager Linkedin Corporation Mountain View, CA Aug 18, 2016 $192,000 -
Manager, Information Security and Privacy Upwork, Inc. Mountain View, CA Feb 15, 2016 $185,000
Pi-Advisory-Itrt-Information Security-Power & Utilities Senior Manager Ernst & Young U.S. LLP San Jose, CA Oct 20, 2015 $179,300
Information Security Manager Exodus Intelligence LLC Austin, TX Nov 21, 2016 $175,000
Information Security Risk Manager Robert Half International Inc. San Ramon, CA Dec 28, 2011 $163,030 -
Information Security Risk Manager Robert Half International Inc. San Ramon, CA Dec 28, 2014 $160,784 -
Information Security Manager American Chemical Society Washington, DC Sep 26, 2016 $153,072
Information Security Manager Mechanics Bank Hercules, CA Sep 20, 2016 $150,000
Information Security Manager Accelerated Innovators, Inc. Livingston, NJ Jan 09, 2012 $150,000
Information Security Manager IMC Americas, Inc. Chicago, IL Dec 23, 2016 $150,000
Information Security Manager Linkedin Corporation Mountain View, CA Sep 29, 2014 $147,820 -
Information Security Manager The Children's Place Services Company, LLC Secaucus, NJ Dec 11, 2015 $145,000
Information Security Manager The Children's Place Services Company, LLC Secaucus, NJ Feb 15, 2016 $140,000 -
Information Security Manager, Governance and Compl Emerson Electric Co. Saint Louis, MO Nov 06, 2014 $135,990 -
Manager, Information Security & Compliance The Children's Place Services Company, LLC Secaucus, NJ Nov 17, 2014 $135,000 -
Manager, Information Security 1 EBAY Inc. San Jose, CA Nov 21, 2011 $135,000
Manager, Information Security & Compliance The Children's Place Services Company, LLC Secaucus, NJ Nov 24, 2014 $135,000 -
Information Security Manager Exodus Intelligence, LLC Austin, TX Jun 25, 2015 $130,000
Information Security Manager Marlabs, Inc. Piscataway, NJ Mar 20, 2016 $125,000
Manager Information Security EMC Corporation Bedford, MA May 10, 2015 $116,280
Information Security Manager Exodus Intelligence, LLC Austin, TX Jun 25, 2012 $115,000 -
Manager Information Security Intuit Inc. Mountain View, CA Nov 04, 2016 $113,526 -
Information Security Manager Marlabs, Inc. Piscataway, NJ Mar 25, 2014 $111,800
Information Security Manager Marlabs, Inc. Piscataway, NJ Mar 21, 2015 $111,200
Information Security Manager EAPT Solutions, Inc. Piscataway, NJ Mar 28, 2016 $111,176 -

No Results

To get more results, try adjusting your search by changing your filters.

Show More

Top Skills for An Information Security Manager


Show More

Top Information Security Manager Skills

  1. Regulatory Compliance
  2. Procedures
  3. Vulnerability Management
You can check out examples of real life uses of top skills on resumes here:
  • Networked with outside Regional agencies relating to Information Law Enforcement and Regulatory Compliance and with peer Security Managers from other corporations.
  • Managed security programs, enforced policies and streamlined procedures for supported systems.
  • Implemented and manages suit of automated system tools for vulnerability management and remediation.
  • Developed and implemented information security policies and technical security standards for all schools and patient care units:.
  • Evaluated and expanded Information Security audits and audit requirements to cover gaps in Risk Management Program.

Top Information Security Manager Employers

Information Security Manager Videos

Certified Information Security Manager (CISM) Webinar Clinic

CISM (Certified Information Security Manager) Training and Certification Boot Camp by SecureNinja

I am a CISM - Certified Information Security Manager