Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss


The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become An Information Security Officer

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As An Information Security Officer

  • Interacting With Computers
  • Getting Information
  • Establishing and Maintaining Interpersonal Relationships
  • Thinking Creatively
  • Updating and Using Relevant Knowledge
  • Deal with People

  • Mostly Sitting

  • Make Decisions

  • $155,690

    Average Salary

What Does An Information Security Officer Do At Lg Electronics USA, Inc.

* Manage the information security standards and procedures to comply with regulatory requirements.
* Asset loss prevention
* Control unauthorized access to facilities.
* Maintain physical security system such as CCTV, ID card system server
* Maintain and operation IT Security related S/W. (DLP, DRM, Monitoring system)
* Monitoring and auditing systems for abnormal activity, and executing corrective actions.
* Develop and disseminate effective information security training, education, awareness and direction to employees, customers and the public.
* Develop and implement security processes for the detection, correction, and resolution of information security breaches and incidents.
* Management Personal Information Security
* Practical application of personal data protection compliance within organisations
* Support the identification of Personal Data assets and establish, a data discovery process for ongoing risk evaluation

What Does An Information Security Officer Do At OCTO Consulting Group

* The CISO will be responsible for ensuring all enclaves and Information systems are secure and functional;
* The CISO will be responsible for the development and implementation of the long-term strategic IAroad mapand requirements for accomplishing DCoE enterprise functions and operations;
* The CISO will also responsible for developing and sustaining the Federal customers Information Security program, policies, procedures, and managing the C&A process;
* Determine enterprise information security standards;
* Develops and implements information security standards and procedures;
* Securely integrate and apply Department/Agency missions, organization, function, policies, and procedures within the enclave;
* Serve as Federal customers cybersecuritysubject matter expert, possessing in-depth knowledge of a DoD and Federal policy and regulations;
* Provide analysis, integration and implementation guidance for complexcybersecurityrisk management initiatives;
* Ensure IAT Levels I III, IAM Levels I
* III, and anyone with privileged access performing IA functions receive the necessary initial and sustaining IA training and certification(s) to carry out their IAduties;
* Provides technical/management leadership on major tasks or technology assignments

What Does An Information Security Officer Do At Arlington County (Virginia) Government

* Directing the design, development, and implementation of a strategic, long-term information security strategy and multi-year roadmap for the County's information assets to mitigate cyber threats and security risks;Initiating and managing third party risk assessments to include internal and external audits of the County's information security programs and practices to identify current and future vulnerabilities;Conducting post mortem analysis and developing metrics related to information security breaches, violations, malicious activity and incidents to all levels of management; and recommending corrective technical options and/or updates to IT security initiatives and policies to prevent future occurrences;Developing and administering County-wide information security awareness and education programs;Overseeing and directing proper evaluations and selection criteria of all innovative, cost-effective vendor products, tools, and services related to the County's secure technology infrastructure;Participating in the development, implementation, and maintenance of effective disaster recovery plans, processes and procedures necessary to recover services in the event of a declared disaster; andRepresenting the County's information security related interests at industry standards committee meetings and technical conferences
* The ideal candidate has significant information technology and leadership experience with an extensive background in information systems/cybersecurity to include an understanding of cloud, SaaS, and IoT architectures, with knowledge of security, risk and control frameworks and standards such as ISO 27001 and 27002, SANS
* A proactive approach to risk-based decision making, and excellent written and verbal communication, interpersonal and collaborative skills are essential to this position. ? This individual must have demonstrated experience leading the design and implementation of information system security and risk-related concepts and communicating this information to both technical and non-technical audiences at all levels. ? ? ? ? Selection Criteria: MINIMUM: ? A combination of education and experience that demonstrates the knowledge and ability to manage technology programs and information systems at a senior level and to research, analyze, and develop solutions for complex operational problems.
* Experience should also demonstrate leadership abilities to manage cyber security challenges and to assess emerging technologies. ? Typically, this type of knowledge and experience is obtained through graduation from college with a Bachelor's degree in computer science or related field as well as substantial leadership experience managing an organization's information security programs and technology. ? SUBSTITUTION: Additional qualifying experience may substitute for the education requirement on a year for year basis

What Does An Information Security Officer Do At The Bancorp Bank

* Define, review and enforce information security policy standards and guidelines for business operations and technology implementations.
* Proactively identify IT security risks with new technology vendors, IT technical software and hardware application implementations and/or business operational processes and procedures.
* Work with software development teams to define security objectives and guidelines.
* Conduct vendor risk assessment due diligence.
* Conduct security assessments and audits.
* Identify security issues and risk, and develop and implement mitigation plans with appropriate business leaders.
* Conduct forensic IT and incident management.
* Assist with group and/or company-wide IT security matters such as incident response, intrusion detection management and IT security advisories.
* Participate in incident handling and post-incident assessments as assigned.
* Architect, design, implement, support, and evaluate security-focused tools and services.
* Analyze and recommend new and emerging security products and technologies.
* Assess applicability to company operations, perform cost/benefit analysis and prepare and present findings to management.
* Develop and deliver training materials and perform general security awareness and specific security technology training.
* Evangelize security within the company and be an advocate for customer trust.
* Develop and interpret security policies and procedures.
* Respond to questions from internal and external teams regarding security policies, processes, and/or procedures.
* Advise clients as needed on best solution to issue or question.
* Participate in security project implementations, projects that develop new intellectual property, and security compliance efforts (e.g.
* Participate in tier 2 and tier 3 security operations support.
* Mentor junior members of the team.
* Perform other related duties as assigned

What Does An Information Security Officer Do At Mantech

* Provides strategic vision, thought leadership and direction to the team to ensure secure systems across the entire enterprise of up to 50,000 users
* Serve as the primary interface with the client CISO.
* Provide best practices to client gathered from industry experience, the ManTech CISO and ManTech s Cybersecurity Community of Practice (CoP)
* Provide SME level consultative guidance on all aspects of cybersecurity
* Demonstrate thought leadership in all aspects of cybersecurity including but not limited to the creation and delivery of security training and awareness programs
* Directly assist in the assurance of information security and integrity of client environment by developing, communicating, and applying Best Practices and policy derived security requirements, standards, and tools in the areas of encryption, scanning and intrusion detection, and incident investigation.
* Assist in ensuring the adequacy of the Security Computing Environment(s)
* Establish solid relationships and partnerships with organizational key stakeholders to help achieve key cyber security objectives
* Assist in risk analysis, risk assessments and comprehensive risk management
* Lead the cybersecurity team, comprising of engineers and cyber professionals, responsible for the following:
* o Implementing the organizational IT Security requirements/security protective measures—Technical, Operational and Management (policy)
* o Anticipating and providing substantive input with revisions of IT security policy
* o Address issues escalating from Service Desk personnel, systems administrators, etc., to ensure the highest degrees of security across all systems
* o Developing and maintaining IT Security Plans for all IT equipment
* o Working with client internal Cybersecurity on critical and high security incidents and associated responses
* o Supporting several Governance boards related to security strategy, advanced security technology and tools, and continued improvement
* o Oversee functional and security testing of new, proposed IT products/solutions

Show More

Show Less

How To Become An Information Security Officer

Typically, a bachelor’s degree in computer or information science, plus related work experience, is required. Many computer and information systems managers also have a graduate degree.


Computer and information systems managers normally must have a bachelor’s degree in a computer- or information science–related field. Such a degree usually takes 4 years to complete and includes courses in computer programming, software development, and mathematics. Management information systems (MIS) programs usually include business classes as well as computer-related ones.

Many organizations require their computer and information systems managers to have a graduate degree as well. A Master of Business Administration (MBA) is common and takes 2 years beyond the undergraduate level to complete. Many people pursuing an MBA take classes while working, an option that can increase the time required to complete that degree.

Work Experience in a Related Occupation

Most jobs for computer and information systems managers require several years of experience in a related information technology (IT) job. Lower level management positions may require only a few years of experience. Directors are more likely to need 5 to 10 years of related work experience. A chief technology officer (CTO), who oversees the technology plan for a large organization, may need more than 15 years of experience in the IT field before being considered for a job.

The number of years of experience required varies with the organization. Generally, smaller or newer companies do not require as much experience as larger or more established ones.

Computer systems are used throughout the economy, and IT employees may gain experience in a variety of industries. However, an applicant’s work experience should be in the same industry they are applying to work in. For example, an IT security manager should have previously worked in information security. A hospital IT director should have experience in the healthcare field.


Most computer and information systems managers start out as lower level managers and advance to higher positions within the IT department. IT directors or project managers can advance to become CTOs. A CTO or other manager who is especially business minded can advance to become a chief information officer (CIO), the person in charge of all IT-related decisions in an organization. CIOs can advance to become top executives in an organization.

Important Qualities

Analytical skills. IT managers must be able to analyze problems and consider and select the best ways to solve them.

Business skills. IT managers must develop and implement strategic plans to reach the goals of their organizations.

Communication skills. IT managers must be able to explain their work to top executives and give clear instructions to their subordinates.

Decisionmaking skills. Some IT managers must make important decisions about how to allocate resources in order to reach their organizations’ goals.

Leadership skills. IT managers must be able to lead and motivate IT teams or departments so that workers are efficient and effective.

Organizational skills. Some IT managers must coordinate the work of several different IT departments to make the organization run efficiently.

Show More

Show Less

Information Security Officer jobs

Add To My Jobs

Information Security Officer Career Paths

Information Security Officer
Chief Information Officer Chief Executive Officer Human Resources Generalist
Assistant Vice President
7 Yearsyrs
Adjunct Professor Information Technology Specialist Information Security Analyst
Assurance Manager
8 Yearsyrs
Director Of Information Vice President Of Information Technology
Chief Information Officer
11 Yearsyrs
Chief Information Officer Management Consultant Senior Manager
Director Of Quality
14 Yearsyrs
Security Manager Account Manager Purchasing Manager
Director, Procurement
13 Yearsyrs
Chief Technology Officer Managing Partner Executive Assistant To President
Executive Vice President Of Operations
10 Yearsyrs
Information Technology Manager Senior Manager Controller
Finance Controller
9 Yearsyrs
Chief Technology Officer Technical Consultant Information Technology Manager
Global Information Technology Manager
10 Yearsyrs
Information Security Manager
10 Yearsyrs
Security Architect Architect Technical Project Manager
Manager, Project Management Office
12 Yearsyrs
Director Of Information Senior Project Manager Program Director
Operations Director
9 Yearsyrs
Information Technology Manager Operations Manager
Regional Operation Manager
9 Yearsyrs
Security Architect Senior Manager Director Of Information
Senior Director Of Information & Technology
13 Yearsyrs
Management Consultant Service Delivery Manager Infrastructure Manager
Senior Manager Infrastructure
13 Yearsyrs
Management Consultant Information Technology Consultant Information Systems Manager
Senior Manager-Systems
12 Yearsyrs
Vice President Of Information Technology Senior Project Manager
Senior Portfolio Manager
10 Yearsyrs
Vice President Of Information Technology Chief Information Officer Senior Project Manager
Vice President And Manager
10 Yearsyrs
Information Security Manager Director Of Information
Vice President Of Information Technology
12 Yearsyrs
Security Manager Branch Manager Assistant Vice President
Vice President Operation Manager
9 Yearsyrs
Show More

Information Security Officer Demographics


  • Male

  • Female

  • Unknown



  • White

  • Hispanic or Latino

  • Asian

  • Unknown

  • Black or African American

Show More

Languages Spoken

  • Spanish

  • Japanese

  • French

  • Portuguese

  • Chinese

  • Hindi

  • Mandarin

Show More

Information Security Officer

Unfortunately we don’t have enough data for this section.

Information Security Officer Education

Information Security Officer

Unfortunately we don’t have enough data for this section.

Job type you want
Full Time
Part Time

Real Information Security Officer Salaries

Job Title Company Location Start Date Salary
Chief Information Security Officer Zenpayroll, Inc. San Francisco, CA Jul 28, 2016 $225,000
Chief Information Security Officer VYSK Communications, Inc. San Francisco, CA Aug 25, 2016 $200,000
Chief Information Security Officer VYSK Communications, Inc. San Francisco, CA Oct 28, 2015 $200,000
Vice President, Global Information Security Officer Pacific Investment Management Company, LLC Newport Beach, CA Jan 04, 2016 $180,000
Vice President, Information Security Officer Pacific Investment Management Company, LLC Newport Beach, CA Jul 14, 2014 $170,000
Chief Information Security Officer Lesconcierges, Inc. San Francisco, CA Sep 05, 2014 $165,000
Information Security Officer Sutter Health Modesto, CA Sep 26, 2016 $158,693
Chief Information Security Officer Bridgewater Associates, LP Westport, CT Oct 01, 2011 $151,174 -
Information Security Officer (SR. Security Analyst) Five9, Inc. San Ramon, CA Nov 04, 2015 $135,001 -
Information Security Officer (SR. Security Analyst Five9, Inc. San Ramon, CA Oct 02, 2014 $135,001
Senior Information Security Officer Inovant, LLC Ashburn, VA Jul 05, 2015 $124,654 -
Assistant Vice President, Divisional Business Information Security Officer Deutsche Bank Trust Company Americas New York, NY Dec 30, 2016 $115,000
Technical Information Security Officer Paragon Solutions, Inc. Islandia, NY Oct 01, 2013 $110,000
Chief IT Security Officer Omnex Group, Inc. Englewood Cliffs, NJ Jul 09, 2016 $100,000
Chief Information Security Officer Envy Hawaii LLC Urban Honolulu, HI Sep 22, 2016 $100,000
Technology Information Security Officer Citicorp Credit Services, Inc. (USA) Blue Ash, OH Sep 01, 2011 $99,383
Information Security Officer CDM Secure Inc. Long Beach, CA Apr 20, 2015 $97,094 -
Information Security Officer Fiserv Automotive Solutions, Inc. Fort Lauderdale, FL Sep 29, 2013 $94,164 -
Information Security Officer University of Arkansas at Little Rock Little Rock, AR Apr 01, 2015 $90,000
Information Technology Security Officer Bowie State University Bowie, MD Aug 16, 2010 $85,000
Information Security Officer Doctors Hospital at Renaissance Edinburg, TX Apr 15, 2014 $80,000
Information Security Officer Berklee College of Music Boston, MA Oct 01, 2015 $76,190 -
Information Security Officer Texas A&M University Corpus Christi Corpus Christi, TX Apr 18, 2011 $76,086
Asst. Vice President, Information Security Officer Eastern Bank Lynn, MA Sep 15, 2016 $72,530 -

No Results

To get more results, try adjusting your search by changing your filters.

Show More

Top Skills for An Information Security Officer


Show More

Top Information Security Officer Skills

  1. Ensure Compliance
  2. Procedures
  3. Information Security Policies
You can check out examples of real life uses of top skills on resumes here:
  • Perform technical and functional risk assessments and audits on clinical systems to ensure compliance and appropriate configurations are implemented.
  • Communicate the direction for College security standards, procedures, and guidelines.
  • Identified information security policies, gaps and vulnerability/risk assessment strategy.
  • Performed information security risk assessments of Third Party Vendors.
  • Reviewed and updated Information Security/Disaster Recovery Program.

Top Information Security Officer Employers

Show More

Information Security Officer Videos

Security Officer Career Information : Security Officer Job Description

Careers in Cybersecurity- Expert Advice From BlackHat & DEFCON

A day in the life of Andrea Simmons, Chief Information Security Officer, HP Enterprise Services