FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
×
FIND
PERSONALIZED JOBS

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Become An Information Technology Security Manager

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As An Information Technology Security Manager

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $113,509

    Average Salary

What Does An Information Technology Security Manager Do

Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Duties

Information security analysts typically do the following:

  • Monitor their organization’s networks for security breaches and investigate a violation when one occurs
  • Install and use software, such as firewalls and data encryption programs, to protect sensitive information
  • Prepare reports that document security breaches and the extent of the damage caused by the breaches
  • Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited
  • Research the latest information technology (IT) security trends
  • Help plan and carry out an organization’s way of handling security
  • Develop security standards and best practices for their organization
  • Recommend security enhancements to management or senior IT staff
  • Help computer users when they need to install or learn about new security products and procedures

Information security analysts must continually adapt to stay a step ahead of cyberattackers. They must stay up to date on the latest methods attackers are using to infiltrate computer systems and on IT security. Analysts need to research new security technology to decide what will most effectively protect their organization. This may involve attending cybersecurity conferences to hear firsthand accounts of other professionals who have experienced new types of attacks.

IT security analysts are heavily involved with creating their organization’s disaster recovery plan, a procedure that IT employees follow in case of emergency. These plans allow for the continued operation of an organization’s IT department. It includes preventive measures such as regularly copying and transferring data to an offsite location. It also involves plans to restore proper IT functioning after a disaster. Analysts continually test the steps in their recovery plans.

Because information security is important, these workers usually report directly to upper management. Many information security analysts work with an organization’s computer and information systems manager or chief technology officer (CTO) to design security or disaster recovery systems.

Show More

Show Less

How To Become An Information Technology Security Manager

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.

Education

Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.

Advancement

Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Do you work as an Information Technology Security Manager?

Information Technology Security Manager Jobs

NO RESULTS

Aw snap, no jobs found.

Add To My Jobs

Do you work as an Information Technology Security Manager?

Help others decide if this is a good career for them

Average Length of Employment
Security Architect 2.3 years
Top Employers Before
Manager 3.6%
Consultant 3.0%
Top Employers After
Consultant 4.5%

Do you work as an Information Technology Security Manager?

Information Technology Security Manager Demographics

Gender

Male

79.8%

Female

17.8%

Unknown

2.3%
Ethnicity

White

59.3%

Hispanic or Latino

15.6%

Black or African American

12.0%

Asian

8.9%

Unknown

4.1%
Show More
Foreign Languages Spoken

Spanish

30.4%

French

17.4%

Swahili

4.3%

Portuguese

4.3%

Swedish

4.3%

Vietnamese

4.3%

German

4.3%

Hebrew

4.3%

Japanese

4.3%

Greek

4.3%

Russian

4.3%

Arabic

4.3%

Italian

4.3%

Croatian

4.3%
Show More

Information Technology Security Manager Education

Schools

University of Phoenix

27.4%

George Mason University

6.2%

Capella University

6.2%

Webster University

5.3%

University of Houston

5.3%

Colorado Technical University

5.3%

Community College of the Air Force

4.4%

University of Maryland - University College

4.4%

Arizona State University

3.5%

Strayer University

3.5%

George Washington University

3.5%

University of Texas at Austin

3.5%

Norwich University

2.7%

Western Governors University

2.7%

Northern Arizona University

2.7%

New York University

2.7%

American University

2.7%

Stanford University

2.7%

University of North Texas

2.7%

Texas A&M University

2.7%
Show More
Majors

Business

19.3%

Computer Science

14.1%

Information Technology

12.4%

Computer Information Systems

10.3%

Electrical Engineering

6.2%

Information Systems

4.8%

Computer Systems Security

4.5%

Management Information Systems

4.3%

Project Management

4.1%

Management

2.9%

Computer Networking

2.6%

Criminal Justice

2.4%

Education

1.9%

Communication

1.7%

Computer Engineering

1.7%

Finance

1.7%

Accounting

1.7%

Environmental Control Technologies/Technicians

1.2%

Information Sciences

1.2%

Marketing

1.2%
Show More
Degrees

Bachelors

37.4%

Masters

32.9%

Other

14.9%

Associate

6.1%

Doctorate

3.9%

Certificate

3.2%

Diploma

1.7%
Show More

Job type you want
Full Time
Part Time
Internship
Temporary

Real Information Technology Security Manager Salaries

Job Title Company Location Start Date Salary
IT Risk Transformation-Information Security Manager Ernst & Young U.S. LLP New York, NY Jun 01, 2015 $150,000
Manager of IT Security Public Consulting Group, Inc. Medford, MA Mar 02, 2015 $145,000
Core Security Manager, IT Security, Privacy & Risk Pricewaterhousecoopers Advisory Services LLC San Jose, CA Aug 04, 2016 $133,453
Information Technology Security Manager Howard University Washington, DC Dec 12, 2014 $132,000
Enterprise IT Security Manager Actuant Corporation Menomonee Falls, WI Jan 26, 2015 $130,000
IT Consulting SAP Security Senior Manager Protiviti Inc. San Francisco, CA Dec 10, 2015 $129,210 -
$180,000
Core Security Manager, IT Security, Privacy & Risk Pricewaterhousecoopers Advisory Services LLC Chicago, IL Feb 18, 2016 $125,000
Information Technology Manager, Security and Risk Management Johnson & Johnson Services, Inc. Bridgewater, NJ Apr 13, 2015 $124,779 -
$170,000
Manager, IT Security Risk & Compliance SONY Pictures Entertainment Inc. Culver City, CA Nov 20, 2015 $120,890 -
$140,890
Information Technology-Security Manager Howard University Washington, DC Dec 12, 2011 $120,000
Manager, IT Security, Risk and Compliance SONY Pictures Entertainment Inc. Culver City, CA Jun 02, 2014 $118,000
Manager, IT Governance/Heightened Security Alvarez & Marsal Holdings LLC New York, NY Nov 08, 2014 $116,132
Manager, IT Security Parexel International Hackensack, NJ Oct 09, 2016 $115,031
Manager-IT Security Administration Payless Shoesource, Inc. Topeka, KS Oct 01, 2014 $112,271
IT Security OPS Manager The TJX Companies, Inc. Marlborough, MA Sep 18, 2015 $111,240
Manager, IT Security Protiviti, Inc. Philadelphia, PA Oct 26, 2015 $108,000 -
$120,000
Manager Security Technology Identity Management Six Continents Hotels, Inc. Alpharetta, GA Dec 15, 2016 $104,770 -
$127,590
Information Technology Security Manager The Shield, Inc. New York, NY Oct 01, 2010 $98,068
Manager, RAS IT Audit and Security Elliott Davis Decosimo LLC Franklin, TN Nov 15, 2016 $95,000
IT Security and Compliance Manager/Analyst Servicenow, Inc. Santa Clara, CA Dec 28, 2015 $93,579 -
$110,000
IT Consulting Security Manager Protiviti Inc. Boston, MA Nov 21, 2016 $91,312 -
$105,539
Regional IT & Logistical Security Manager, Americas Oberthur Technologies of America Corp East Rancho Dominguez, CA Feb 13, 2015 $90,522
Manager, IT Security-Optum Optum Services, Inc. Golden Valley, MN Aug 03, 2015 $89,731 -
$94,731
Manager IT Security Checkfree Services Corporation (A Fiserv Company) Norcross, GA Sep 06, 2015 $88,296 -
$139,085
IT Security Manager Parexel International Hackensack, NJ Sep 20, 2015 $87,904

No Results

To get more results, try adjusting your search by changing your filters.

Show More

How Would You Rate The Salary Of an Information Technology Security Manager?

Have you worked as an Information Technology Security Manager? Help other job seekers by rating your experience as an Information Technology Security Manager.

Top Skills for An Information Technology Security Manager

Show More

  1. Network Security
  2. Procedures
  3. Infrastructure
You can check out examples of real life uses of top skills on resumes here:
  • Performed firewall administration, network protocols, network security, vulnerability and risk analysis, privilege management and authentication.
  • Provided subject matter guidance to Installation personnel which using information from Department and Bureau security policies and procedures.
  • Evaluated hardware/software/network infrastructure, identified security weakness and provided recommendations.
  • Conduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, rules, and protection needs.
  • Managed information risk management compliance programs to include protected health information, data privacy, and records management.

How Would You Rate Working As an Information Technology Security Manager?

Are you working as an Information Technology Security Manager? Help us rate Information Technology Security Manager as a Career.

Rank:

Average Salary:

Top 10 Best States for Information Technology Security Managers

  1. New Jersey
  2. District of Columbia
  3. Rhode Island
  4. Virginia
  5. New York
  6. Maryland
  7. North Carolina
  8. Washington
  9. California
  10. Connecticut
  • (658 jobs)
  • (358 jobs)
  • (82 jobs)
  • (1,236 jobs)
  • (992 jobs)
  • (561 jobs)
  • (666 jobs)
  • (874 jobs)
  • (3,003 jobs)
  • (227 jobs)

Top Information Technology Security Manager Employers

Show More

Jobs From Top Information Technology Security Manager Employers

Information Technology Security Manager Videos

DEFCON 17: Effective Information Security Career Planning

A day in the life of IT security

Information Security & Risk Management

Related to your recently viewed content