Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss


The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become An Information Technology Security Manager

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As An Information Technology Security Manager

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $90,120

    Average Salary

What Does An Information Technology Security Manager Do At KPMG

* Provide guidance to developers on recommended controls and countermeasures
* Continuously improve the security aspects of operating processes
* Perform hands-on source code review as well as static and dynamic program analysis, auditing results and offering plans for vulnerability remediation and/or mitigation
* Work with development and project teams to promote and ensure the use of secure coding practices
* Utilize knowledge and understanding of application architecture, design, development and secure coding principles and emerging standards to identify findings and clearly communicate risks and possible remediatio

What Does An Information Technology Security Manager Do At Regeneron Pharmaceuticals

* Oversee the general health of the enterprise cybersecurity sensor grid consisting of dedicated security and ancillary infrastructure technology (systems/devices/appliances) that monitor for cybersecurity-related events.
* Detect, triage and, if necessary, escalate events to next level cyber incident response to attacks against the company's information, networks, systems, applications and products.
* Work with engineering teams to develop threat detection signals and incident response plans.
* Execute projects to improve security event collection, detection, analysis, correlation and response.
* Inform infrastructure and security technology teams on configuration changes to mitigate active threats
* Collaborate and coordinate with stakeholders in responding to cyber security incidents
* Collaboration
* Ability to work across multiple lines of business in a security information corporate function
* Innovation
* Use logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems
* Identify trends in machine learning, heuristics, and big data for security incident and event management

What Does An Information Technology Security Manager Do At Americas Styrenics, LLC

* Lead movement from ECC/6 Suite on HANA to SAP S/4 Collaborating with the finance team and the technical team to translate functional requirements into SAP technical requirements.
* Gather and refine requirements, help train users on the use of new SAP software functionality Provide continuous business support in all Finance (FICO), GRC, IDM, Security and Basis.
* Provide maintenance of different interfaces between SAP system and external systems; identify problems in applications.
* Validate requirements implementation (manage and support integration and acceptance testing).
* Very strong in the areas of General Ledger (Classic and New), Product Costing, Accounts Payable, Accounts Receivable, Banking, FIxed Assets, Sales & Use Tax, Cost Center Accounting, Profit Center Accounting, Segment Reporting, Controlling Profitability Analysis Integration experience between FICO and other SAP modules MM, WM, SD or 3rd party applications Requires knowledge of SAP ABAP Query as well as EDI/ALE/IDOCs and workflow Must be able to design/troubleshoot integration of third party applications with SAP (GRC, IDM, Concur, et al) Must be willing to travel, on an as needed basis Personal Attributes & Qualities: Ability to self-manage & multi-task in complex environment Impeccable Integrity& Professionalism Quality and Execution Focus Sound Decision Making and Judgment Exceptional communication and people relationship skills required Valued/Respected Team Member Leader and Mentor Consensus Builder Strategic Thinker Credible and Trustworthy Excellent Presentation, Analytical and Problem Solving skills Americas Styrenics is an Equal Opportunity

What Does An Information Technology Security Manager Do At Serco

* Assess program infrastructure and data to identify vulnerabilities caused by weaknesses or flaws in a large and complex IT solution.
* Make recommendations to improve security based on assessment and knowledge of current and emerging threats.
* In collaboration with partners, internal IT teams, and customer(s), develop and implement policies that give managers and employees varying level of access to applications, systems, and data, and monitor access to ensure compliance.
* Effectively manage customer expectations.
* Assists the Privacy and Security Director to manage all Records and Personal Information, including access to (and requests by HMQ for access to or copies of) such Records and Personal Information and protection of the privacy of such Records and Personal Information.
* Perform daily activities for assessing, monitoring, and maintaining the operational security of the enterprise, assessing the security impact of configuration and architecture changes, and managing IT security incidents.
* Develop and provide necessary security training to reinforce the importance of information security demonstrating good practices and explain the risks of poor security practices.
* Collaborate with program and corporate IT and Security teams to adopt and implement best practice security solutions in alignment with local security requirements

What Does An Information Technology Security Manager Do At John Hancock

* The IT Governance and Security Manager has the accountability to:
* General Risk Management Ownership & Oversight:
* Lead, manage and enforce the Enterprise IT system risk management and information security risk management framework/methodology working across value streams.
* This includes all information security activities.
* Improve and promote the system risk-related and information security related posture.
* Stay abreast of the latest industry security requirements and continuously improve the IT related risk management and security posture.
* Document and maintain the system risk governance methodology, the system risk management policies and the information security policy and standards.
* Organize, conduct and perform system risk and information security risk assessments and gap analysis processes.
* Establish, review and verify the system risk and information security risk related policies, standards and procedures documentation.
* Promotes and influences business on information security awareness, best practices and meeting requirements.
* Participate in vendor oversight activities both critical Enterprise IT vendors and IT support in oversight and due diligence activities of critical business partner vendors.
* Cyber / Information Security Responsibilities:
* Assist in accelerating our cyber / information security profile.
* Stay up-to-date on the latest intelligence, including hackers' methodologies, to anticipate security breaches; anticipate new security threats and stay-up-to-date with evolving tools, architectures and infrastructures.
* Recommend and assist in implementing security measures to protect computer systems, networks and data.
* Incident management and response: represent IT in reported incidents; coordinate potential fraud related activities on behalf of IT.
* Management and response to engage resources for immediate response and recovery of an application or service.
* Manage the IT Risk team on providing data support for data analytics for fraud prevention.
* Act as the lead for Enterprise IT working closely with the Global Analytics team and Operations, to ensure we are all in synch, and report back to management.
* Audit/SOC
* controls responsibilities:
* Ensure that we adhere to all system SOX and SOC
* controls to meet audit requirements including system access management, quarterly reviews and new employee hires and moves.
* Partner with business, IT leads and vendors to bring IT general controls to the forefront.
* Create metric reporting on our application and infrastructure controls environment.
* Qualifications for this role are as follows:
* Bachelor's degree or equivalent in Business, Economics, Finance, Law, IT, Marketing, Accounting or equivalent
* More than five years' experience in the Security, IT risk management and/or IT Audit related activities of the financial industry
* Accreditation in one or more certifications that cover CISSP, CISA, CISM, CEH and OSCP
* Confident presentation and facilitation skills and strong interpersonal and leadership skills to facilitate working with senior management at all levels
* Strong oral, written, communication, interpersonal and leadership skills
* Good managerial skills relating to employees, planning and policy formulation
* Excellent organization, planning and time management skills
* Strong analytical skills and ability to deliver actionable recommendations based on analysis.
* Ability to translate analyses, using mediums to drive comprehensible recommendations (e.g., dashboards, graphics, summaries, etc.) The ideal candidate will excel in data gathering and analytical/problem solving skills
* Managing and resolving conflicting priorities, and negotiating realistic timelines requiring minimum supervision
* Develop and foster relationships with the divisions and business unit subject matter experts; establish and maintain strong relationships with vendors, third party partners, business units and IT departments across Manulife/John Hancock
* Ability to adapt quickly and easily to changes within the business
* Proactive keeping abreast of leading changes in their field of expertise and evaluate for impact on Enterprise IT roadmaps
* About John Hancock Financial and Manulife
* John Hancock is a division of Manulife Financial Corporation, a leading international financial services group that helps people achieve their dreams and aspirations by putting customers’ needs first and providing the right advice and solutions.
* We operate primarily as John Hancock in the United States, and Manulife elsewhere.
* We provide financial advice, insurance and wealth and asset management solutions for individuals, groups and institutions.
* Assets under management and administration by Manulife and its subsidiaries were over $1 trillion (US$806 billion) as of September 30, 2017.
* Manulife Financial Corporation trades as MFC on the TSX, NYSE, and PSE, and under 945 on the SEHK.
* Manulife can be found at manulife.com.
* One of the largest life insurers in the United States, John Hancock supports approximately 10 million Americans with a broad range of financial products, including life insurance, annuities, investments, 401(k) plans, and college savings plans.
* We also offer advice through Signator, a network of independent financial advisors.
* Additional information about John Hancock may be found at johnhancock.com.
* Agency submissions and contacts are by invitation only and must be initiated by John Hancock's Recruiting Department only.
* Unsolicited agency submissions will not be honored.
* AA/F/M/D/V

Show More

Show Less

How To Become An Information Technology Security Manager

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.


Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.


Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Information Technology Security Manager jobs

Add To My Jobs

Information Technology Security Manager Demographics


  • Male

  • Female

  • Unknown



  • White

  • Hispanic or Latino

  • Asian

  • Unknown

  • Black or African American

Show More

Languages Spoken

  • Spanish

  • French

  • Swahili

  • Portuguese

  • German

  • Hebrew

  • Japanese

  • Greek

  • Russian

  • Swedish

  • Italian

  • Croatian

Show More

Information Technology Security Manager

Unfortunately we don’t have enough data for this section.

Information Technology Security Manager Education

Information Technology Security Manager

Unfortunately we don’t have enough data for this section.

Job type you want
Full Time
Part Time

Real Information Technology Security Manager Salaries

Job Title Company Location Start Date Salary
IT Risk Transformation-Information Security Manager Ernst & Young U.S. LLP New York, NY Jun 01, 2015 $150,000
Manager of IT Security Public Consulting Group, Inc. Medford, MA Mar 02, 2015 $145,000
Information Technology Security Manager Howard University Washington, DC Dec 12, 2014 $132,000
Enterprise IT Security Manager Actuant Corporation Menomonee Falls, WI Jan 26, 2015 $130,000
IT Consulting SAP Security Senior Manager Protiviti Inc. San Francisco, CA Dec 10, 2015 $129,210 -
Manager, IT Security Risk & Compliance SONY Pictures Entertainment Inc. Culver City, CA Nov 20, 2015 $120,890 -
Information Technology-Security Manager Howard University Washington, DC Dec 12, 2011 $120,000
Manager, IT Security, Risk and Compliance SONY Pictures Entertainment Inc. Culver City, CA Jun 02, 2014 $118,000
Manager, IT Governance/Heightened Security Alvarez & Marsal Holdings LLC New York, NY Nov 08, 2014 $116,132
Manager, IT Security Parexel International Hackensack, NJ Oct 09, 2016 $115,031
Manager, IT Security Protiviti, Inc. Philadelphia, PA Oct 26, 2015 $108,000 -
Information Technology Security Manager The Shield, Inc. New York, NY Oct 01, 2010 $98,068
IT Security and Compliance Manager/Analyst Servicenow, Inc. Santa Clara, CA Dec 28, 2015 $93,579 -
IT Consulting Security Manager Protiviti Inc. Boston, MA Nov 21, 2016 $91,312 -
Regional IT & Logistical Security Manager, Americas Oberthur Technologies of America Corp East Rancho Dominguez, CA Feb 13, 2015 $90,522
Manager, IT Security-Optum Optum Services, Inc. Golden Valley, MN Aug 03, 2015 $89,731 -
Manager IT Security Checkfree Services Corporation (A Fiserv Company) Norcross, GA Sep 06, 2015 $88,296 -
IT Security Manager Parexel International Hackensack, NJ Sep 20, 2015 $87,904

No Results

To get more results, try adjusting your search by changing your filters.

Show More

Top Skills for An Information Technology Security Manager


Show More

Top Information Technology Security Manager Skills

  1. Procedures
  2. Network Infrastructure
  3. Information Security Policies
You can check out examples of real life uses of top skills on resumes here:
  • Monitored and routinely audits compliance to all information security procedures and policies, and ensures consistency of internal controls across departments.
  • Analyze existing operations and make recommendations for the improvement and growth of the network infrastructure.
  • Led development, documentation and maintenance of information security policies, procedures, and standards across city departments.
  • Conducted security assessments on OS, network and application vulnerability assessments to identify security weaknesses and provide potential solutions.
  • Performed security audits, risk/vulnerability assessments of networks, systems, and applications.

Top Information Technology Security Manager Employers

Information Technology Security Manager Videos

DEFCON 17: Effective Information Security Career Planning

A day in the life of IT security

Information Security & Risk Management