Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss


The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become A Security Program Manager

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As A Security Program Manager

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $90,120

    Average Salary

What Does A Security Program Manager Do At Microsoft Corporation

* Design/Develop new security centric features for secure access environments from customer requests, competitive landscape, or leveraging product functionality for the roadmap.
* Track and provide status on project progress and against schedule, including all risks, issues, and mitigation plans
* Responsible for the global implementation of core security services from design to dogfooding to production
* Manage the work of cross-functional teams implementing a technology that involves multiple components, interfaces, and groups
* Collaborate with other feature PM’s on security centric technologies, features, and solutions
* Own all program and project management components for assigned features including schedule, 1pager, feature functional specs, budget and feature prioritization

What Does A Security Program Manager Do At Leidos

* Coordinates security requirements to support employees, systems, and products
* Provides USG level technical expertise concerning industrial security, physical security and information security
* Interprets security policy on matters pertaining to processing, dissemination, and controlling of classified materials
* Coordinates security issues with program management and members of the IC as required to support systems and products in SCIF and collateral environments
* Conducts staff assistance visits and facility reviews and renders recommendations and possibly impact statements
* Develops solutions and conveys to internal and external customers, as required, in implementing security requirements
* Updates and maintains appropriate records of facility reviews and security processes
* Prepares and delivers briefings to internal and external customers

What Does A Security Program Manager Do At Jacobs

* Planning and executing multi-faceted large scale and enterprise wide IT projects in accordance with client policies and regulations, IC Directive 503, and system life cycle best practices.
* Establishing clear roles, responsibilities, lines of authority, communications, and accountability among contractor staff in their interaction with their government counterparts.
* Utilization of program and project management best practices.
* Identifying staff development and training needs and ensure that training, mentoring, and hands-on assistance is available to raise the talent/skill level of contract and client staff as appropriate.
* This position is contingent upon contract award.
* Qualifications

What Does A Security Program Manager Do At Salesforce.Com, Inc.

* Translate business objectives into execution strategy (tactical and strategic), lead and successfully execute the strategy through strong collaboration and agile leadership.
* Working with multiple delivery teams to take ownership and accountability of technical project planning and delivery for security and infrastructure build out programs.
* Develop trusted relationships with key technology, functional leaders and stakeholders to drive focus on the strategic program objectives and optimize program delivery.
* This includes supporting and holding resources accountable for their responsibilities within the program.
* Ensure data is collected to appropriately inform decision making for mitigating risks and resolving issues.
* Utilize internal tools and agile mindset to create a collaborative environment that fosters autonomy, transparency, mastery, innovation and learning; promotes continuous improvement.
* Drive a continuous focus on developing software based solutions or using automation to replace repeatable, operational tasks.
* Anticipate and aggressively remove obstacles that slow down or prevent programs from delivering on program objectives.
* Drive for clarity to keep teams moving forward.
* Provide "go to" leadership, transparency and visibility to the entire Technology & Products organization.
* Seek to continuously grow by proactively seeking and embracing constructive feedback.
* Providing the same level of feedback to colleagues to encourage an open and collaborative culture.
* Monitor and resolve end-to-end process for things like: repeating pain points/sticking points, blockers.
* Build plans and mitigations to address pain points to ensure the alacrity of the cloud and/or program

What Does A Security Program Manager Do At Hire It People, LLC

* Establish
* the NERC CIP Compliance Program and adapt (and modify as needed) to the KCP
* L Projects Governance Model as defined by the KCP & L Projects
* Controls Office.
* Manage
* program to highest quality and standards, and ensure program components are
* consistent KCP & L NERC CIP Compliance vision and mission.
* Bring
* NERC CIP Compliance implementation uniformity to KCP&L Transmission &
* Distribution, Power Generation and Information Technology divisions.
* Bring
* NERC, FERC and Regional Entities NERC CIP Compliance perspective to CLIENT
* divisional Subject Matter Experts (SMEs).
* Establish
* Program level executive reporting model per CLIENT standards.
* Create
* and periodically present to CLIENT Executives, CIP Steering Committee and
* Stakeholders a consolidated summarized and transparent program level
* view/reports of:
* o
* Program/Projects
* Execution
* Plan & Schedule
* Work Breakdown
* Structure
* Resource Allocations
* Dependencies
* Critical Paths and
* Completion Status
* Milestone Map
* o
* Success,
* Issues, Risks and Solutions
* o
* Integration
* Generation, Transmission and Information Technology)
* o
* Budgets
* and Forecasts
* Create and Ensure NERC
* CIP Projects Controls are implemented and reported for:
* o
* Budget
* and Cost
* o
* Scope
* and Schedule
* o
* Risk
* and Issues
* o
* Quality
* and Resource Management
* o
* Communications,
* Escalations and Reporting
* o
* Coordinate
* with Project Controls Office to escalate and represent program/project issues.
* Establish
* a Compliance Information Technology and Information Security
* verification/quality-assurance plan.
* Periodically
* provide consolidated view of verification/quality-assurance plan execution to
* the key stakeholders.
* Ensure
* the projects are prioritized based on CLIENT Compliance Risk and Operational
* Generation, Transmission and Information Technology) availability and
* adaptability.
* Track
* industry movement and bring impact view of regulatory changes to CLIENT NERC
* CIP Program, Stakeholders and Executives.
* Ensure
* CLIENT’s compliance burden is minimum at all levels without compromising
* compliance obligation.
* Ensure
* internal compliance control program for NERC CIP Standards is established in a
* manner that can be practiced by Substations, Power Plants and Controls Systems
* staff.
* Prepare
* and provide guidance for Regional Entity and Third Party audits to demonstrate
* compliance with NERC CIP Standards.
* Create
* and implement remediation and corrective action plans for compliance areas of
* concerns.
* Coordinate
* and Assist in investigation of compliance areas of concerns.
* Work
* closely with Technical and Procedural compliance teams to ensure solutions are
* designed to meet compliance obligations for current and future NERC CIP
* versions in Transmission, Generation and Information Technology.
* Develop
* and Implement a NERC CIP Compliance Governance Model for Information
* Technology, Transmission & Distribution and Generation.
* Provide
* technical and compliance guidance to meet NERC Compliance Monitoring and
* Enforcement Program (CMEP) for Generation, Transmission and Information
* Technology divisions.
* Define
* NERC CIP Compliance Projects objectives, budgets and oversee quality control
* throughout execution.
* This
* subject area will be led by a NERC CIP Project Manager who will plan &
* direct schedules and monitor budget & spending, and organize external and
* internal project activities, ensure completion of the projects on schedule and
* within budget.
* The NERC CIP Project Manager will work closely with NERC CIP
* Program Manager and CLIENT Project Controls and IS Compliance Office to plan
* and execute projects according to the established best practices and expected
* rigor.
* The primary responsibilities may include but not limited to:
* Direct
* the work of team members to assure technical and financial milestones are met.
* Direct
* and manage project development from beginning to end including defining project
* scope, goals and deliverables that support NERC CIP Compliance goals.
* Adhere
* and adapt to CLIENT Project Controls Implementation Methodology to ensure
* uniformity in execution and reporting.
* Identify
* and implement Project Controls specific to NERC CIP Projects.
* Develop
* and maintain ful-scale Project Execution Plan(PEP) that includes:
* o
* Detailed
* Milestones and Tasks Identification & Scheduling
* o
* Resource
* Scheduling and Allocation
* o
* Work
* Breakdown Structure
* o
* Change
* Control Protocols
* o
* Issues
* Logs
* o
* Risk
* Matrix
* o
* Critical
* Path
* o
* Project
* Dependencies
* o
* Quality
* Control Plans
* Create
* and Provide weekly reports for each project that includes project data for CLIENT
* and Suppliers including Client and other third Parties:
* o
* Resource
* Scope
* o
* Time
* Summary (allocated, actual and forecasted)
* o
* Financials
* budgeted, actuals, forecasted)
* o
* Issues
* Risks
* o
* Tasks
* Completion Status
* o
* Quality
* Assurance/Check
* o
* Other
* reports deemed necessary by NERC CIP Program Manager
* Effectively
* communicate project expectations to CLIENT team members and stakeholders.
* Draft
* and submit project change requests, change reasons & necessities and
* recommend time, resource and budget impacts.
* Track
* project milestones and deliverables.
* Proactively
* manage changes in project scope, identity potential crises, and devise
* contingency plans.
* Work
* with the Project team, including sub-contractors and sub-consultants, to identify
* the technical and process solutions to be employed and deliverables that will
* be furnished at the completion of the Project.
* Schedule
* and assign resources to verify that Project objectives and schedule are
* achieved.
* Review Project expenditures, coordinate with
* program management team, and actively manage the Project budget.
* Identify
* NERC CIP Compliance risks and improvement areas.
* Ensure
* milestones and tasks are driven to achieve and demonstrate compliance by
* Standards Effective Dates.
* Create
* and maintain a consolidated NERC CIP compliance project plan covering efforts
* for:
* o
* Information
* Technology – Planning & Active Management
* V3 – Remediation
* Implementation Plans
* V3 – Annual Compliance
* Obligations
* V3 – Audit Preparations
* V3
* Self Certification
* V3
* Post Audit Mitigation Plans
* V4/V5 – Transition
* Plans
* o
* Transmission & Distribution
* V3 – Audit Readiness
* Active Management
* V4/V5 – Analysis
* Active Management
* V4/V5 – Controls
* Implementation & Verification
* Budgeting &
* Planning
* Active Management
* o
* Generation
* V4/V5 – Implementation
* Verification
* Budgeting &
* Planning
* Active

Show More

Show Less

How To Become A Security Program Manager

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.


Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.


Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Security Program Manager jobs

Add To My Jobs

Security Program Manager Demographics


  • Male

  • Female

  • Unknown



  • White

  • Hispanic or Latino

  • Asian

  • Unknown

  • Black or African American

Show More

Languages Spoken

  • Spanish

  • French

  • German

  • Italian

  • Portuguese

  • Persian

  • Tagalog

  • Russian

  • Croatian

Show More

Security Program Manager

Unfortunately we don’t have enough data for this section.

Security Program Manager Education

Security Program Manager

Unfortunately we don’t have enough data for this section.

Job type you want
Full Time
Part Time

Real Security Program Manager Salaries

Job Title Company Location Start Date Salary
Senior Security Program Manager Microsoft Corporation Redmond, WA Mar 06, 2015 $158,100
Senior Security Program Manager Microsoft Corporation Redmond, WA Jun 03, 2015 $158,100
Senior Security Program Manager Microsoft Corporation Redmond, WA Aug 20, 2015 $157,722
Security Program Manager Microsoft Corporation Sunnyvale, CA Mar 24, 2014 $153,275
Security Program Manager Vmware, Inc. Palo Alto, CA Aug 13, 2015 $152,901
Senior Security Program Manager Microsoft Corporation Redmond, WA Jan 08, 2016 $152,360
SR. Security Program Manager Microsoft Corporation Redmond, WA Jul 10, 2016 $152,360 -
Security Program Manager Microsoft Corporation Redmond, WA Jun 03, 2013 $150,000
Senior Security Program Manager Microsoft Corporation Bellevue, WA May 14, 2012 $150,000
Senior Security Program Manager Microsoft Corporation Redmond, WA Nov 15, 2016 $147,756
Senior Security Program Manager Microsoft Corporation Bellevue, WA Aug 06, 2012 $145,000
Senior Security Program Manager Microsoft Corporation Redmond, WA Sep 04, 2011 $143,795
Senior Security Program Manager Microsoft Corporation Redmond, WA Jul 01, 2014 $142,740
Senior Security Program Manager Microsoft Corporation Redmond, WA Jan 13, 2014 $141,500
Senior Security Program Manager Microsoft Corporation Redmond, WA Jan 12, 2012 $140,000
Senior Security Program Manager Microsoft Corporation Redmond, WA Aug 12, 2015 $131,950
Security Program Manager Microsoft Corporation Redmond, WA Aug 20, 2012 $128,000
Security Program Manager Microsoft Corporation Redmond, WA Aug 23, 2015 $127,360
Senior Security Program Manager Microsoft Corporation Redmond, WA Mar 18, 2013 $124,000
Senior Security Program Manager-Mscis or Other Microsoft Corporation Redmond, WA May 01, 2015 $124,000 -
Security Program Manager Microsoft Corporation Redmond, WA Apr 06, 2015 $122,190
Security Program Manager II-CNE BG or Other Microsoft Corporation Redmond, WA Jan 13, 2016 $122,109 -
Security Program Manager Microsoft Corporation Redmond, WA Apr 07, 2015 $122,109
Senior Security Program Manager Vmware, Inc. Palo Alto, CA Oct 01, 2010 $121,200 -
Security Program Manager Microsoft Corporation Redmond, WA Sep 16, 2015 $119,913
Security Program Manager Microsoft Corporation Redmond, WA Jul 12, 2013 $116,422
Security Program Manager Microsoft Corporation Redmond, WA Aug 31, 2015 $116,113
Security Program Manager Microsoft Corporation Redmond, WA Mar 10, 2016 $116,000

No Results

To get more results, try adjusting your search by changing your filters.

Show More

Top Skills for A Security Program Manager


Show More

Top Security Program Manager Skills

  1. Security Program
  2. Ensure Compliance
  3. Security Personnel
You can check out examples of real life uses of top skills on resumes here:
  • Operated and maintained Air Force information security programs.
  • Inspected facilities to identify security risks and to ensure compliance with all relevant government and local requirements.
  • Trained security personnel on security operations, policies, procedures and use of security equipment.
  • Performed changes, updates and distribution of required security procedures for 350 posted security/law enforcement forces.
  • Provide dedicated support and management for the Chief Information Security Officers activities within the organization.

Top Security Program Manager Employers

Show More

Security Program Manager Videos

A Day In The Life Of Aparna Prabhakar, Technology Innovation Program Manager

Career Advice on becoming an IT Project Manager by Madeline N (Full Version)

Emergency Management and Homeland Security - FEMA Career