SBN

Information Security Manager Salary in 2019

Introduction

The role of information security manager combines high-level vision and understanding of information security skills with management skills. In terms of the big picture, information security managers are normally the head of the information security team or department that they work in (only being outranked by Chief Information Security Officer or department director). At the micro level, information security managers make the higher-level decisions and resource allocations while leaving the hands-on IT and information security tasks to the other team members.

Typically, information security managers need to have five to 10 years of experience in cybersecurity or computer security before they earn their stripes for this position.

Information Security Manager Prerequisites

The career path of an information security manager varies: there is no one path towards this position. Rather, it is where several different-but-related career paths funnel into. Interestingly enough, you may find this position with another name – including Cybersecurity Manager, Information Systems Manager, Systems Security Director, Systems/Applications Security Manager and IT Security Director just to name a few. Regardless of the name of this position, a bachelor’s degree is required, preferably in information security, IT or computer science.

Along the “no set career path” lines, you can start with gaining experience in a number of ways (at least for the first few years). Many have earned their first experience in information security by working as an A+ technician with a heavy focus on information security. My first experience was as a help desk analyst for a non-profit organization for a few years, then I worked as a cybersecurity analyst while moonlighting in development for a few more. Within six years I reached the level of information security manager: a slightly different title, but the same job.

Earning certifications is a great idea to move toward this position (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/RNxmzHdC9UI/