Information Security Manager Skills and Traits

Introduction

One of the most sought-after information security positions available today is that of information security manager. Information security managers are integral components of any successful information security department or team. This article will detail the skills and traits that an effective, competent information security manager will possess and ultimately use on a near-daily basis.

This article will be divided into two general categories — Information Security Manager Skills and Information Security Manager Traits. The Skills section documents the type of skills that a candidate for information security manager should expect to have picked up, either on the job or through their education. The Traits section documents a more intangible, soft set of skills that the candidate has most likely discovered about himself or herself before applying for the position. In other words, if you have not noticed the traits expected of a good information security manager in yourself by this time, you probably will not be the strongest candidate for this position or will need to make up the deficiencies in other areas.

Background of an Information Security Manager

To define the skills and traits that an information security professional should have picked up at this point begs one serious question: What sort of educational and professional experience prerequisites exist for the information security manager?

Information security managers need at least a bachelor’s degree in an information security- or IT-related discipline. Some organizations will hire you on with just a bachelor’s degree in any field for your first information security job. Other organizations may require a master’s degree in an information security-related field to offset a bachelor’s degree with a non-technical degree.

In terms of professional experience in the field, you will generally want to have at least five years of information security experience before you are qualified for (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/fbLJSy2OTts/