Search Salaries

Click on job titles to view salary data, or select 2 jobs to compare.

Salaries

View salary and benefits information
Alternate job titles: Information Security Manager | InfoSec Manager | IS Security Manager

The Data and Cyber Security Manager manages IS security analysts to ensure that all applications are functional and secure. Responsible for developing and managing Information Systems cyber security, including disaster recovery, database protection and software development. Being an Data and Cyber Security Manager implements procedures and methods for auditing and addressing non-compliance to information security standards. Develops and delivers IS security standards, best practices, architecture and systems to ensure information system security across the enterprise. In addition, Data and Cyb more...



Alternate job titles: Information Security Analyst IV | Information Systems Security Analyst IV | Information Vulnerability/Risk Analyst IV | InfoSec Intrusion Investigation Analyst IV | IS and Cyber Security Professional - Senior Specialist

The Data Security Analyst IV collaborates with a team of information security analysts to provide subject matter expertise on application development, database design, and network maintenance. Designs and implements information security standards for applications and databases. Being an Data Security Analyst IV assesses client needs against security concerns and resolves information security risk issues. Researches and advocates the latest technologies and solutions to support the security requirements of internal and external customers. In addition, Data Security Analyst IV trains security aw more...


Alternate job titles: Information Security Analyst V | Information Systems Security Analyst V | Information Vulnerability/Risk Analyst V | InfoSec Intrusion Investigation Analyst V | IS and Cyber Security Professional - Expert Team Lead

The Data Security Analyst V designs and implements information security standards for applications and databases. Identifies potential information and network or internet security vulnerabilities. Being an Data Security Analyst V ensures site security and provides consultation on security issues staying abreast of current malware and other potential internet security threats. Conducts analysis, investigates and recommends security technologies. In addition, Data Security Analyst V typically requires a bachelor's degree. Typically reports to a manager. Being an Data Security Analyst V works on more...


Alternate job titles: Information Security Analyst III | Information Systems Security Analyst III | Information Vulnerability/Risk Analyst III | InfoSec Intrusion Investigation Analyst III | IS and Cyber Security Professional - Senior

The Data Security Analyst III protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst III understands internet architecture and firewall configuration to protect system security. Works with end users to determine needs of individual departments. In addition, Data Security Analyst III may need to authorize user access and familiar with domain structures and digital signatures. Requires a bachelor's degree or more...



Alternate job titles: Information Security Analyst II | Information Systems Security Analyst II | Information Vulnerability/Risk Analyst II | InfoSec Intrusion Investigation Analyst II | IS and Cyber Security Professional - Intermediate

The Data Security Analyst II protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst II implements policies or procedures and tracks compliance throughout the organization. Works with end users to determine needs of individual departments. In addition, Data Security Analyst II typically requires a bachelor's degree or its equivalent. Typically reports to a manager. Being an Data Security Analyst II gains exp more...


Alternate job titles: Information Security Supervisor | InfoSec/Access Control Supervisor

The Data and Cyber Security Supervisor implements standards and audit procedures to identify and resolve security violations. Supervises professionals in the development, implementation, and maintenance of standards and systems that will ensure secure information systems and data. Being a Data and Cyber Security Supervisor may require a bachelor's degree in area of specialty. Conducts disaster recovery and cyberattack preparation and training. In addition, Data and Cyber Security Supervisor typically reports to a manager or head of a unit/department. The Data and Cyber Security Supervisor supe more...



Alternate job titles: Information Security Analyst I | Information Systems Security Analyst I | Information Vulnerability/Risk Analyst I | InfoSec Intrusion Investigation Analyst I | IS and Cyber Security Professional - Entry

The Data Security Analyst I protects against unauthorized access, modification, or destruction. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst I implements policies or procedures and tracks compliance throughout the organization. Works with end users to determine needs of individual departments. In addition, Data Security Analyst I typically requires a bachelor's degree or its equivalent. Typically reports to a manager. Being an Data Security Analyst I works on projects/matters of limited complexity in a support more...


Alternate job titles: Data and Cyber Security Manager | InfoSec Manager | IS Security Manager

Responsible for developing and managing Information Systems cyber security, including disaster recovery, database protection and software development. Manages IS security analysts to ensure that all applications are functional and secure. Develops and delivers IS security standards, best practices, architecture and systems to ensure information system security across the enterprise. Implements procedures and methods for auditing and addressing non-compliance to information security standards. Migrates non-compliant environments to compliant environments. Evaluates the organization to ensure co more...


Alternate job titles: Cyber Infrastructure Security Manager

Responsible for designing, implementing, and maintaining security measures to support the information and data security needs of the company's Web presence. Researches and evaluates new or improved security measures to implement for Web systems' security. Requires a bachelor's degree. Typically reports to a manager or head of a unit/department. Typically manages through subordinate managers and professionals in larger groups of moderate complexity. Provides input to strategic decisions that affect the functional area of responsibility. May give input into developing the budget. Typically requi more...



Alternate job titles: Cyber Security Systems Design Manager

Manages a team of cybersecurity professionals that plan and design security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Designs action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybe more...


Hot Topics for HR Professionals

Make Decisions With Confidence

CompAnalyst delivers faster decision making, and new insights into your pay practices. You can explore new intersections between market, company, and employee data with enhanced data integrations.With powerful tools and streamlined workflows, you can price jobs quickly and access the information you need to get pay right.

Make it Simple

Creating job descriptions can be challenging, but it doesn't have to be.

With JobArchitect you can easily build and standardize your job descriptions using your existing content, format and branding or use one of the templates from our extensive library. And you can access CompAnalyst® job summaries or search across local job postings to write descriptions with ease.

To simplify things further, we make it easy to publish job postings from an approved job description.

Global Insights

Get comprehensive data and insights from your peers in the global pay markets you care about most. Connect your global teams to the pricing intelligence they need to recruit and retain talent in 100 countries.

Hot Topics for Job Salary Data

Adjust Employee Salary

Individualize employee pay based on unique job requirements and personal qualifications.

Price My Industry Jobs

Get the latest market pricing for benchmark jobs and jobs in your industry.

For Employers

Individualize employee pay based on unique job requirements and personal qualifications.

Get the latest market pricing for benchmark jobs and jobs in your industry.

For Employees

Analyze the market and your qualifications to negotiate your salary with confidence.

Search thousands of open positions to find your next opportunity.