Search Salaries

Click on job titles to view salary data, or select 2 jobs to compare.

Salaries

View salary and benefits information

Manages a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Manages the security integration plans to protect existing infrastructure and to incorporate future solutions. Reviews and implements action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cyb more...



Alternate job titles: Cyber Incident Response Manager |

The Cyber Security Manager administers all aspects of technical incident response from initiation to conclusion. Manages the team responsible for investigating and responding to cyber incidents. Being a Cyber Security Manager manages and coordinates all efforts to contain and resolve the incident. Assesses the nature of the incident and determines what resources are needed to resolve the situation. In addition, Cyber Security Manager reviews reports and other documentation to make recommendations on improvements to eliminate risks. Ensures established policies, procedures, and methodologies ar more...


Directs a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Utilizes the latest tools, techniques, and training in cyber security architecture to create and design the organization's cyber security policies and procedures. Assists in the development of the organization's strategic vision for cyber security architecture and establishes priorities and strategies consistent with business goals. Partners with stakeholders to encourage the adoption of sec more...


Leads a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Utilizes the latest tools, techniques, and training in cyber security architecture to create and design the organization's cyber security policies and procedures. Develops the organization's strategic vision for cyber security architecture and establishes priorities and strategies consistent with business goals. Partners with stakeholders to encourage the adoption of security-compatible softwa more...



Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information more...


Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information more...



Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information more...


Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information more...


Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information more...



Supervises a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Assists in the development of security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information and event management (SEIM), data loss prevention (DLP), intrusi more...


Hot Topics for HR Professionals

Make Pay Fair

CompAnalyst gives you the insights you need to easily balance internal pay equity and external competitiveness. You can perform a deep analysis with a few clicks and quickly identify equity issues, flight risks, and other real-time insights that help you get pay right and win the war for talent.

Price Jobs with Confidence

Accurate job descriptions are fundamental to getting pay right. JobArchitect ensures that you are working with comprehensive, approved job descriptions so you can feel confident that you are pricing jobs accurately.

Our CompAnalyst integration makes it simple to publish job descriptions for use within the Market Pricing and Salary Structure modules ensuring accurate pricing and consistency across locations and departments.

Industry Surveys

Get comprehensive, reliable US compensation data for your specific industry, company size, and labor market.

Browse our complete catalog, showcasing more than 30 regional and global surveys with all the information and data points you need to get pay right.

Hot Topics for Job Salary Data

Adjust Employee Salary

Individualize employee pay based on unique job requirements and personal qualifications.

Price My Industry Jobs

Get the latest market pricing for benchmark jobs and jobs in your industry.

For Employers

Individualize employee pay based on unique job requirements and personal qualifications.

Get the latest market pricing for benchmark jobs and jobs in your industry.

For Employees

Analyze the market and your qualifications to negotiate your salary with confidence.

Search thousands of open positions to find your next opportunity.