Chief Information Security Officer Average Salary

Job Satisfaction

We have no job satisfaction data for this job. Do you work as Chief Information Security Officer ? Start the survey
national salary data
National Employer Data
There is not enough data available to display this chart. Is this your job? Help us build our database by providing information about this job title. Start here.

Chief Information Security Officer Job Listings

Job Description for Chief Information Security Officer

Chief information security officers oversee information systems and company security for their organization. This person is expected to evaluate, report on, and suggest new ideas related to any security threats that the company currently faces, helping protect vital information and strategies. The chief information security officer typically works with a team that he or she has appointed to effectively develop the steps necessary to protect the company’s interests. Further this person must provide advice and leadership related to existing administrative security policies; this could include auditing the current systems in place, as well as directing and implementing new standards.

Generally, employers require or prefer at least a bachelor's degree in information security, computer science, or a related field; a master's degree may be required or preferred. At least seven to 10 years’ experience with information technology (IT) security is also needed. Additionally, strong communication and organizational skills are required, as well as a willingness to adopt a flexible schedule, as security threats may arise at any time. An advanced understanding of IT systems and computer programming is required for this position, as these professionals are essential in maintaining the company's privacy and proprietary data. Additionally, chief information security officers must be able to stay up to date with the evolving demands of technological infrastructure.
Chief Information Security Officer Tasks
  • Maintain procedures, standards, and policies to protect the privacy and integrity of data.
  • Ensure compliance with regulations and security policies.
  • Provide information and training regarding information technology and security systems.
  • Develop contingency plans and manage security breaches.
  • Supervise development and application of security procedures and protocols.

Key Stats

5-9 years
10-19 years

Subscribe to Our Newsletter

Salary and career advice to put you a step ahead.

newsletter icon

Get Career Tips & Advice