IT Security Manager Job Description

$ 4.99

Included in these items:MORE SAVINGS

IT Policies and Procedures Template Manual $ 495.00
How to Write Job Descriptions Guide $ 14.99

IT Security Manager Job Description Template Word


Are you looking for a comprehensive and customizable IT Security Manager Job Description Template? Look no further than Bizmanualz! Our IT Security Manager Job Description Template Word product is the perfect solution for businesses looking to hire a skilled and experienced IT Security Manager.

Our template includes all the essential job duties and responsibilities that an IT Security Manager should perform, such as developing and implementing security policies and procedures, conducting risk assessments, managing security incidents, and ensuring compliance with industry regulations and standards.

With our IT Security Manager Job Description Template Word product, you can easily customize the job description to fit your specific business needs. You can add or remove job duties and responsibilities, adjust the required qualifications and experience, and tailor the job description to match your company culture and values.

Our template is also designed to be user-friendly and easy to use. It comes in a Microsoft Word format, which means you can easily edit and customize the template using your preferred word processing software. You can also save the template as a PDF or print it out for easy reference.

Overall, our IT Security Manager Job Description Template Word product is an essential tool for any business looking to hire a skilled and experienced IT Security Manager. With our customizable template, you can ensure that you find the right candidate for the job and protect your business from potential security threats.


The Information Technology Security Manager ensures that the risk to the organization’s information posed by a variety of cyber threats (cyber attacks; theft or corruption from within; etc.) is minimized. The IT Security Manager ensures that when cyber attacks occur or data are stolen or compromised, these incidents are dealt with promptly and effectively and the chance of that particular type of incident recurring is minimized.


  • Research the latest information technology security trends.
  • Monitor their organization’s networks for security breaches and investigate violations when they occurs.
  • Help to design, implement, and maintain the organization’s cyber-security plan.
  • Develop and direct implementation of security standards and best practices for the organization.
  • Direct the installation and use of security tools (e.g., firewalls, data encryption), to protect sensitive information.
  • Recommend security enhancements to IT Management.
  • Help computer technicians, end users when they need to install or learn about new security products and/or procedures.
  • Ensure that IT security audits are conducted periodically or as needed (e.g., when a security breach occurs).


Reports directly to the IT Manager (IT Director, CTO, etc.). Works in conjunction with organizational functions/departments to ensure employees are aware of cyber-security issues, are trained in good cyber-security practices, and are practicing safe/secure data collection, data transfers and storage, and use of social media, mobile devices, and apps, among others.


The IT Security Manager Job Description is mentioned in the following procedures:

Procedure ID and Name

Policies & Procedures Manual

ITAD107 Computer and Internet Usage Policy IT Policies and Procedures Templates
ITAD108 Email Policy Computer & Network (IT)
ITSD101 IT Threat / Risk Assessment Computer & Network (IT)
ITSD102 IT Security Plan Computer & Network (IT)
ITSD104 IT Disaster Recovery Computer & Network (IT)
ITSD105 Computer Malware Computer & Network (IT)
ITSD106 IT Access Control Computer & Network (IT)
ITSD107 IT Security Audits Computer & Network (IT)
ITSD108 IT Incident Handling Computer & Network (IT)
ITTS105 IT User/Staff Training Plan Computer & Network (IT)
ITAD102 IT Records Management Computer & Network (IT)
ITSD103 IT Media Storage Computer & Network (IT)
ITSD104 IT Disaster Recovery Computer & Network (IT)


A bachelor’s degree in information technology or computer science is required. 10 years of related work experience, with 3 or more in an information security management position, is also required.

Excellent communication skills and the ability to work well with people at every level and in every department are essential. Candidates with certification in information security (CISSP, CSSLP, CCFP, CISM, etc.) or comparable work experience will be given preference. Risk analysis/assessment experience a plus.

Experience with Microsoft Windows Server/Unix server required. Microsoft Project experience preferred.


Ability to communicate orally with vendors, management, and coworkers is crucial. Regular use of phone (mobile device) and email for communication is essential. Hearing and vision correctable to within normal ranges is essential for normal conversations, receiving ordinary information, and preparing or inspecting documents.

The ability to remain in a stationary position roughly 50% of the time, as well as the ability to move about the office occasionally (accessing files/storage, office equipment, computers and other office productivity devices, attending meetings, etc.), is required.

Using a computer while sitting for extended periods is common. Must also be able to position self to relocate or maintain equipment, including under tables and desks.

No heavy lifting is expected, though occasional exertion of 20 lbs. or less of force (e.g., picking up and carrying laptops, peripheral / network devices) may be required. Good manual dexterity required to use common office equipment (e.g., computers, mobile devices, calculators, copiers, scanners).


The job is performed indoors in a traditional office setting. Extended periods of sitting while using a computer or other devices are common.


There are no reviews yet.

Be the first to review “IT Security Manager Job Description”

Your email address will not be published. Required fields are marked *

You may also like…