The average salary for jobs that require the skills of Information Security Governance is $195,482 based on United States National Average.
Core compensation
Responsible for determining enterprise information security policy and strategy. Oversees the development, implementation, and enforcement of information security standards and procedures. Ensures that all information systems are functional correctly regarding secure policy. In charge of IT risk evaluations, audits, and security incident investigation. Requires a bachelor's degree. Typically repor... View job details
Ensures that all system platforms are functional and secure. Works with upper management to determine acceptable level of risk for enterprise computing platforms. Requires a bachelor's degree. Typically reports to top management. Typically manages through subordinate managers and professionals in larger groups of moderate complexity. Provides input to strategic decisions that affect the functional... View job details
Directs a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Utilizes the latest tools, techniques, and training in cyber security architecture to create and design the organization's cyber security policies and procedures. Assists in the development of t... View job details
Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future so... View job details
Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future so... View job details
Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future so... View job details
Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future so... View job details
Manages a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Manages the security integration plans to protect existing infrastr... View job details
Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future so... View job details
Oversees a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Approves the security requirements and the security integration plans to protect existing infrastructure and to incorporate future solutions. Reviews and approves the action plans for policy cr... View job details
Inform your career path by finding your customized salary.