Cybersecurity Manager/Administrator

The Cybersecurity Manager/Administrator role includes a variety of advanced-level information security positions focused on overseeing security systems and teams. This role requires an advanced understanding of information security concepts, security operations and information assurance, as well as risk management and project management skills. The Cybersecurity Manager/Administrator is one of three advanced-level, core cybersecurity roles mapped directly to the National Initiative for Cybersecurity Education’s CyberSeek model.

Overview

Common Job Titles
  • Information Security Manager
  • Security Administrator
  • Information Systems Security Officer
  • Information Security Officer
  • Information Systems Security Officer ISSO
U.S. Job Openings
  • 14,320
Related Experience
  • Networking
  • Software Development
  • Systems Engineering
Skills Needed
  • Information Security
  • Information Systems
  • Information Assurance
  • Linux
  • Network Security
  • Project Management
  • Vulnerability Assessment
  • NIST Cybersecurity Framework
  • Security Operations

Start Learning Today

Get Certified

Certification Training

(ISC)² Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP)

Live Boot Camp | On-demand Training

The Certified Information Systems Security Professional (CISSP) certification path teaches you the necessary skills and best practices to effectively create and execute enterprise-wide information security strategies. You need five years of professional experience in the information security field to achieve the CISSP, but you can become an Associate of (ISC)² by passing the exam without experience.

Certification Training

(ISC)² Information Systems Security Management Professional (CISSP-ISSMP)

Information Systems Security Management Professional (CISSP-ISSMP)

Live Boot Camp

The Information Systems Security Management Professional (CISSP-ISSMP) certification path focuses on deeper managerial elements, such as project management, risk management, setting up and delivering a security awareness program, and managing a business continuity planning program. In addition to passing the exam, you must have a CISSP and two years cumulative paid work experience in ISSMP domain areas to achieve certification.

Certification Training

(ISC)² Certified Cloud Security Professional (CCSP)

Certified Cloud Security Professional (CCSP)

Live Boot Camp | On-demand Training

The Certified Cloud Security Professional (CCSP) certification path teaches you the fundamentals of the cloud computing architecture framework and how to evaluate and implement appropriate controls around cloud services. You need five years of professional experience in the information security field to achieve the CCSP, but you can become an Associate of (ISC)² by passing the exam without experience.

Certification Training

ISACA Certified in Risk and Information Systems Control (CRISC)

Certified in Risk and Information Systems Control (CRISC)

Live Boot Camp | On-demand Training

The Certified in Risk and Information Systems Control (CRISC) certification path teaches you how to design, implement, monitor and maintain risk-based, efficient and effective IS controls. In addition to passing the exam, you need three years of cumulative work experience in IT risk management and IS control to achieve the CRISC.

Certification Training

ISACA Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM)

Live Boot Camp | On-demand Training

The Certified Information Security Manager (CISM) certification path is geared towards individuals who manage, design, oversee or assess an enterprise’s information security. In addition to passing the exam, you need five years of information security work experience to achieve the CISM.

Certification Training

ISACA Certified in the Governance of Enterprise IT (CGEIT)

Certified in the Governance of Enterprise IT (CGEIT)

Live Boot Camp

The Certified Information Privacy Manager (CIPM) certification path is designed for professionals in privacy and data protection roles. You'll learn privacy and data protection practices related to the development, measurement and improvement of a privacy program.

Certification Training

CompTIA Advanced Security Practitioner (CASP+)

CompTIA Advanced Security Practitioner (CASP+)

Live Boot Camp | On-demand Training

The CompTIA Advanced Security Practitioner (CASP+) certification path teaches you the skills required to conceptualize, design and engineer secure solutions across complex enterprise environments. In addition to passing the exam, you need ten years of professional working experience in IT administration, with at least five of those years specifically focused on hands-on technical security.

Certification Training

PMI Project Management Professional (PMP)

Project Management Professional (PMP)

Live Boot Camp

The Project Management Professional (PMP) certification path teaches you how to initiate, plan, execute, monitor and close a project. In addition to passing the exam, you need either five years’ professional project management experience or three years of experience and a Bachelor's degree to achieve the PMP.

Certification Training

IAPP Certified Information Privacy Professional/ Europe (CIPP/E)

Certified Information Privacy Professional/ Europe (CIPP/E)

Live Boot Camp

The Certified Information Privacy Professional/Europe (CIPP/E) certification professionals in privacy and data protection roles with comprehensive knowledge and understanding of the European Union General Data Protection Regulation (GDPR), European legislative framework and other important topics, such as the EU-US Privacy Shield.

Improve Your Skills

Skill Training

Cybersecurity Management

Cybersecurity Management On-demand Training

Coming Soon!

The Cybersecurity Management skills path teaches you governance and risk management related to cybersecurity. You'll learn about developing and managing a security program, enterprise security operations, incident management, compliance and more.

Skill Training

Cybersecurity Administration

Cybersecurity Administration On-demand Training

Coming Soon!

The Cybersecurity Administration skills path covers a variety of high-level tasks related to cybersecurity, including implementing identity and access management, understanding asset security, integrating enterprise security, performing assessments and more.

Skill Training

IT and IS Governance

IT and IS Governance On-demand Training

Coming Soon!

The IT and IS Governance skills path teaches you a framework for the strategic management of enterprise IT. You'll learn benefits realization, the optimization of risk and resources, and information security governance.

Skill Training

Privacy and Data Protection Management

Privacy and Data Protection Management On-demand Training

Coming Soon!

The Privacy and Data Protection Management skills path teaches you how to implement concepts related to asset security and privacy management.

Skill Training

Cloud Security Management

Cloud Security Management On-demand Training

Coming Soon!

The Cloud Security Management skills path teaches you important security issues related to cloud services, including legal and compliance issues as well as the security of cloud infrastructure, data and applications.

Skill Training

Project Management

Project Management On-demand Training

Coming Soon!

The Project Management skills path teaches you important concepts such as IT strategy, third-party oversight and integration roadmaps for new products and vendors

Skill Training

Enterprise Risk Management

Enterprise Risk Management On-demand Training

Coming Soon!

The Enterprise Risk Management skills path covers essential enterprise risk topics, such as risk identification and assessment, response, reporting, optimization and more.

What Our Students Are Saying

"Sitting the CISSP class and taking the exam helped me understand the managerial side of security much better. It showed me the best ways to communicate security best practices with leadership and express the importance of security from an operational perspective."

Joe Wauson

Cyber Operations Planner

See More Testimonials