×
Register Here to Apply for Jobs or Post Jobs. X

Information Security Manager; On-Site, IL

Job in Palos Hills, Cook County, Illinois, 60465, USA
Listing for: Inside Higher Ed
Full Time position
Listed on 2026-02-15
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Salary/Wage Range or Industry Benchmark: 125000 - 150000 USD Yearly USD 125000.00 150000.00 YEAR
Job Description & How to Apply Below
Position: Information Security Manager (On-Site, IL)

Please note that sponsorship is not available. Employees must reside in IL/IN or reciprocal state.

Job Title

Information Security Manager (On-Site, IL)

Department

Infrastructure & Network Services

Work Location

ALL SITES

Duties

Under the general guidance of the Director of Infrastructure and Network Services, the Information Security Manager is responsible for developing, implementing, and maintaining the college’s cybersecurity program to safeguard its information assets against cyber threats and data breaches. This role involves managing critical resources including executive support, budgetary funding, and managing security personnel to advance the college’s information security goals and reduce institutional risk.

The manager advises senior leadership on any changes that impact the college’s cybersecurity posture and ensures that all security enhancements are properly evaluated, verified, and implemented.

The Information Security Manager collaborates with the Information Technology department and other units to detect security violations and coordinate an effective response. They lead efforts to implement protective or corrective measures when cybersecurity incidents or vulnerabilities arise and oversee the development and application of policy standards to ensure alignment with cybersecurity regulations and best practices. Ongoing compliance with internal policies, procedures, laws, and regulations is a key responsibility.

Additionally, the manager promotes cybersecurity awareness and ensures that strong security principles are embedded in the college’s strategic vision and institutional goals.

ESSENTIAL DUTIES AND RESPONSIBILITIES

Other duties may be assigned.

  • Oversee security operations, including the supervision and management of technical personnel.
  • Utilize intrusion detection methods and techniques to identify threats at both the host and network levels.
  • Ensure compliance with applicable laws, regulations, and legal procedures related to cybersecurity and data protection.
  • Develop and implement security policies and procedures.
  • Document system configurations and troubleshooting guidelines.
  • Perform security assessments using tools and techniques to identify system vulnerabilities.
  • Monitor vulnerability intelligence, including alerts, advisories, bulletins, and errata.
  • Evaluate, test, and implement new system and software releases to ensure secure and stable deployments.
  • Collaborate with vendors and third‑party support teams to address contracts, support, and security‑related needs.
  • Collect, analyze, and maintain data required for cybersecurity reporting and auditing.
  • Promote a strong cybersecurity posture and training to stakeholders across all levels of the college.
  • Ensure cybersecurity considerations and requirements are integrated into the organization’s business continuity and disaster recovery planning.
  • Assess and approve development activities to verify that baseline security measures are properly implemented.
  • Provide cybersecurity related input for statements of work (SOWs), contracts, and other procurement documents to ensure security requirements are addressed.
  • Support the budget planning process and provide informed recommendations.
Education / Experience
  • Bachelor’s degree required. Bachelor’s degree in Cybersecurity or related field.
  • Minimum of five (5) years of experience in IT security operations, threat detection, and incident response.
  • Prior experience supervising or managing an IT security or related team.
  • Demonstrated ability to analyze and approach applications methodically.
Qualifications
  • Proficient in developing and executing incident response plans for a wide range of cyber threats, including ransomware, business email compromise, malware infections, DDoS attacks, and unauthorized system access.
  • Proficient in threat analysis and conducting vulnerability assessments; cybersecurity frameworks such as CIS and NIST; proficient in conducting IT audits to assess security posture and compliance.
  • Knowledgeable in cloud security practices and controls, with a preference for experience in Microsoft cloud environments; firewall solutions, including their configuration, management, and role in network…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary