Role Definition
| Field | Value |
|---|---|
| Job Title | Cybersecurity Manager (Information Security Manager / ISSO) |
| Seniority Level | Mid-Senior (7-12 years experience) |
| Primary Function | Oversees the organisation's cybersecurity program — develops and enforces security policies and procedures, manages security and IT specialists, conducts risk assessments, oversees security monitoring and incident response, runs staff security awareness training, manages compliance audits, and reports security posture to leadership. Responsible for the full breadth of the cybersecurity function at an operational-to-strategic level. |
| What This Role Is NOT | NOT a CISO (does not report to the board or set enterprise-wide strategy at the executive level). NOT a SOC Manager (does not manage a dedicated SOC team exclusively). NOT a Security Engineer (does not configure tools hands-on). NOT a GRC Analyst (does not execute compliance tasks). The Cybersecurity Manager sits between senior engineers and the CISO — program-level management, not executive governance or hands-on-keyboard work. |
| Typical Experience | 7-12 years. Typically progressed through analyst, engineer, or consultant roles. CISSP (Stage 4), CISM (Stage 5), GIAC certifications common. 70% hold a bachelor's degree, 20% graduate degree. |
Seniority note: A junior security team lead (3-5 years) with limited budget authority and no policy ownership would score Yellow — closer to a senior analyst with supervisory duties than a true manager. A CISO-track Director of Security would score closer to the CISO (83.0).
Protective Principles + AI Growth Correlation
| Principle | Score (0-3) | Rationale |
|---|---|---|
| Embodied Physicality | 0 | Fully digital, desk-based. Remote-capable. No physical component. |
| Deep Interpersonal Connection | 2 | Manages a security team — hiring, mentoring, performance management, professional development. Trains staff on handling sensitive data. Coordinates with IT, executive leadership, and business stakeholders. Not the deepest interpersonal role (not patient care or therapy), but team leadership and cross-functional communication are core to daily work. |
| Goal-Setting & Moral Judgment | 3 | Sets security policy direction and acceptable risk thresholds for the organisation. Makes judgment calls on risk acceptance, policy enforcement, and incident response priorities. Defines what the organisation SHOULD do about cybersecurity, not just executes prescribed rules. Accountable for security program outcomes. These are goal-setting decisions with real consequences. |
| Protective Total | 5/9 | |
| AI Growth Correlation | 1 | AI adoption creates new security management requirements — AI security policies, shadow AI governance, AI tool evaluation and deployment oversight. But AI also automates security monitoring and compliance tasks, potentially compressing team sizes. The Cybersecurity Manager gains new responsibilities but may oversee fewer specialists. Weak positive — role persists with expanded mandate, total headcount may not grow proportionally. |
Quick screen result: Protective 5/9 + Correlation 1 = Likely Yellow-to-Green boundary. Proceed to confirm.
Task Decomposition (Agentic AI Scoring)
| Task | Time % | Score (1-5) | Weighted | Aug/Disp | Rationale |
|---|---|---|---|---|---|
| Security policy development & enforcement | 25% | 2 | 0.50 | AUGMENTATION | AI drafts policy templates, maps regulatory requirements, identifies compliance gaps, and monitors policy adherence. The manager defines policy direction, sets organisational risk appetite, adapts policies to business context, and enforces through human judgment and authority. Strategic, accountable work. |
| Team management (hire, train, supervise, develop) | 20% | 1 | 0.20 | NOT INVOLVED | Hiring security specialists, performance reviews, mentoring, career development, conflict resolution, shift planning. Irreducibly human. AI cannot fire someone, coach an analyst through career growth, or build team culture. |
| Risk assessment & security audits | 15% | 3 | 0.45 | AUGMENTATION | AI scans for vulnerabilities, maps asset risks, generates compliance reports, scores threats, and gathers audit evidence. The manager interprets results, prioritises remediation, accepts residual risk, and presents findings to leadership. Significant AI acceleration in data collection; human leads judgment and decision. |
| Security monitoring & incident oversight | 15% | 3 | 0.45 | AUGMENTATION | AI handles alert triage, correlation, automated response playbooks, and initial incident analysis. The manager oversees the monitoring strategy, ensures escalation happens, coordinates incident response across departments, and makes containment decisions. Operational oversight, not hands-on triage. |
| Security awareness training program | 10% | 3 | 0.30 | AUGMENTATION | AI generates training content, conducts phishing simulations, tracks completion, measures effectiveness metrics. The manager designs the training strategy, ensures relevance to organisational risk profile, handles exceptions, and leads sensitive briefings on data handling. |
| Reporting to leadership on security posture | 10% | 3 | 0.30 | AUGMENTATION | AI generates dashboards, compiles security metrics, drafts executive summaries. The manager interprets results, provides business context, translates security data into risk language for leadership. Reporting is AI-accelerated; interpretation and delivery remain human. |
| Vendor & technology evaluation | 5% | 2 | 0.10 | AUGMENTATION | AI assists with market research, vendor benchmarking, feature comparison. The manager makes strategic procurement decisions, negotiates contracts, manages vendor relationships. Human judgment for tool selection with organisational context. |
| Total | 100% | 2.30 |
Task Resistance Score: 6.00 - 2.30 = 3.70/5.0
Displacement/Augmentation split: 0% displacement, 80% augmentation, 20% not involved.
Reinstatement check (Acemoglu): AI creates meaningful new tasks: AI security policy development, shadow AI discovery and governance, AI tool deployment oversight, AI-augmented workflow design, and AI vendor evaluation. These are net-new management responsibilities that did not exist 3 years ago. The role is transforming, not contracting.
Evidence Score
| Dimension | Score (-2 to 2) | Evidence |
|---|---|---|
| Job Posting Trends | 1 | 22,000 US job openings for cybersecurity manager titles (HAL local data). ISC2 reports 4.8M unfilled cybersecurity positions globally. BLS projects 29% growth for information security analysts 2024-2034 (aggregate, not manager-specific). Cybersecurity hiring rising ~12% annually. However, specific "Cybersecurity Manager" postings are harder to isolate — the title fragments across Security Manager, Information Security Manager, ISSO, and IT Security Manager. Growing but not surging at the manager level specifically. |
| Company Actions | 1 | Companies investing in cybersecurity programs. No companies cutting cybersecurity management roles citing AI. Some mid-market organisations creating dedicated cybersecurity management positions for the first time as compliance requirements grow (NIS2, SEC rules). However, Gartner predicts 20% of organisations will flatten middle management using AI by 2026 — the Cybersecurity Manager is middle management and partially exposed to this consolidation. |
| Wage Trends | 1 | Comparably: $125,374 avg. ZipRecruiter: $132,962/yr (Jan 2026). Glassdoor: $180,507 total comp. Salary.com: $142,340-$170,830. Motion Recruitment: cybersecurity salaries expected to surge ~10% in 2026. Wages growing above inflation, consistent with strong demand for cybersecurity leadership. Not surging at the rate of CISO compensation, but solidly positive. |
| AI Tool Maturity | 1 | AI tools automate what the team does (monitoring, compliance evidence gathering, vulnerability scanning, risk scoring), not what the manager does (policy setting, team leadership, risk acceptance, stakeholder communication). AI creates new management overhead — tool evaluation, AI governance, automation strategy. Tools augment the Cybersecurity Manager's decision-making but do not replace the management function. Gartner confirms 88% of security teams report significant time savings through AI. |
| Expert Consensus | 1 | Consensus: augmentation, not replacement, for cybersecurity leadership. Management functions — hiring, performance, strategy, risk acceptance, leadership reporting — remain human. "Future belongs to those who can harness strengths of both AI and human intelligence" (research.com). However, Gartner's middle management flattening prediction tempers the outlook — cybersecurity management has stronger accountability barriers than generic middle management, but the risk is not zero. Scored 1, not 2, because consensus is positive but qualified. |
| Total | 5 |
Barrier Assessment
Reframed question: What prevents AI execution even when programmatically possible?
| Barrier | Score (0-2) | Rationale |
|---|---|---|
| Regulatory/Licensing | 1 | No specific license required for cybersecurity management. However, NIS2, SEC cybersecurity disclosure rules, PCI DSS, HIPAA, and SOX increasingly mandate named human accountability for security programs. Organisations need a designated individual responsible for cybersecurity outcomes. Moderate barrier. |
| Physical Presence | 0 | Fully remote-capable. Most cybersecurity management can be conducted remotely. |
| Union/Collective Bargaining | 0 | Cybersecurity management is non-unionised, at-will employment in virtually all markets. |
| Liability/Accountability | 2 | When a breach occurs because security policies were inadequate, risk was improperly assessed, or monitoring failed, the Cybersecurity Manager is accountable. Regulatory penalties and litigation flow to named individuals. The role is the operational accountability layer — someone must own the security program and answer for failures. AI cannot bear this responsibility. Structural barrier. |
| Cultural/Ethical | 2 | Organisations require a human overseeing their cybersecurity program. The concept of an AI managing security policy, staff training, risk acceptance, and incident response with no human manager generates immediate resistance from boards, regulators, insurers, and employees. Security is a trust function — staff training on sensitive data handling, compliance attestations, and risk acceptance decisions all require human authority and accountability. |
| Total | 5/10 |
AI Growth Correlation Check
Confirmed at 1 from Step 1. The Cybersecurity Manager role has a weak positive correlation with AI growth. AI adoption creates new security management requirements — AI security policies, shadow AI governance, AI risk assessment oversight, and AI tool deployment decisions all flow to the cybersecurity management function. However, AI simultaneously automates monitoring, compliance, and audit tasks that the manager's team performs, potentially compressing team sizes. The net effect is positive but modest — the role persists with an expanded mandate, but total headcount may not grow proportionally with AI adoption. Does not qualify for Accelerated (+2 would require the role to exist BECAUSE of AI).
JobZone Composite Score (AIJRI)
| Input | Value |
|---|---|
| Task Resistance Score | 3.70/5.0 |
| Evidence Modifier | 1.0 + (5 × 0.04) = 1.20 |
| Barrier Modifier | 1.0 + (5 × 0.02) = 1.10 |
| Growth Modifier | 1.0 + (1 × 0.05) = 1.05 |
Raw: 3.70 × 1.20 × 1.10 × 1.05 = 5.1282
JobZone Score: (5.1282 - 0.54) / 7.93 × 100 = 57.9/100
Zone: GREEN (Green ≥48, Yellow 25-47, Red <25)
Sub-Label Determination
| Metric | Value |
|---|---|
| % of task time scoring 3+ | 50% |
| AI Growth Correlation | 1 |
| Sub-label | Green (Transforming) — ≥20% task time scores 3+ |
Assessor override: None — formula score accepted. Score sits 3.9 points below SOC Manager (61.8) and 9.7 points above the Green/Yellow boundary (48), consistent with a mid-level security management role with solid but not exceptional evidence.
Assessor Commentary
Score vs Reality Check
The 57.9 JobZone Score places the Cybersecurity Manager solidly in Green, 9.9 points above the Yellow boundary. All inputs converge without contradiction. The 3.9-point gap below the SOC Manager (61.8) reflects slightly lower task resistance (3.70 vs 3.80) and weaker evidence (+5 vs +6) — the SOC Manager has more emphatic expert consensus and more clearly defined market demand. The Cybersecurity Manager is a broader, more generic role that fragments across multiple job titles, making evidence harder to pinpoint. The score is not barrier-dependent — removing barriers entirely (5→0) would drop the score to ~52.6, still Green.
What the Numbers Don't Capture
- Title fragmentation dilutes market signal. "Cybersecurity Manager" fragments across Security Manager, Information Security Manager, ISSO, IT Security Manager, and Security Administrator (senior). Job posting data for any single title understates true demand for the function. The +1 job posting evidence score may be conservative.
- The CISO absorption risk. In smaller organisations, the CISO may absorb cybersecurity management directly rather than maintaining a separate manager. This is the mirror of the SOC Manager's absorption risk — when the security team is small enough, the CISO handles program management personally. This doesn't eliminate the work; it eliminates the dedicated position.
- Middle management flattening exposure. Gartner's prediction that 20% of organisations will use AI to flatten middle management by 2026 applies here. The Cybersecurity Manager IS middle management. However, security management has stronger accountability barriers (breach liability, regulatory mandates, compliance sign-off) than generic middle management — making AI-driven elimination less likely than in other management functions.
Who Should Worry (and Who Shouldn't)
If you are a Cybersecurity Manager at a mid-to-large enterprise with a team of 5+ specialists, policy ownership, budget authority, and clear reporting to a CISO or CTO — you are well-positioned. Your role is transforming but not threatened. AI compresses your team's tactical work but expands your strategic mandate. Learn AI security governance and you lead the transformation.
If you are a Cybersecurity Manager at a small organisation with 1-2 security staff — you face absorption risk. As AI automates monitoring and compliance tasks, the CISO or IT Director may absorb your management responsibilities. The standalone role becomes harder to justify when the team is too small to warrant dedicated management.
The single biggest factor: whether your organisation is large enough to justify a dedicated cybersecurity management position when AI compresses the operational tasks your team performs. At enterprise scale, the answer is clearly yes. At SMB scale, it depends on regulatory requirements and risk appetite.
What This Means
The role in 2028: The Cybersecurity Manager of 2028 spends less time on operational oversight (AI handles monitoring, compliance evidence, vulnerability scanning) and more time on AI security governance, policy adaptation for AI-driven threats, and strategic risk management. They manage a smaller team of senior specialists plus a fleet of AI security tools. New responsibilities include AI policy development, shadow AI discovery, and AI vendor governance. The management skills transfer directly; the managed environment is fundamentally different.
Survival strategy:
- Build AI security governance expertise now. Develop policies for AI use, shadow AI discovery, AI risk assessment. The Cybersecurity Manager who owns the AI governance program becomes indispensable.
- Master AI-augmented security operations. Deploy and tune AI tools for monitoring, compliance, and risk scoring. Demonstrate measurable improvements (faster audit cycles, reduced false positives, lower compliance costs).
- Strengthen upward communication. As AI generates more security data, leadership needs a manager who translates technical findings into business risk language. AI drafts the dashboards; you present the story and own the accountability.
Timeline: 7-10+ years. The role is structurally protected by accountability barriers and the persistent need for human security program leadership. The transformation is significant — daily work in 2028 looks materially different from 2024 — but the management function endures.