Post on 20-Jan-2016
Information Security Identification: Confidential
THE ‘A TO Z’ ONCOMPUTING CAREERS
Information Security Identification: Confidential
Contents
1. The IT Field – Who Does the Jobs and are There Any Jobs Out There ?
2. Reporting Structure
3. IT Functional Areas
4. IT Leadership
5. Choosing an IT Organization
6. Helpful Hints
2
LET’S TAKE A QUICK LOOK
1. WHO DOES IT ANYWAY?
Many people think IT staff are Geeks, Nerds, Brainiacks
Even “Mad Scientists”
Information Security Identification: Confidential
2012 – 2022 Projected Employment
MOST JOB GROWTH REPLACEMENTS NEEDED
4
Information Security Identification: Confidential
Occupations with the most job growth, 2012 to projected 2022
5
2012 National Employment Matrix Title
Employment Change 2012 -22Median Annual
$ Wage2012 2022 Number Percent
Home health aides 875,100 1,299,300 424,200 48.5 20,820
Medical secretaries 525,600 714,900 189,200 36.0 31,350
Medical assistants 560,800 723,700 162,900 29.0 29,370Licensed practical and licensed vocational nurses 738,400 921,300 182,900 24.8 41,540
Construction laborers 1,071,100 1,331,000 259,800 24.3 29,990
Carpenters 901,200 1,119,400 218,200 24.2 39,940Software developers, Applications 613,000 752,900 139,900 22.8 90,060
Nursing assistants 1,479,800 1,792,000 312,200 21.1 24,420
Registered nurses 2,711,500 3,238,400 526,800 19.4 65,470
Management analysts 718,700 852,500 133,800 18.6 78,600
Accountants and auditors 1,275,400 1,442,200 166,700 13.1 63,550
*Excerpt from http://www.bls.gov/emp/ep_table_104.htm
Information Security Identification: Confidential
Replacement Needs, 2012 to projected 2022
2012 National Employment Matrix Title Replacement needs, projected 2012-20 2012 Employment
2012-22 Replacement
Rate
2012-22 Replacement
Needs
Computer and mathematical occupations 3,814,700 16.3 622,700 Computer & information research scientists 26,700 15.7 4,200 Computer systems analysts 520,600 15.7 81,800 Information security analysts 75,100 15.7 11,800 Computer programmers 343,700 26.1 89,800 Software developers, applications 613,000 12.8 78,600 Software developers, systems software 405,000 12.8 51,900 Web developers 141,400 15.7 22,200 Database administrators 118,700 18.9 22,400 Network and computer systems administrators 366,400 15.7 57,600 Computer network architects 143,400 15.7 22,500 Computer user support specialists 547,700 15.7 86,100 Computer network support specialists 174,600 15.7 27,400
Computer occupations, all other 205,800 15.7 32,300
Mathematical science occupations 132,400 25.6 33,900 Actuaries 24,300 28.4 6,900Mathematicians 3,500 24.8 900Operations research analysts 73,200 22.5 16,500 Statisticians 27,600 31.7 8,700
*Excerpt from Employment Projections program, U.S. Department of Labor, U.S. Bureau of Labor Statistics
6
LET’S DO THE ADDITION
New Application Developers 139,000Replacement IT Jobs 670,000
Almost 1,000,000 new Computing Field jobs by 2022… Projected by the Department of Labor
LET’S TAKE A QUICK LOOK
WHAT MAKES A PROFESSIONAL IN COMPUTING?
Information Security Identification: Confidential
Computing Professionals
COMMON MAJORS
• Computer Science (CSC)
• Management Information Systems (MIS)
• Business Analytics
• Mathematics
• Statistics
• Actuarial
• Computer Security
• Networking
• Information Technology
• Software Engineering
POSSIBLE PERSONALITY TRAITS
• Curious
• Analytical
• Creative problem solvers
• Possess strong technical abilities
9
2. REPORTING STRUCTURE
Information Security Identification: Confidential
Reporting Structure
11
President/CEO
Sales & Marketing
Information Technology
President/CEO
Business
Finance
Marketing
Operations
IT
Manufacturing
MAJOR AREAS
3. IT FUNCTIONAL AREAS
Information Security Identification: Confidential
IT Functional Areas
IT OPERATIONS DIVISIONS
• Installs and maintains all hardware, platform software, and networking.
• Supports operations of all hardware, networking, telecommunications, and specialized services.
• Provides customer service.
IT DEVELOPMENT DIVISION
• SDLC specification, design, development, and the testing of the software
• Software support.
• IT Project management.
ENTERPRISE ARCHITECTURE DIVISION
• Provides strategic technology solutions.
• Governs the company’s technology standards.
• Plots IT infrastructure and the future platform of the organization.13
Information Security Identification: Confidential
Other IT Functional Areas
SECURITY• Protects classified information • Prevents unauthorized access.• Implements security measures and monitors networks.• Researches potential risks of vulnerability in networks.• Threat Modeling – Threats from multiple agents
RISK ANALYSIS• Defines and analyzes potential dangers• Aligns technology with business objectives.• Business Recovery (BRC)
DATA ANALYTICS• Inspects data to discover useful information.• Delivers business insights with the use of big data• Maximizes business results through data and analytics
14
Information Security Identification: Confidential
IT Functional Areas
IT OPERATIONS DIVISION
• Help desk services
• Server Operations
• Web Administration
• Mainframe Operations
• Desktop Operations
15
Information Security Identification: Confidential
IT Functional Areas
IT OPERATIONS DIVISION
• Networking Operations
• Telecommunications
• Database Administration
• Staging/Test Environments
• Operation Metrics Change and process management
• Specialized Operations
16
Information Security Identification: Confidential
IT Functional Areas
IT DEVELOPMENT DIVISION
• Program Management
• Project Management
• Software Design
• Software Development
• Software Tester
• Test Environments
• SW Production Support
17
Information Security Identification: Confidential
IT Functional Areas
ENTERPRISE ARCHITECTURE DIVISION
• System Architecture Infrastructure Planning & Design Strategic Business Solutions
• Technology Research Standardization Governance
18
Information Security Identification: Confidential
IT Functional Areas
DATA SECURITY
• Ethical Hackers
• Application Security
• Desktop Administrator
• Firewall Security Administrator
• Information Security Engineer
RISK ANALYSIS
• Information Risk Analyst
• Network Defense Analyst
• Model Validation Risk Officer
DATA ANALYTICS
• Data Analysis Specialist
• Business Analyst
• Data Operations Analyst
19
4. IT LEADERSHIP
Information Security Identification: Confidential
IT Leadership – The Chief Information Officer (CIO)
KEY RESPONSIBILITIES
• Define, update, and implement IT strategy
• Control over technology budget
• Follow IT System Development Methodology (SDM)
• Coordinate IT processes across the enterprise
21
Information Security Identification: Confidential
IT Leadership – The Chief Security Officer (CSO) (CISO)
KEY RESPONSIBILITIES
• Develop, implement and manage the organization’s security vision
• Focuses on risk reduction
• Respond to incidents and outside audits
• Limit exposure to Financial risks
Physical risks
Personal risk
• Technology stack - Security Network, Application, Mobile and Data
22
Information Security Identification: Confidential
IT Leadership – The Division Director
23
KEY RESPONSIBILITIES
• Provides technical direction
• Creates division’s annual budget
• Develop department policies
• Ensure technology is accessible and up to date
• Research current and potential resources and services
Information Security Identification: Confidential
IT Leadership – The Department Manager
KEY RESPONSIBILITIES
• Manage IT and computer systems and/or applications
• Assist with staff selection and training
• Monitor/support technology and applications
• Work directly with staff
• Staff reviews and appraisals
24
5. CHOOSING AN IT ORGANIZATION
Information Security Identification: Confidential
IT Organization
ENDS OF THE SPECTRUM
• Company size
• Employee demographics
• Reporting structure
• The business
• Location
26
Information Security Identification: Confidential
The Global Market – Effects on IT
INCREASED
• Need for language/communication skills
• Need for domestic mid-level and high-level IT skills
• Need for sophisticated collaboration tools
• Coverage 24/7
• Corporate diversity and tolerance
• Turnover of staff (due to off-shore job-hopping, cultural traditions)
DECREASED
• Focus on quality (TQM)
• Seamless communication
• Geographical boundaries
• Staff morale
27
Information Security Identification: Confidential
Consulting vs Fulltime
28
Consulting Fulltime
Experience • 5 years or more • Entry level and above
Knowledge • Specialized skill• Established reputation
• Entry level and above
Stability • Generally lower • Generally higher
Turnover Rate • Generally higher • Generally lower
Salary • Generally higher • $20,000 - $160,000
Benefits • Generally None • Multiple
Information Security Identification: Confidential
Summary
CHOOSE
• Industry
• Company size
• Location
DECIDE
• Immediate target position
• Five-year target position
• Interest in a management path
29
Information Security Identification: Confidential
CNY OpportunitiesLARGE
• BNY Mellon, AXA (Financial)
• JP Morgan Chase (Banking)
• Blue Cross/Blue Shield (Insurance)
• Lockheed Martin (Defense)
• Carrier Corp (Manufacturing)
• Bristol-Myers (Pharmaceutical)
• Wipro (It Consulting)
SMALL/MID/PRIVATELY OWNED• Sensis Corp (Defense/Military)• Syracuse Research Corp. (Defense)• POMCO (Insurance)• Utica National (Insurance)• SU (Academic) • Utica College (Academic)• MVCC (Academic)• Carroll’s Corp (Food Service)• Upstate Medical Center (Healthcare) • Rome Memorial Hospital (Medical)• Ajilon (Outsourcing)• Spherion (Outsourcing)• Adecco Technical (Placement)• ISSI (Placement)• Black River (System Engineering)• AIS (Cyber Security)
30
6. HELPFUL HINTS
Information Security Identification: Confidential
What are Employers Looking For? SET YOURSELF APART
• Resume – Your foot in the door
• Interview
• Dress the part
• T A L K
• Have a couple of questions
ONCE YOU ARE HIRED• LISTEN – Opportunities come quietly
• Look for a mentor
• Be OPEN
• Continue to Learn
• Have realistic expectations
32
Good jobs have long lines of people waiting for them
Questions?