Computing Jobs - A to Z final 2015

advertisement
THE
‘A TO Z’
ON
COMPUTING CAREERS
Information Security Identification: Confidential
Contents
1. The IT Field – Who Does the Jobs and are There Any Jobs Out There ?
2. Reporting Structure
3. IT Functional Areas
4. IT Leadership
5. Choosing an IT Organization
6. Helpful Hints
2
Information Security Identification: Confidential
1. WHO DOES IT ANYWAY?
LET’S TAKE A QUICK LOOK
Many people think IT staff are
Geeks, Nerds, Brainiacks
Even
“Mad Scientists”
2012 – 2022 Projected Employment
MOST JOB GROWTH
4
Information Security Identification: Confidential
REPLACEMENTS NEEDED
Occupations with the most job growth, 2012 to projected 2022
Employment
2012
2022
2012 National Employment Matrix Title
Change 2012 -22
Median Annual
Number
Percent
$ Wage
Home health aides
875,100
1,299,300
424,200
48.5
20,820
Medical secretaries
525,600
714,900
189,200
36.0
31,350
Medical assistants
Licensed practical and licensed
vocational nurses
560,800
723,700
162,900
29.0
29,370
738,400
921,300
182,900
24.8
41,540
1,071,100
1,331,000
259,800
24.3
29,990
Carpenters
901,200
1,119,400
218,200
24.2
39,940
Software developers, Applications
613,000
752,900
139,900
22.8
90,060
Nursing assistants
1,479,800
1,792,000
312,200
21.1
24,420
Registered nurses
2,711,500
3,238,400
526,800
19.4
65,470
718,700
852,500
133,800
18.6
78,600
1,275,400
1,442,200
166,700
13.1
63,550
Construction laborers
Management analysts
Accountants and auditors
*Excerpt from http://www.bls.gov/emp/ep_table_104.htm
5
Information Security Identification: Confidential
Replacement Needs, 2012 to projected 2022
2012 National Employment Matrix Title
Replacement needs, projected 2012-20
Computer and mathematical occupations
Computer & information research scientists
Computer systems analysts
Information security analysts
Computer programmers
Software developers, applications
Software developers, systems software
Web developers
Database administrators
Network and computer systems administrators
Computer network architects
Computer user support specialists
Computer network support specialists
Computer occupations, all other
Mathematical science occupations
Actuaries
Mathematicians
Operations research analysts
Statisticians
2012 Employment
2012-22
Replacement
Rate
3,814,700
26,700
520,600
75,100
343,700
613,000
405,000
141,400
118,700
366,400
143,400
547,700
174,600
205,800
16.3
15.7
15.7
15.7
26.1
12.8
12.8
15.7
18.9
15.7
15.7
15.7
15.7
15.7
622,700
4,200
81,800
11,800
89,800
78,600
51,900
22,200
22,400
57,600
22,500
86,100
27,400
32,300
132,400
24,300
3,500
73,200
27,600
25.6
28.4
24.8
22.5
31.7
33,900
6,900
900
16,500
8,700
*Excerpt from Employment Projections program, U.S. Department of Labor, U.S. Bureau of Labor Statistics
6
Information Security Identification: Confidential
2012-22
Replacement
Needs
LET’S DO THE ADDITION
New Application Developers
Replacement IT Jobs
139,000
670,000
Almost 1,000,000 new Computing Field jobs by 2022…
Projected by the Department of Labor
WHAT MAKES A PROFESSIONAL IN COMPUTING?
LET’S TAKE A QUICK LOOK
Computing Professionals
COMMON MAJORS
POSSIBLE PERSONALITY TRAITS
• Computer Science (CSC)
• Curious
• Management Information Systems
(MIS)
• Analytical
• Business Analytics
• Possess strong technical abilities
• Mathematics
• Statistics
• Actuarial
• Computer Security
• Networking
• Information Technology
• Software Engineering
9
Information Security Identification: Confidential
• Creative problem solvers
2. REPORTING STRUCTURE
Reporting Structure
President/
CEO
Sales &
Marketing
Information
Technology
Finance
Business
Marketing
President/CEO
IT
Operations
Manufacturing
11
Information Security Identification: Confidential
3. IT FUNCTIONAL AREAS
MAJOR AREAS
IT Functional Areas
IT OPERATIONS DIVISIONS
• Installs and maintains all hardware, platform software, and networking.
• Supports operations of all hardware, networking, telecommunications, and
specialized services.
• Provides customer service.
IT DEVELOPMENT DIVISION
• SDLC
 specification, design, development, and the testing of the software
• Software support.
• IT Project management.
ENTERPRISE ARCHITECTURE DIVISION
• Provides strategic technology solutions.
• Governs the company’s technology standards.
• Plots IT infrastructure and the future platform of the organization.
13
Information Security Identification: Confidential
Other IT Functional Areas
SECURITY
• Protects classified information
• Prevents unauthorized access.
• Implements security measures and monitors networks.
• Researches potential risks of vulnerability in networks.
• Threat Modeling – Threats from multiple agents
RISK ANALYSIS
• Defines and analyzes potential dangers
• Aligns technology with business objectives.
• Business Recovery (BRC)
DATA ANALYTICS
• Inspects data to discover useful information.
• Delivers business insights with the use of big data
• Maximizes business results through data and analytics
14
Information Security Identification: Confidential
IT Functional Areas
IT OPERATIONS DIVISION
• Help desk services
• Server Operations
• Web Administration
• Mainframe Operations
• Desktop Operations
15
Information Security Identification: Confidential
IT Functional Areas
IT OPERATIONS DIVISION
• Networking Operations
• Telecommunications
• Database Administration
• Staging/Test Environments
• Operation Metrics
 Change and process management
• Specialized Operations
16
Information Security Identification: Confidential
IT Functional Areas
IT DEVELOPMENT DIVISION
• Program Management
• Project Management
• Software Design
• Software Development
• Software Tester
• Test Environments
• SW Production Support
17
Information Security Identification: Confidential
IT Functional Areas
ENTERPRISE ARCHITECTURE DIVISION
• System Architecture
• Technology
 Infrastructure Planning & Design
 Research
 Strategic Business Solutions
 Standardization
 Governance
18
Information Security Identification: Confidential
IT Functional Areas
DATA SECURITY
RISK ANALYSIS
• Ethical Hackers
• Information Risk Analyst
• Application Security
• Network Defense Analyst
• Desktop Administrator
• Model Validation Risk Officer
• Firewall Security Administrator
DATA ANALYTICS
• Data Analysis Specialist
• Information Security Engineer
• Business Analyst
• Data Operations Analyst
19
Information Security Identification: Confidential
4. IT LEADERSHIP
IT Leadership – The Chief Information Officer (CIO)
KEY RESPONSIBILITIES
• Define, update, and implement IT strategy
• Control over technology budget
• Follow IT System Development
Methodology (SDM)
• Coordinate IT processes across the
enterprise
21
Information Security Identification: Confidential
IT Leadership – The Chief Security Officer (CSO) (CISO)
KEY RESPONSIBILITIES
• Develop, implement and manage the
organization’s security vision
• Focuses on risk reduction
• Respond to incidents and outside audits
• Limit exposure to
 Financial risks
 Physical risks
 Personal risk
• Technology stack - Security
 Network, Application, Mobile and Data
22
Information Security Identification: Confidential
IT Leadership – The Division Director
KEY RESPONSIBILITIES
• Provides technical direction
• Creates division’s annual budget
• Develop department policies
• Ensure technology is accessible and up
to date
• Research current and potential
resources and services
23
Information Security Identification: Confidential
IT Leadership – The Department Manager
KEY RESPONSIBILITIES
• Manage IT and computer systems
and/or applications
• Assist with staff selection and training
• Monitor/support technology and
applications
• Work directly with staff
• Staff reviews and appraisals
24
Information Security Identification: Confidential
5. CHOOSING AN IT ORGANIZATION
IT Organization
ENDS OF THE SPECTRUM
• Company size
• Employee demographics
• Reporting structure
• The business
• Location
26
Information Security Identification: Confidential
The Global Market – Effects on IT
INCREASED
• Need for language/communication skills
• Need for domestic mid-level and high-level IT skills
• Need for sophisticated collaboration tools
• Coverage 24/7
• Corporate diversity and tolerance
• Turnover of staff (due to off-shore job-hopping, cultural traditions)
DECREASED
• Focus on quality (TQM)
• Seamless communication
• Geographical boundaries
• Staff morale
27
Information Security Identification: Confidential
Consulting vs Fulltime
Consulting
Fulltime
Experience
• 5 years or more
• Entry level and above
Knowledge
• Specialized skill
• Established reputation
• Entry level and above
Stability
• Generally lower
• Generally higher
Turnover Rate
• Generally higher
• Generally lower
Salary
• Generally higher
• $20,000 - $160,000
Benefits
• Generally None
• Multiple
28
Information Security Identification: Confidential
Summary
CHOOSE
• Industry
• Company size
• Location
DECIDE
• Immediate target position
• Five-year target position
• Interest in a management path
29
Information Security Identification: Confidential
CNY Opportunities
LARGE
• BNY Mellon, AXA (Financial)
• JP Morgan Chase (Banking)
• Blue Cross/Blue Shield (Insurance)
• Lockheed Martin (Defense)
• Carrier Corp (Manufacturing)
• Bristol-Myers (Pharmaceutical)
• Wipro (It Consulting)
30
Information Security Identification: Confidential
SMALL/MID/PRIVATELY OWNED
• Sensis Corp (Defense/Military)
• Syracuse Research Corp. (Defense)
• POMCO (Insurance)
• Utica National (Insurance)
• SU (Academic)
• Utica College (Academic)
• MVCC (Academic)
• Carroll’s Corp (Food Service)
• Upstate Medical Center (Healthcare)
• Rome Memorial Hospital (Medical)
• Ajilon (Outsourcing)
• Spherion (Outsourcing)
• Adecco Technical (Placement)
• ISSI (Placement)
• Black River (System Engineering)
• AIS (Cyber Security)
6. HELPFUL HINTS
What are Employers Looking For?
SET YOURSELF APART
• Resume – Your foot in the door
ONCE YOU ARE HIRED
• LISTEN – Opportunities come quietly
• Interview
• Look for a mentor
• Dress the part
• Be OPEN
• TALK
• Continue to Learn
• Have a couple of questions
• Have realistic expectations
Good jobs have long lines of people waiting for them
32
Information Security Identification: Confidential
Questions?
Download