THE ‘A TO Z’ ON COMPUTING CAREERS Information Security Identification: Confidential Contents 1. The IT Field – Who Does the Jobs and are There Any Jobs Out There ? 2. Reporting Structure 3. IT Functional Areas 4. IT Leadership 5. Choosing an IT Organization 6. Helpful Hints 2 Information Security Identification: Confidential 1. WHO DOES IT ANYWAY? LET’S TAKE A QUICK LOOK Many people think IT staff are Geeks, Nerds, Brainiacks Even “Mad Scientists” 2012 – 2022 Projected Employment MOST JOB GROWTH 4 Information Security Identification: Confidential REPLACEMENTS NEEDED Occupations with the most job growth, 2012 to projected 2022 Employment 2012 2022 2012 National Employment Matrix Title Change 2012 -22 Median Annual Number Percent $ Wage Home health aides 875,100 1,299,300 424,200 48.5 20,820 Medical secretaries 525,600 714,900 189,200 36.0 31,350 Medical assistants Licensed practical and licensed vocational nurses 560,800 723,700 162,900 29.0 29,370 738,400 921,300 182,900 24.8 41,540 1,071,100 1,331,000 259,800 24.3 29,990 Carpenters 901,200 1,119,400 218,200 24.2 39,940 Software developers, Applications 613,000 752,900 139,900 22.8 90,060 Nursing assistants 1,479,800 1,792,000 312,200 21.1 24,420 Registered nurses 2,711,500 3,238,400 526,800 19.4 65,470 718,700 852,500 133,800 18.6 78,600 1,275,400 1,442,200 166,700 13.1 63,550 Construction laborers Management analysts Accountants and auditors *Excerpt from http://www.bls.gov/emp/ep_table_104.htm 5 Information Security Identification: Confidential Replacement Needs, 2012 to projected 2022 2012 National Employment Matrix Title Replacement needs, projected 2012-20 Computer and mathematical occupations Computer & information research scientists Computer systems analysts Information security analysts Computer programmers Software developers, applications Software developers, systems software Web developers Database administrators Network and computer systems administrators Computer network architects Computer user support specialists Computer network support specialists Computer occupations, all other Mathematical science occupations Actuaries Mathematicians Operations research analysts Statisticians 2012 Employment 2012-22 Replacement Rate 3,814,700 26,700 520,600 75,100 343,700 613,000 405,000 141,400 118,700 366,400 143,400 547,700 174,600 205,800 16.3 15.7 15.7 15.7 26.1 12.8 12.8 15.7 18.9 15.7 15.7 15.7 15.7 15.7 622,700 4,200 81,800 11,800 89,800 78,600 51,900 22,200 22,400 57,600 22,500 86,100 27,400 32,300 132,400 24,300 3,500 73,200 27,600 25.6 28.4 24.8 22.5 31.7 33,900 6,900 900 16,500 8,700 *Excerpt from Employment Projections program, U.S. Department of Labor, U.S. Bureau of Labor Statistics 6 Information Security Identification: Confidential 2012-22 Replacement Needs LET’S DO THE ADDITION New Application Developers Replacement IT Jobs 139,000 670,000 Almost 1,000,000 new Computing Field jobs by 2022… Projected by the Department of Labor WHAT MAKES A PROFESSIONAL IN COMPUTING? LET’S TAKE A QUICK LOOK Computing Professionals COMMON MAJORS POSSIBLE PERSONALITY TRAITS • Computer Science (CSC) • Curious • Management Information Systems (MIS) • Analytical • Business Analytics • Possess strong technical abilities • Mathematics • Statistics • Actuarial • Computer Security • Networking • Information Technology • Software Engineering 9 Information Security Identification: Confidential • Creative problem solvers 2. REPORTING STRUCTURE Reporting Structure President/ CEO Sales & Marketing Information Technology Finance Business Marketing President/CEO IT Operations Manufacturing 11 Information Security Identification: Confidential 3. IT FUNCTIONAL AREAS MAJOR AREAS IT Functional Areas IT OPERATIONS DIVISIONS • Installs and maintains all hardware, platform software, and networking. • Supports operations of all hardware, networking, telecommunications, and specialized services. • Provides customer service. IT DEVELOPMENT DIVISION • SDLC specification, design, development, and the testing of the software • Software support. • IT Project management. ENTERPRISE ARCHITECTURE DIVISION • Provides strategic technology solutions. • Governs the company’s technology standards. • Plots IT infrastructure and the future platform of the organization. 13 Information Security Identification: Confidential Other IT Functional Areas SECURITY • Protects classified information • Prevents unauthorized access. • Implements security measures and monitors networks. • Researches potential risks of vulnerability in networks. • Threat Modeling – Threats from multiple agents RISK ANALYSIS • Defines and analyzes potential dangers • Aligns technology with business objectives. • Business Recovery (BRC) DATA ANALYTICS • Inspects data to discover useful information. • Delivers business insights with the use of big data • Maximizes business results through data and analytics 14 Information Security Identification: Confidential IT Functional Areas IT OPERATIONS DIVISION • Help desk services • Server Operations • Web Administration • Mainframe Operations • Desktop Operations 15 Information Security Identification: Confidential IT Functional Areas IT OPERATIONS DIVISION • Networking Operations • Telecommunications • Database Administration • Staging/Test Environments • Operation Metrics Change and process management • Specialized Operations 16 Information Security Identification: Confidential IT Functional Areas IT DEVELOPMENT DIVISION • Program Management • Project Management • Software Design • Software Development • Software Tester • Test Environments • SW Production Support 17 Information Security Identification: Confidential IT Functional Areas ENTERPRISE ARCHITECTURE DIVISION • System Architecture • Technology Infrastructure Planning & Design Research Strategic Business Solutions Standardization Governance 18 Information Security Identification: Confidential IT Functional Areas DATA SECURITY RISK ANALYSIS • Ethical Hackers • Information Risk Analyst • Application Security • Network Defense Analyst • Desktop Administrator • Model Validation Risk Officer • Firewall Security Administrator DATA ANALYTICS • Data Analysis Specialist • Information Security Engineer • Business Analyst • Data Operations Analyst 19 Information Security Identification: Confidential 4. IT LEADERSHIP IT Leadership – The Chief Information Officer (CIO) KEY RESPONSIBILITIES • Define, update, and implement IT strategy • Control over technology budget • Follow IT System Development Methodology (SDM) • Coordinate IT processes across the enterprise 21 Information Security Identification: Confidential IT Leadership – The Chief Security Officer (CSO) (CISO) KEY RESPONSIBILITIES • Develop, implement and manage the organization’s security vision • Focuses on risk reduction • Respond to incidents and outside audits • Limit exposure to Financial risks Physical risks Personal risk • Technology stack - Security Network, Application, Mobile and Data 22 Information Security Identification: Confidential IT Leadership – The Division Director KEY RESPONSIBILITIES • Provides technical direction • Creates division’s annual budget • Develop department policies • Ensure technology is accessible and up to date • Research current and potential resources and services 23 Information Security Identification: Confidential IT Leadership – The Department Manager KEY RESPONSIBILITIES • Manage IT and computer systems and/or applications • Assist with staff selection and training • Monitor/support technology and applications • Work directly with staff • Staff reviews and appraisals 24 Information Security Identification: Confidential 5. CHOOSING AN IT ORGANIZATION IT Organization ENDS OF THE SPECTRUM • Company size • Employee demographics • Reporting structure • The business • Location 26 Information Security Identification: Confidential The Global Market – Effects on IT INCREASED • Need for language/communication skills • Need for domestic mid-level and high-level IT skills • Need for sophisticated collaboration tools • Coverage 24/7 • Corporate diversity and tolerance • Turnover of staff (due to off-shore job-hopping, cultural traditions) DECREASED • Focus on quality (TQM) • Seamless communication • Geographical boundaries • Staff morale 27 Information Security Identification: Confidential Consulting vs Fulltime Consulting Fulltime Experience • 5 years or more • Entry level and above Knowledge • Specialized skill • Established reputation • Entry level and above Stability • Generally lower • Generally higher Turnover Rate • Generally higher • Generally lower Salary • Generally higher • $20,000 - $160,000 Benefits • Generally None • Multiple 28 Information Security Identification: Confidential Summary CHOOSE • Industry • Company size • Location DECIDE • Immediate target position • Five-year target position • Interest in a management path 29 Information Security Identification: Confidential CNY Opportunities LARGE • BNY Mellon, AXA (Financial) • JP Morgan Chase (Banking) • Blue Cross/Blue Shield (Insurance) • Lockheed Martin (Defense) • Carrier Corp (Manufacturing) • Bristol-Myers (Pharmaceutical) • Wipro (It Consulting) 30 Information Security Identification: Confidential SMALL/MID/PRIVATELY OWNED • Sensis Corp (Defense/Military) • Syracuse Research Corp. (Defense) • POMCO (Insurance) • Utica National (Insurance) • SU (Academic) • Utica College (Academic) • MVCC (Academic) • Carroll’s Corp (Food Service) • Upstate Medical Center (Healthcare) • Rome Memorial Hospital (Medical) • Ajilon (Outsourcing) • Spherion (Outsourcing) • Adecco Technical (Placement) • ISSI (Placement) • Black River (System Engineering) • AIS (Cyber Security) 6. HELPFUL HINTS What are Employers Looking For? SET YOURSELF APART • Resume – Your foot in the door ONCE YOU ARE HIRED • LISTEN – Opportunities come quietly • Interview • Look for a mentor • Dress the part • Be OPEN • TALK • Continue to Learn • Have a couple of questions • Have realistic expectations Good jobs have long lines of people waiting for them 32 Information Security Identification: Confidential Questions?