Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

33
Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS

Transcript of Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Page 1: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

THE ‘A TO Z’ ONCOMPUTING CAREERS

Page 2: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

Contents

1. The IT Field – Who Does the Jobs and are There Any Jobs Out There ?

2. Reporting Structure

3. IT Functional Areas

4. IT Leadership

5. Choosing an IT Organization

6. Helpful Hints

2

Page 4: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

2012 – 2022 Projected Employment

MOST JOB GROWTH REPLACEMENTS NEEDED

4

Page 5: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

Occupations with the most job growth, 2012 to projected 2022

5

2012 National Employment Matrix Title

Employment Change 2012 -22Median Annual

$ Wage2012 2022 Number Percent

Home health aides 875,100 1,299,300 424,200 48.5 20,820

Medical secretaries 525,600 714,900 189,200 36.0 31,350

Medical assistants 560,800 723,700 162,900 29.0 29,370Licensed practical and licensed vocational nurses 738,400 921,300 182,900 24.8 41,540

Construction laborers 1,071,100 1,331,000 259,800 24.3 29,990

Carpenters 901,200 1,119,400 218,200 24.2 39,940Software developers, Applications 613,000 752,900 139,900 22.8 90,060

Nursing assistants 1,479,800 1,792,000 312,200 21.1 24,420

Registered nurses 2,711,500 3,238,400 526,800 19.4 65,470

Management analysts 718,700 852,500 133,800 18.6 78,600

Accountants and auditors 1,275,400 1,442,200 166,700 13.1 63,550

*Excerpt from http://www.bls.gov/emp/ep_table_104.htm

Page 6: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

Replacement Needs, 2012 to projected 2022

2012 National Employment Matrix Title Replacement needs, projected 2012-20 2012 Employment

2012-22 Replacement

Rate

2012-22 Replacement

Needs

Computer and mathematical occupations 3,814,700 16.3 622,700 Computer & information research scientists 26,700 15.7 4,200 Computer systems analysts 520,600 15.7 81,800 Information security analysts 75,100 15.7 11,800 Computer programmers 343,700 26.1 89,800 Software developers, applications 613,000 12.8 78,600 Software developers, systems software 405,000 12.8 51,900 Web developers 141,400 15.7 22,200 Database administrators 118,700 18.9 22,400 Network and computer systems administrators 366,400 15.7 57,600 Computer network architects 143,400 15.7 22,500 Computer user support specialists 547,700 15.7 86,100 Computer network support specialists 174,600 15.7 27,400

Computer occupations, all other 205,800 15.7 32,300

Mathematical science occupations 132,400 25.6 33,900 Actuaries 24,300 28.4 6,900Mathematicians 3,500 24.8 900Operations research analysts 73,200 22.5 16,500 Statisticians 27,600 31.7 8,700

*Excerpt from Employment Projections program, U.S. Department of Labor, U.S. Bureau of Labor Statistics

6

Page 7: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

LET’S DO THE ADDITION

New Application Developers 139,000Replacement IT Jobs 670,000

Almost 1,000,000 new Computing Field jobs by 2022… Projected by the Department of Labor

Page 8: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

LET’S TAKE A QUICK LOOK

WHAT MAKES A PROFESSIONAL IN COMPUTING?

Page 9: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

Computing Professionals

COMMON MAJORS

• Computer Science (CSC)

• Management Information Systems (MIS)

• Business Analytics

• Mathematics

• Statistics

• Actuarial

• Computer Security

• Networking

• Information Technology

• Software Engineering

POSSIBLE PERSONALITY TRAITS

• Curious

• Analytical

• Creative problem solvers

• Possess strong technical abilities

9

Page 10: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

2. REPORTING STRUCTURE

Page 11: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

Reporting Structure

11

President/CEO

Sales & Marketing

Information Technology

President/CEO

Business

Finance

Marketing

Operations

IT

Manufacturing

Page 12: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

MAJOR AREAS

3. IT FUNCTIONAL AREAS

Page 13: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

IT Functional Areas

IT OPERATIONS DIVISIONS

• Installs and maintains all hardware, platform software, and networking.

• Supports operations of all hardware, networking, telecommunications, and specialized services.

• Provides customer service.

IT DEVELOPMENT DIVISION

• SDLC specification, design, development, and the testing of the software

• Software support.

• IT Project management.

ENTERPRISE ARCHITECTURE DIVISION

• Provides strategic technology solutions.

• Governs the company’s technology standards.

• Plots IT infrastructure and the future platform of the organization.13

Page 14: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

Other IT Functional Areas

SECURITY• Protects classified information • Prevents unauthorized access.• Implements security measures and monitors networks.• Researches potential risks of vulnerability in networks.• Threat Modeling – Threats from multiple agents

RISK ANALYSIS• Defines and analyzes potential dangers• Aligns technology with business objectives.• Business Recovery (BRC)

DATA ANALYTICS• Inspects data to discover useful information.• Delivers business insights with the use of big data• Maximizes business results through data and analytics

14

Page 15: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

IT Functional Areas

IT OPERATIONS DIVISION

• Help desk services

• Server Operations

• Web Administration

• Mainframe Operations

• Desktop Operations

15

Page 16: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

IT Functional Areas

IT OPERATIONS DIVISION

• Networking Operations

• Telecommunications

• Database Administration

• Staging/Test Environments

• Operation Metrics Change and process management

• Specialized Operations

16

Page 17: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

IT Functional Areas

IT DEVELOPMENT DIVISION

• Program Management

• Project Management

• Software Design

• Software Development

• Software Tester

• Test Environments

• SW Production Support

17

Page 18: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

IT Functional Areas

ENTERPRISE ARCHITECTURE DIVISION

• System Architecture Infrastructure Planning & Design Strategic Business Solutions

• Technology Research Standardization Governance

18

Page 19: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

IT Functional Areas

DATA SECURITY

• Ethical Hackers

• Application Security

• Desktop Administrator

• Firewall Security Administrator

• Information Security Engineer

RISK ANALYSIS

• Information Risk Analyst

• Network Defense Analyst

• Model Validation Risk Officer

DATA ANALYTICS

• Data Analysis Specialist

• Business Analyst

• Data Operations Analyst

19

Page 20: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

4. IT LEADERSHIP

Page 21: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

IT Leadership – The Chief Information Officer (CIO)

KEY RESPONSIBILITIES

• Define, update, and implement IT strategy

• Control over technology budget

• Follow IT System Development Methodology (SDM)

• Coordinate IT processes across the enterprise

21

Page 22: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

IT Leadership – The Chief Security Officer (CSO) (CISO)

KEY RESPONSIBILITIES

• Develop, implement and manage the organization’s security vision

• Focuses on risk reduction

• Respond to incidents and outside audits

• Limit exposure to Financial risks

Physical risks

Personal risk

• Technology stack - Security Network, Application, Mobile and Data

22

Page 23: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

IT Leadership – The Division Director

23

KEY RESPONSIBILITIES

• Provides technical direction

• Creates division’s annual budget

• Develop department policies

• Ensure technology is accessible and up to date

• Research current and potential resources and services

Page 24: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

IT Leadership – The Department Manager

KEY RESPONSIBILITIES

• Manage IT and computer systems and/or applications

• Assist with staff selection and training

• Monitor/support technology and applications

• Work directly with staff

• Staff reviews and appraisals

24

Page 25: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

5. CHOOSING AN IT ORGANIZATION

Page 26: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

IT Organization

ENDS OF THE SPECTRUM

• Company size

• Employee demographics

• Reporting structure

• The business

• Location

26

Page 27: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

The Global Market – Effects on IT

INCREASED

• Need for language/communication skills

• Need for domestic mid-level and high-level IT skills

• Need for sophisticated collaboration tools

• Coverage 24/7

• Corporate diversity and tolerance

• Turnover of staff (due to off-shore job-hopping, cultural traditions)

DECREASED

• Focus on quality (TQM)

• Seamless communication

• Geographical boundaries

• Staff morale

27

Page 28: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

Consulting vs Fulltime

28

Consulting Fulltime

Experience • 5 years or more • Entry level and above

Knowledge • Specialized skill• Established reputation

• Entry level and above

Stability • Generally lower • Generally higher

Turnover Rate • Generally higher • Generally lower

Salary • Generally higher • $20,000 - $160,000

Benefits • Generally None • Multiple

Page 29: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

Summary

CHOOSE

• Industry

• Company size

• Location

DECIDE

• Immediate target position

• Five-year target position

• Interest in a management path

29

Page 30: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

CNY OpportunitiesLARGE

• BNY Mellon, AXA (Financial)

• JP Morgan Chase (Banking)

• Blue Cross/Blue Shield (Insurance)

• Lockheed Martin (Defense)

• Carrier Corp (Manufacturing)

• Bristol-Myers (Pharmaceutical)

• Wipro (It Consulting)

SMALL/MID/PRIVATELY OWNED• Sensis Corp (Defense/Military)• Syracuse Research Corp. (Defense)• POMCO (Insurance)• Utica National (Insurance)• SU (Academic) • Utica College (Academic)• MVCC (Academic)• Carroll’s Corp (Food Service)• Upstate Medical Center (Healthcare) • Rome Memorial Hospital (Medical)• Ajilon (Outsourcing)• Spherion (Outsourcing)• Adecco Technical (Placement)• ISSI (Placement)• Black River (System Engineering)• AIS (Cyber Security)

30

Page 31: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

6. HELPFUL HINTS

Page 32: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Information Security Identification: Confidential

What are Employers Looking For? SET YOURSELF APART

• Resume – Your foot in the door

• Interview

• Dress the part

• T A L K

• Have a couple of questions

ONCE YOU ARE HIRED• LISTEN – Opportunities come quietly

• Look for a mentor

• Be OPEN

• Continue to Learn

• Have realistic expectations

32

Good jobs have long lines of people waiting for them

Page 33: Information Security Identification: Confidential THE ‘A TO Z’ ON COMPUTING CAREERS.

Questions?