Tag Archives: Infrastructure

Information Security Jobs Hot

Information Security Jobs Hot – Salaries start in the mid $70K range

Information Security Jobs with salaries ranging from $75k thru $210K. With the help of serveral client organization, Janco has designed a Information Security Job Family with pay ranges.  The data contains the entry level salaries, median and highest salaries for individuals in those positions.  The chart below depicts that information.

Information Security Jobs Hot

Information Security jobs are among some of the hardest to fill. As a result the salaries for this positions almost all within the low six figure range.

No longer are organizations are looking for just the CSO (Chief Security Officer), rather they are looking to fill out the infrastructure to support the CSO.

IT Job Family Classification

Both in an individual’s personal career planning and an enterprise’s staffing, promotion and compensation it is important to have benchmarks on the levels that individuals are at. To that end, one of the best objective ways to meet this goal is to have formal job descriptions and clear paths for promotion and compensation.

Order IT Job Family Classification Download Selected Pages

Job Description Bundles

Janco has developed job description bundles to aid in the recruting process.

For those clients who do not want to acquire the entire HandiGuide there is an option to select subsets of our complete offering. These subsets are focused around particular areas of interest and provide you a way to get the benefits of Janco’s expertise in a limited and lower cost manner. All of the bundles have been updated in the last few months. They include:

 

Please follow and like us
error

Depending on Goggle Risky

Depending on Goggle Risky

Depending on Goggle Risky

Independence is  a core requirement for IT Governance and Infrastructure definition.

Depending on Goggle Risky – Depending on Internet, hardware, and software companies is a mistake. Enterprises  are impacted as they drop product support, are purchased by other companies, and/or have security breaches and system failures of their own.

For example, Google – Customer who installed Haiku ceiling fans, which were supported  with the Nest thermostat device via the “Works with Nest” program were left out in the cold. This was driven by Google’s decision to end the program and go with the “Google Net”.  They said this was to focus on supporting its own hardware business.  As a result, there was a loss of support for any device on that program. Not a good omen for people who installed them in their homes.

Another similar situation occurred for Comcast email users. Users who had comcast.net email accounts were not made aware of the limitation of services that Comcast’s spam protection process effected. What happens is as an email is sent to a comcast user email account, if the email has multiple recipients, the email is placed on hold (based on the comcast user’s usage). The user is NOT notified that the email was held and not delivered. It is up to the sender to contact the user and re-send it with the email going to a single recipient.

The less that you depend on Internet companies for proprietary offerings, the more you can be assured that you can continue to operate when they change their corporate strategy.

How long will it be before a company like Goggle decides to charge for their free email services. Wait a minute they already do that with their offering G Suite.

Order IT Governance Infrastructure Strategy Download Selected Pages

Read on:

 

Please follow and like us
error

DevOps Job Descriptions

DevOps Job Descriptions Released

DevOps Job Descriptions were just released as a bundle. Both HR and IT have a critical role in addressing the expectations that the Executive Management has in the movement towards DevOps applications.

DevOps Job Descriptions

DevOps is a process which allows for the constant and evolving development of applications with new features and functionality added over time. This is without the traditional legacy SDM process of traditonal IT development and implementation.

The jobs descripions that are included in the bundle are:

  • Chief Digital Officer – CDO
  • Chief Experience Officer – CXO
  • Digital Brand Manager
  • Manager DevOps
  • DevOps Application Designer
  • DevOps Quality Control Specialist
  • DevOps Software Engineer
  • DevOps Version Control Specialist

There are more positions that will be added to this bundle as we continue to evaluate the roles that must be played in: planning, coding, building, testing, releasing, deploying, operating, and monitoring process of DevOps.

Read On   Order

DevOps Job Descriptions add to IT Job Family Classfication

In the bundle contains the full IT job family classification for all of these positions.  They have been added to the DevOps, Blockchain, and DLT job family.

DevOps Job FamilyRead On  Order IT Job Family Classification Download Selected Pages

See also:

Please follow and like us
error

IT Job Market Explodes

IT Job Market Explodes – Now over 3.6 Million Job in the United States

IT Job Market Explodes – IT Job Market had grown by 34% since 2010.  This year Janco forecast that the number of new IT jobs will expand by approximately 100K.

IT Job Market Explodes

As of July 2019, 56,800 new IT jobs were created YTD. The forecast for the reaming 5 months of the year is that on average 8,400 jobs will be added each month resulting in 42K new IT jobs

CIOs and CTOs continue to be optimistic and do not see the hiring trend slowing.  The only downside to this is the contraction in the number of telecommunication jobs. In the past ten (10) years the number of Tel-comm jobs has shrunk by 20% from 890K to 712K.

Historic Number of Jobs in the IT job marketTele-comm jobs are being eliminated as organizations automate the function and fewer individuals are need to accomplish the same tasks.  This is the same type of job elimination that occured in that industry when it automated switchboard operaters to electronic swithes.

IT Job Market Explodes – As economy improves IT jobs lead the way in job creation.

Demand for IT Professionals is now focused at the interface between the end user of the data and the data stored on the cloud or in secured legacy systems.  Blockchain, cyber-currency, security, and compliance skills are the one highest in demand.

Janco has updated its IT Governance book to reflect the impact of this.

Read On Order IT Governance Infrastructure Strategy Download Selected Pages

Read also

Please follow and like us
error

Comcast.net

Comcast.net Killing email Account

I recently discovered that Comcast.net email account are not getting all of the mail that is sent to them.

concast.netIn January of this year comcast.net has started to meter and REJECT emails to people who have a comcast.net email address.  Bud has a comcast.net email account and he Is not getting all of his emails.

Comcast says:

RL000002 :: Mail to Comcast is queued and I see RL000002 in my email logs. What does this mean?

Comcast has instituted rate limiting on all inbound email traffic. This step was taken to protect our customers and our email system from unwanted spam and malicious attacks. Any systems affected by this rate limit will receive a 4xx message (temp-fail) during the SMTP transaction. This message is designed to instruct the sending server to try again at a later time to deliver its email.

Our rate limiting policy is based on sender reputation and volume metrics, provided by Cloudmark, regardless of the number of domains from that server.

New IP addresses that are expected to send significant amounts of email to Comcast subscribers should start by sending low volumes of mail, increasing as time goes on. As your IP sends more email, its limit will increase daily.

If the rate-limit is impacting your ability to deliver email, shortening your server’s delivery retry interval should resolve the issue.

Translated the  reason why this is happening is one of the following

  1. He is on a distribution list (multiple recipients)
  2. There are more than 3 or 4 links to a web site in the email
  3. He has exceeded the number of emails he is allowed to receive based on the number of emails he got last month.

If you have any people in your address book that has a comcast.net email account the same is occurring to them as well.

The one suggestion that I have is that you tell them this is occurring.  All of the vendors want to charge for the services provided.  If you do not pay for your email account is some way you are at risk of losing connectivity.

Find a provider that gives you the email account for “life” and meets your security and privacy standards to protect t your own information.

Please follow and like us
error

Employment Still Strong — But

Employment Still Strong — But it may be slowing

Employment Still Strong — But not as strong as earlier.  In the past month one state dropped out of full employment status – Ohio.  Full employment as defined by Janco Associates is 4.0% or less.

Employment Still Strong -- But

There are 35 full employment states in May 2019. That is one less with Ohio’s unemployment rate going to 4.1%

In addition to this, there still are only two states with high unemployment defines as 5.5% percent or higher.

States with high unemployment rates May 2019

As a not of caution, there are 3 states that are edging close to the high unemployment rates. Mississipi – 5.0%, New Mexico – 5.0%, and Arizona – 4.9%

Except for the Distrist of Columbia, none of these regions have high concentrations of IT employment.  As such they do not materially impact the IT job market.

Employment Still Strong — But some concerns

Hiring demand remains high for IT professionals with the United States.

Hiring Demand for IT Professionals

Based on data gathered by Janco Associates, hiring demand for IT Middle Management and IT Staff positions remain high. In addition demand for contractors an consultants is high as well.

Order Salary Survey Download Sample Provide Data

See Also:

 

Please follow and like us
error

Blockchain DLT career path

Blockchain DLT career path included as a job family

Blockchain DLT career path has been added to the IT Job Family Classification System.  Not only is it included as an individual job family, it is also linked to all of the other IT job families in that offering.  Having clearly defined job paths a the first step in long-term career planing.  That is true for the individual as well as the company employing them.

Blockchain DLT career path

Blockchain DLT career path is defined in the classification system. In addition point of entry and exit to the other functions within IT have bee identified

The ways to migrate to and from the Blockchain DLT job family have been identified and documented by Janco.  With this tool it is now easy to:

  • Define career development opportunities within a Blockchain DLT job family and movement into and out of the job family to the other job families.
  • Discuss career planning, clarify specific training needs, and consider course enrollment and career advancement
  • Track job applicants and analyze data for reporting
  • Set pay grades and get accurate salary requirements by understanding jobs and their requirements better
  • Evaluate jobs more consistently by comparing similar jobs in the same job family

Read on Order IT Job Family Classification System Download sample

See Also:

 

Please follow and like us
error

Cloud Security Vulnerabilities

Top 10 Cloud Security Vulnerabilities

Top 10 Cloud Security Vulnerabilities have been identified and ranks by level of importance and impact by a panel of 57  CIOs, CTOs, and CSOs.

Cloud Security Vulnerabilities

Top 10 Security Vulnerabilities have been identified by a 100 plus CIOs, CTOs, and CSOs from Fortune 500 companies

The top 10 are:

  1. Data breaches
  2. Weak Security
  3. Non-Secure Interfaces & API
  4. OS vulnerabilities
  5. Account hijacking
  6. Insider breach as System Administrator
  7. Parasitic code on server
  8. Data Destruction
  9. Denial of service (DoS).
  10. Ransomware

All of these are addressed in Janco’s How to Guide for Cloud Process and Outsourcing.

Order Cloud Outsourcing  Download Selected Pages

Top 10 best practices address Cloud Security Vulnerabilities

Top 10 best practices for cloud Security – The cloud is great technology that helps organizations to improved productivity, reduce costs, and simplify the user’s life. However it does raise significant security risks. Here are 10 best practices that if followed minimize those risks.

  1. Utilize a SDM (System Development Methodology) to design, test and implement changes in the both the source and object level code.
  2. Implement a disaster recovery and business continuity plan that includes a focus on security of the data and application assets that are cloud based.
  3. Implement metrics and cloud application monitoring which can help to detect potential security violations and breaches in the cloud based data and applications
  4. Utilize a secure access and change management system to manage revisions to the cloud application.
  5. Utilize a patch management approach to install revisions to the cloud data and application.
  6. Implement a log management system to have an accurate audit trail of what occurs on the cloud.
  7. Implement firm security policies via a formal security management system (see https://www.e-janco.com/Security.htm and https://www.e-janco.com/Cloud.htm).
  8. Review latest published cloud vulnerabilities and make appropriate changes to cloud applications and access rules
  9. Contract with independent 3rd parties to find security vulnerabilities in your cloud based applications
  10. At least annually, conduct a security compliance audit on the total cloud based application from development to user access.

See also:

Please follow and like us
error

Right time to hire IT Pros

Right time to hire IT Pros – Almost 100K new jobs to be created this year

Right time to hire IT Pros

Before the labor market gets tighter now is the right time to hire IT Pros

The right time to hire IT Pros is now before the labor maket gets tighter. In the first five (5) months of 2019, 34,600 new IT jobs were created.  Almost 70,000 more new  jobs will be added in the remaing months of this yera. This is the perfect time for development projects. Labor rates have never been lower.  From building —

  • Mobile Apps
  • Artificial Intelligent Bots – B2C – Improve Customer Experience
  • Artificial Intelligent Bots – B2B – Improve Human Resource Experience
  • Integrations, Customizations and more.

CEO and CIO say focus is on the customer experience – right time to hire IT Pros

Chief Experience Officer Job Description

CXO drives customer experience. Right staff is critical

A great customer experience is all about catering to the customers’ expectations. Customers can be consumers or staff. Customers want choices, and instant results. Customer experience or CX cloud applications provide customers with seamless, personalized and immediate experiences.  With recent trends showing that social media greatly influences customers into making decisions, CX cloud allows an enterprise to engage with customer at every level throughout their life-cycle.

This has created a demand for the CXO – Chief Experience Officer. The CXO needs to drive the hiring effort.

Order Chief Experience Officer Job Description

See also:

Please follow and like us
error

Updated IT job Descriptions

Updated IT job descriptions

Updated IT job descriptions are important for an entire range of reason.  The foremost is that  updated IT job descriptions clearly define what roles and responsibilities the individual filling that role has.  In addition it clearly defines metrics for the position which can be translated into Key Performance Indicators – KPI.

Promotions depend on Updated IT Job descriptions

Updated IT Job Descriptions

Janco updated the IT Job Descriptions continually. At least once every 12 months each job description is reviewed, edited, and updated to meet the latest requirements for the position.

The labor market for qualified professionals is tight.  With that as an factor in staffing, promotions become more important.  It is easier to higher an entry level individual than first tier performer for the two levels up.  With that in mind, position descriptions should include career path and promotion opportunities.

 

Training and education are ways in which CIOs and IT Managers can improve the quality of their staffs.  Janco has created a number of tools which are being used today by  over 300 of the Fortune 500 organizations.

The main offering Janco has is its full IT Job Descriptions.  It comes as individual MS Word files, epub book, or the complete HandiGuide

IT Job Descriptions HandiGuide includes sample organization charts, a job progression matrix, and 300 Internet and IT job descriptions. The book addresses all mandated requirements, including the ADA, and is in an easy to use format. This can be purchased as a complete set or bundles of job descriptions

Order IT Job Description HandiGuide Sample Description Download TOC

See also:

Please follow and like us
error