IT Hiring Kit IT Salary Survey

IT Executive Management
Position Descriptions

Every Executive Level Job Description Needed is Included

 

 

Order Job DesccriptionsDownload Job DesccriptionsSample Job Desccriptions


IT Job DescriptionsThe IT Executive Managment job descriptions contained within the Internet and IT Position Description HandiGuide are all in a standard electronic format - PDF (.pdf), WORD 2003(.doc), and WORD .docx (.docx).  All of the job descriptions were reviewed and updated to comply with Sarbanes-Oxley and the ISO 27000 security standard. 

Each job description meets ADA standards and IT Governance Guidelines. The IT Executive Management positions include:

  • Chief Information Officer (CIO)
  • Chief Information Officer (CIO) - Small Enterprise
  • Chief Security Officer (CSO)
  • Chief Compliance Officer (CCO)
  • Chief Technology Officer (CTO)
  • Vice President Administration
  • Vice President Consulting Services
  • Vice President Human Resources
  • Vice President Information Services
  • Vice President Strategy and Architecture
  • Vice President Technical Services

The 243 positions in the Internet and IT Positions Descriptions Handiguide include all of the technical, administrative, support functions within the IT function.  Click on the each group below to see a pop up window with the list of jobs included.

You can purchase this book as a PDF Book, Word Book or as individual word files for each Job Description which makes for easier modification.  We have also combined the both book formats with the individual word files for each job descriptions to give you the best of both worlds.

Internet and IT
Position Descriptions HandiGuide®

281 Job Descriptions Descriptions and Organization Charts  

  
Format Print Modify Source Cut & Paste

Features

Cost**
PDF Yes No No The complete Internet and IT Position Descriptions HandiGuide which includes the Job descriptions in PDF formats which utilizes the Adobe search and bookmark features. Less than $3.44 each Order Job Desccriptions
Word
Files
Yes Yes Yes Individual files for each job description.  Long file names are used so each job description can be modified as a simple document (WORD.docx) - Bonus of ePub version of all of the job descriptions
Less than
$3.83each
Order Job Desccriptions
Word
Book
Yes Yes Yes Word Search Fully Bookmarked.  All job descriptions are contained in single word book - NOTE this is a complex document and the user needs to know WORD very well to extract and modify the individual job descriptions (WORD.docx) Less than $4.59 each  Order Job Desccriptions
PDF
and Word
Files
Yes Yes Yes The complete Internet and IT Position Descriptions HandiGuide plus individual files for each job description.  Long file names are used so each job description can be modified as a simple document (WORD.docx) Less than $5.75 each Order Job Desccriptions

 


 

 

 

CIO - CTO Employment News


Malware is now not as easy to detect

Security Manual Template key to data protection

Security Policies and ProceduresSecurity and compliance are key to maintaining control of sensitive and confidential information. However this a an issue with the wave of attacks that have affected banks and other companies with open-source penetration testing tools loaded directly into memory instead of traditional malware, making their detection much harder.

Researchers started investigating these attacks after the security team from an unnamed bank found Meterpreter in the random access memory (RAM) of a server that acted as the organization's Windows domain controller.

Meterpreter is an in-memory attack payload that can inject itself into other running processes and is used to establish persistency on a compromised system. It is part of the Metasploit penetration testing framework, a popular tool used both by internal security teams and by malicious hackers.

Order Security ManualDownload Selected Pages

- more info

Network Security Key to CIO success

CIO Role - CTO Responsibilities


Newwork security - CIO RoleNetwork are more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job. Adding another layer of complexity is the underlying concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack? Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.

Order CIO Job Description
- more info

Top 10 lists that IT Pros need to review

Top 10 questions and lists created by Janco that IT professionals need to review

- more info

Reservation are at risk as airline booking systems are easily hacked

Airline Booking Systems are Easily Hacked

The airline booking systems used by millions are totally insecure and lack suffficient authentication methods. Thus attackers can easily modify other people's reservations, cancel their flights and even use the refunds to book tickets for themselves.

The three airline booking systemsa are Sabre, Travelport and Amadeus. Together they store PNRs (Passanger Name Records) for millions of travelers at any given time. Any data added or modification made to a booking is stored in their systems and all that's required to access that information is typically a last name and a six-character booking code.

There are multiple access points into these systems and this includes the websites operated by airlines and travel agencies, but also third-party websites like CheckMyTrip. As such there systems are easily hacked and insecure.

Order Security ManualDownload Selected Pages

- more info

Best IT Infrastructure topic articles that are must reads

 

IT Infrasructure - Best IT Infrastructure topic articles that are must reads

IT Infrastructure PoliciesDownload Selected Pages

- more info

Is the US goverment hiring too many IT Pros?

Is the US goverment hiring too many IT Pros?

The current administration plans to hire 6,500 people with cybersecurity skills before the new admininstration is place. It had hired 3,000 by the first half of this year.

Both HR and IT have a critical role in addressing the expectations that the Executive Management has of HR and the CIO. You need integrated processes with an application/infrastructure backbone to support them. While the CIO may have a systems focus with a lack of sympathy for HR needs, his/her demands actually will enable HR to gain better process focus.

Security Management Job Description Bundle

  • Chief Security Officer (CSO)
  • Chief Compliance Officer (CCO)
  • VP Strategy - Architecture
  • Director e-Commerce
  • Database Administrator
  • Data Security Administrator
  • Manager Data Security
  • Manager Facilities and Equipment
  • Manager Network - Computing Services
  • Manager Network Services
  • Manager Training - Documentation
  • Manager Voice and Data Communication
  • Manager Wireless Systems
  • Network Security Analyst
  • System Administrator - Linux
  • System Administrator - Unix
  • System Administrator - Windows
IT Job Descriptions - more info

Metrics for Key Performance Indicators (KPI)

Metrics are the current Critical Success Factors (CSFs) and Key Performance Indicators (KPI)

Metrics - KPI - CSFMetrics are fundamental for measuring performance. But which metrics are really driving companies forward?

Metrics and Key performance indicators (KPIs) are a basic tool for a company’s management to measure performance. A number of years ago we called KPIs Critical Success Factors (CSFs). KPIs are more granular and focus management’s attention to a finite array of statistics that are indicative of a company’s performance They are believed to have explanatory power over the company’s desired success and profitability.

Metrics for ITDownload Selected Pages

- more info

Wall Street Journal quotes

CEO of Janco quoted in the Wall Street Journal

The CEO of Janco Associates was quoted in the Wall Street Journal several times in the last few months.  The articles are listed below:

Order Salary SurveyDownload Selected PagesDownload Selected Pages

- more info

Younger workers are at more risk to taken in by scams

Scams score more with younger workers according to study funded by Microsoft

Younger individuals are most easily duped by technical support scams according to a recent survey.

  • Individuals between 25 and 34 were more than three times as likely to fall for the fake-out as those aged 55 to 64.
  • Individuals between 18 and 24 -- were little better than their slightly-older cohort; they were tricked by the scams more than two and a half times the rate of the group aged 66 and older.
  • Globally, about two-thirds of the respondents had encountered a technical support scam.
  • 20% -- allowed the scammer to continue his or her story -- and nearly one in 10 had actually given money to the fraudster

The survey paid for by Microsoft, queried 1,000 adults ages 18 and up in each of several countries, including the U.S., the U.K., Australia, Brazil, Canada, China, Germany and India.

Security Policies - Procedures - Audit Tools

- more info

Enterprise operations control strategic IT spending

Enterprise operations control strategic IT spending

IT Strategic spendingIn many enterprises new technology investment is funded out of line of business and when it's about to go live and become an operational cost, it switches over to an IT budget."

The relationship between enterprise operations and the IT department when it came to priorities and strategic spending is less like 'us' versus 'them' and more like 'contentious siblings'.

Fundamentally, the role of the CIO when deciding on IT spending is both to advise business leaders on viable technologies for realizing a project's goals, but to also explain how any new investments would fit with a firm's existing infrastructure.

Order IT Infrastructure KitDownload Selected Pages

- more info

What do the states' unemployment numbers tell us?

What do the states' unemployment numbers tell us?

The state unemployment numbers cannot really tell us about the state of the overall job market.  First the numbers are "constantly" being adjusted by individuals that have an agenda that is not in all cases pure.  For example in July 2016, the data that was reported said that unemployment rates were significantly higher in 7 states, lower in 3 states, and stable in 40 states and the District of Columbia. Nonfarm payroll employment increased in 15 states, decreased in Kansas, and was essentially unchanged in 34 states and the District. 

No where in that presentation is the fact the overall labor force participation is a 62.8% (saying that 94 plus million individuals are permanently out of the labor force). That would make overall unemployment number well over 12%.

High unemployment states July 2016

The only fact that is clear from the data is the Nevada has been a high unemployment state for over 8 years.

Order Salary SurveyDownload Selected PagesDownload Selected Pages

- more info

Skill set for future CIO and CTO is altered

Skill set for future CIO and CTO is altered

To best cope with digital-driven disruption, companies are looking for technology leaders who can adapt the enterprise to a changing environment. Moving through abrupt change, the senior technology executive of the future will look more progressive than the CIO/CTO of even just a year ago. The next generation technology chief would have to have the following traits to succeed in bringing change to an organization:

  • Be a visionary with a third eye looking at the future
  • Be able to adapt to constant transformations
  • Be a driver for a network economy
  • Be a role model for infrastructure management and governance
  • Be Flexible
  • Be an implementer for custom solutions

Order CIO Job Description

- more info

Role of the CIO has changed

The role of the CIO has changed over the last decade, from the scope of their responsibilities to the skill set required, and even their career aspirations. Evolving in the digital era, CIOs now need to improve their cyber security strategy.

The chief information officer's (CIO) role, responsibilities and influence is growing in today's boardroom. And the CIOs job itself is expanding as well. The CIOs of the next decade face many challenges. The CIOs who will succeed will have a common set of skills.

  • CIOs both visionary and pragmatic
  • CIOs focus on ROI improvement of IT
  • CIOs inspire the enterprise and expand the business impact of IT

Order CIO Job Description

- more info

27.2% of IT Managers and executives are women

27.2% of IT Managers and executives are women

According to Janco and US government data, almost 1 in 3 managers in IT are women.  In addition many of the top paid CIOs are women.

http://goo.gl/ggjYNM #gender #itjobmarket #janco #employment #cio

Salary Survey Job Descriptions IT Job Families IT Hiring Kit Interview Guide

Order Salary SurveyDownload Selected Pages

 

- more info

4th Industrial Revolution

4th Industrial RevolutionCIOs have been inundated with the potential and the rapid pace of innovation in technology. This is referred to as the 4th Industrial Revolution, and it can be more accurately described as the ‘Hurricane of Innovation’. Janco terms this as the ‘Age of the Customer’ and the imperative for customer obsession to be successful . Never before have we seen this level of innovation intensity. Almost every company is experimenting with the potential, and sometimes it is about finding the diamonds in the ‘data’. Data is now the next platform which provides insight, intelligence, and ability to create new platforms for a company and industry. Connecting data with IoT, and in many cases machine learning is proving to be a winning formula. The business value and realization of digitization is in progress, and now we have real world examples of new business models and potential revenues for traditional companies. Digital disruption is here and it is real.

Order IT Infrastructure KitDownload Selected Pages

- more info

Feds look to increase cybersecurity spending by $19 billion

Feds look to increase cybersecurity spending by $19 billion

CybersecurityThe administration is seeking to boost federal cybersecurity spending. Its 2017 IT budget calls for a 35% increase in cybersecurity spending to $19 billion.

Victor Janulaitis, CEO of Janco Associates, a research firm that analyzes IT labor trends, said the "government is not always the solution.

"Rather the solution needs to be in the private sector where what can be done will be done and real jobs will be created," said Janulaitis. "The solution of 'thousands' of new government employees only adds to our deficit and governmental bloat," he said.

Order Security ManualDownload Selected Pages

- more info

Over 1/3 of IT pros do work from home

Over 1/3 of IT pros do work from home

38 percent of workers in management, business, and financial operations
occupations, and 35 percent of those employed in professional and related occupations,did some or all of their work from home on days they worked, according to the U.S. Bureau of Labor Statistics. Workers employed in other occupations were less likely to work from home on days they worked.

Order IT Job Description
Sample job description
 Download Selected IT Job Descriptions

- more info

Importance of infrastructure policies and a focused security program is critical

Importance of infrastructure and security programImportance of infrastructure policies and a focused security program is critical

The digital landscape today is now open to increased cyber-attacks. The increase in frequency of attacks need a well-developed set of infrastructure procedures and a focused security program. IT pros need a focused awareness to bolster their security policies and practices as the foundational structure of an overall risk-management strategy.

Cyber-attacks cannot be prevented but with concentrated awareness and efforts, organizations can arm their customers, partners, and employees with safeguard measures require focused awareness to bolster their security policies and practices as the foundational structure of an overall risk-management strategy. Cyber-attacks cannot be prevented but with concentrated awareness and efforts, organizations can arm their customers, partners, and employees with safeguard measures.

Order Security ManualDownload Selected PagesVersion History

- more info

Microsoft’s browsers are getting ready to bite the dust

Microsoft’s browsers are getting ready to bite the dust

Back in November 2015, IE accounted for more than half of the global browser user share. Currently, IE and Edge combined to account for 38.7% of the global user share.

In the last six months alone, IE -- a bucket into which Net Applications also throws in Windows 10's Edge -- has lost 11.4 percentage points, an unprecedented decline for any browser at any point in the last 11 years.

Order Browser Market Share StudyDownload Selected Pages

- more info

Cost of security breaches escilates

Cost of security breaches escalates

Cost of Security breachAttacks by malicious insiders arethe costliest to fix ($145,000), followed by denial of service ($127,000) and Web-based attacks ($96,000).

The top 10 drivers of security shortcomings include:

  1. Insufficient funding for security
  2. Lack of commitment by senior executive management
  3. Lack of leadership in the security arena by the CIO
  4. Belief that the organization will not be targeted
  5. Lack of internal resources who are "security" experts
  6. Lack of an effective IT security strategy
  7. Lack of an action plan on how to implement a solution before an event
  8. Infrastructure for IT that does not easily lend itself to security implementation including complex and disjointed applications and data
  9. No central focus with the enterprise that focuses on security
  10. Lack of a good termination policy for employees and contractors
Order Security ManualDownload Selected Pages
- more info

Privacy lost with new audio fingerprint tracking

Privacy Lost

It no longer is just the NSA, now some websites using audio fingerprinting for identifying and monitoring web users. A number of sites use the AudioContext API to identify an audio signal that reveals a unique browser and device combination.

The method doesn't require access to a device's microphone, but rather relies on the way a signal is processed. The researchers, Using the AudioContext API to fingerprint does not collect sound played or recorded by your machine. An AudioContext fingerprint is a property of your machine's audio stack itself.
In addition, researchers have found 715 of the top one million websites are using WebRTC to discover the local IP address of users. Most of these are third-party trackers.

Order Sensitive Information PolicyDownload Selected Pages

- more info

WYOD a top concern of C-Level executives

WYOD a top concern of C-Level executives

Anyone can purchase a wearable device.  If there is an open wi-fi connection that the device can map to sensitive personal and enterprise infromation is at risk. 

Rules and policies need to be put in place to mitigate this risk.  The question is where to start.  Janco has answered that in its wearable device policy template.  It includes robust rules on wearable devices.  In addition, it provides a specifice road map to be followed when developing a strategy on how to deal with this new potential threat.

Wearable Device Policy - It is 17 pages in length. It contains everything that an enterprise needs to implement a functioning and compliant Wearable Devices device and use process. Included are forms defining the mobile device environment.

 Download Selected Pages

Read on...

 

- more info

Record Management, Retention, and Destruction Policy

Records ManagementThe volume of documents within organization is exploding, managing these documents is a real and pressing challenge. If your organization is like many others, paper documents, emails, faxes, PDFs, CAD and other office documents are left unmanaged and stored in filing cabinets, on file servers or on desktop PCs around the office. This exposes your organization to compliance risks, service delays, cost overruns and a host of other challenges.

Record Management Policy Download Selected Pages

Today, software solutions are available that combine document and records management capabilities into a single, complete offering. These solutions enable you to reduce the time, cost and complexity of storing and accessing your documents throughout the information lifecycle. They also give you the power to improve access to critical documents, enhance customer service and operational efficiency - all while reducing risks and addressing compliance demands.

- more info

Contract terms for outsource agreemeents

Contract terms for outsource agreementsContract terms for outsource agreemeents

Specific contractual provisions to minimize cyber risk in outsourcing contracts are:

  • Setting security standards for the vendor;
  • Restricting on subcontracting;
  • Employee related protections, such as background checks and training; 
  • Security testing;
  • Security audits;
  • Security incident reporting and investigation;
  • Data retention and use restrictions;
  • Customer data access rights; and
  • Vendor liability for cyber incidents.

Reasons Why CIOs Recommend Outsourcing

Order Cloud Outsourcing Template  Download Selected Pages

- more info

Ten tips to protect your sensitive personal information

Ten tios to protect your sensitive personal informationTen tips to protect your sensitive personal information

  1. Monitor credit reports
  2. Never provide personal information over public Wi-Fi
  3. Protect your password
  4. Don't use the same password on all accounts
  5. Never store passwords on your computer
  6. Watch out for phishing emails
  7. If you do receive a suspicious-sounding email, contact your service provider directly
  8. Take physical precautions
  9. Shred bills, credit offers, and expired credit cards
  10. Layer your cybersecurity

Order Security Manual Download Selected Pages

- more info