Enterprise Architecture has become a common practice for large IT organizations. For the first time there is a methodology to encompass all of the various IT aspects and processes into a single practice. However, realizing the full potential of enterprise architecture can be challenging. There are many aspects to enterprise architecture, including architecture planning, cloud computing, governance, taxonomies and system development methodologies, all of which impact its success. Without the right guidance, tools, frameworks, process, policies and procedures enterprise architecture can quickly become unwieldy.
To support enterprise architecture many of the key positions have to assume new roles and responsibilities. The 18 job descriptions below have been modified to reflect these new requirements are are a must for any enterprise that is moving in direction of enterprise architecture.
E-commerce, wireless and Internet activities now take up over 50% of the focus of the IT function. There are new positions and new responsibilities for existing positions. The need to have up-to-date job descriptions is required to meet the objectives of both industry standards and mandated requirements.
The job descriptions in the e-Commerce, wireless, and Internet job descriptions bundle have been developed to meet those needs. Each job description has been reviewed with PCI-DSS, Sarbanes-Oxley, HIPAA, and ISO in mind. Industry experts agree that these job descriptions are the most comprehensive ones available today. In addition to being practical and easy to use, they meet the needs of industry standards and requirements.
Preparation for Disaster Recovery / Business Continuity in light of SOX has two primary parts. The first is putting systems in place to completely protect all financial and other data required to meet the reporting regulations and to archive the data to meet future requests for clarification of those reports. The second is to clearly and expressly document all these procedures so that in the event of a SOX audit, the auditors clearly see that the DRP exists and will appropriately protect the data.
The processes of Disaster Recovery Planning (DRP) and Business Continuity Planning (BCP) impact many areas within the enterprise. A number of members of the IT function have direct input into Disaster Recovery and Business Continuity Planning are members of the DRP and BCP team and as such their job descriptions reflect those specific responsibilities.
IT organizations turn to outsourcing in order to reduce costs, to offload applicationmaintenance, offload help desk operations, or obtain expertise. The typical outsourcing engagement is governed by a contract setting the terms and conditions between the client and outsourcer for the duration of their relationship. To measure whether that relationship is working, and how well, Service Level Agreements are established.
A Service Level Agreement (SLA) is a critical component of any outsourcing project. It defines the boundaries of the project in terms of the functions and services that the service provider will give to its client, the volume of work that will be accepted and delivered, and acceptance criteria for responsiveness and the quality of deliverables.
At the heart of an effective SLA are performance metrics and they are driven by key members of the IT staff. The tasks associated with that are included in the job descriptions in this bundle.
- VP Administration
- VP Strategy and Architecture
- Digtal Brand Manager
- Director IT Management and Control
- Manager Contracts and Pricing
- Manager Controller
- Manager KPI Metrics
- Manager Metrics
- Manager Outsourcing
- Manager Service Level Reporting
- Manager Social Networking
- Manager Vendor Management
- Key Performance Indicator Analyst
- Metrics Measurement Analyst
- Quality Measurement Analyst
- SEO Specialist
- System Administrator Linux
- System Administrator Unix
- System Administrator Windows
- Wi-Fi Network Administrator
Modern organizations have a huge challenge on their hands, on a scale unlike anything they have seen. They must “secure” the organization in the face of increasing complexity, uncertainty, and interconnection brought about by an unprecedented reliance on technology to accomplish their mission. They must also stay mindful of the regulations as legislators discover the importance of security. Some of the challenges that organizations must overcome to be successful in this environment are based on the roles that individuals within the enterprise play.
These job descriptions defines ways in which a change in responsibilities are the impetus for an emerging mission-driven approach to security.
Whether employer or employee, it is important to know what other companies are paying in total compensation for a similar position in your area. Learn how your company compares in the area of compensation. This is a complete set of the job positions surveyed in the IT Salary survey
All of the job descriptions have been reviewed and updated to comply with Sarbanes-Oxley, HIPAA, Cobit, and the ISO 27000 security standard.