Complete Job Descriptions in WORD, PDF, and ePub formats
Over 1,000 detail job descriptions for enterprises of all sizes are available. They can be purchased individually or in bundles.
Several preset bundles are listed below:
Enterprise Architecture has become a common practice for large IT organizations. For the first time there is a methodology to encompass all of the various IT aspects and processes into a single practice. However, realizing the full potential of enterprise architecture can be challenging. There are many aspects to enterprise architecture, including architecture planning, cloud computing, governance, taxonomies and system development methodologies, all of which impact its success. Without the right guidance, tools, frameworks, process, policies and procedures enterprise architecture can quickly become unwieldy.
To support enterprise architecture many of the key positions have to assume new roles and responsibilities. The 18 job descriptions below have been modified to reflect these new requirements are are a must for any enterprise that is moving in direction of enterprise architecture.
E-commerce, wireless and Internet activities now take up over 50% of the focus of the IT function. There are new positions and new responsibilities for existing positions. The need to have up-to-date job descriptions is required to meet the objectives of both industry standards and mandated requirements.
The job descriptions in the e-Commerce, wireless, and Internet job descriptions bundle have been developed to meet those needs. Each job description has been reviewed with PCI-DSS, Sarbanes-Oxley, HIPAA, and ISO in mind. Industry experts agree that these job descriptions are the most comprehensive ones available today. In addition to being practical and easy to use, they meet the needs of industry standards and requirements.
Preparation for Disaster Recovery / Business Continuity in light of SOX has two primary parts. The first is putting systems in place to completely protect all financial and other data required to meet the reporting regulations and to archive the data to meet future requests for clarification of those reports. The second is to clearly and expressly document all these procedures so that in the event of a SOX audit, the auditors clearly see that the DRP exists and will appropriately protect the data.
The processes of Disaster Recovery Planning (DRP) and Business Continuity Planning (BCP) impact many areas within the enterprise. A number of members of the IT function have direct input into Disaster Recovery and Business Continuity Planning are members of the DRP and BCP team and as such their job descriptions reflect those specific responsibilities.
ITSM is process-focused and in this sense has ties and common interests with process improvement movement frameworks and methodologies. The discipline is not concerned with the details of how to use a particular vendor's product, or necessarily with the technical details of the systems under management. Instead, it focuses upon providing a framework to structure IT-related activities and the interactions of IT technical personnel with business customers and users.
ITSM is generally concerned with the "back office" or operational concerns of information technology management (sometimes known as operations architecture), and not with technology development. For example, the process of writing for sale, or designing a microprocessor would not be the focus of the discipline, but the computer systems used by marketing and business development staff in software and hardware companies would be. Many non-technology companies, such as those in the financial, retail, and travel industries, have significant information technology systems which are not exposed to customers.
- Director Sarbanes-Oxley Compliance
- Manager Change Control
- Manager Customer Service Center
- Manager Help Desk Support
- Manager Metrics
- Manager Quality Control
- Manager Service Level Reporting
- Manager User Support
- Capacity Planning Supervisor
- Change Control Analyst
- Change Control Supervisor
- Help Desk Analyst
- Metrics Measurement Analyst
- Quality Measurement Analyst
IT organizations turn to outsourcing in order to reduce costs, to offload applicationmaintenance, offload help desk operations, or obtain expertise. The typical outsourcing engagement is governed by a contract setting the terms and conditions between the client and outsourcer for the duration of their relationship. To measure whether that relationship is working, and how well, Service Level Agreements are established.
A Service Level Agreement (SLA) is a critical component of any outsourcing project. It defines the boundaries of the project in terms of the functions and services that the service provider will give to its client, the volume of work that will be accepted and delivered, and acceptance criteria for responsiveness and the quality of deliverables.
At the heart of an effective SLA are performance metrics and they are driven by key members of the IT staff. The tasks associated with that are included in the job descriptions in this bundle.
Modern organizations have a huge challenge on their hands, on a scale unlike anything they have seen. They must “secure” the organization in the face of increasing complexity, uncertainty, and interconnection brought about by an unprecedented reliance on technology to accomplish their mission. They must also stay mindful of the regulations as legislators discover the importance of security. Some of the challenges that organizations must overcome to be successful in this environment are based on the roles that individuals within the enterprise play.
These job descriptions defines ways in which a change in responsibilities are the impetus for an emerging mission-driven approach to security.
Whether employer or employee, it is important to know what other companies are paying in total compensation for a similar position in your area. Learn how your company compares in the area of compensation. This is a complete set of the job positions surveyed in the IT Salary survey