Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,217,449 members, 8,034,277 topics. Date: Saturday, 21 December 2024 at 02:53 PM

Top Jobs Of The Future -IT Jobs That Will Remain In Demand Throughout 21 Century - Jobs/Vacancies - Nairaland

Nairaland Forum / Nairaland / General / Jobs/Vacancies / Top Jobs Of The Future -IT Jobs That Will Remain In Demand Throughout 21 Century (365 Views)

What Salary Range Can Make You Remain In Nigeria? / Why Would You Pay Someone N50k For Jobs Of 4 People? / Weekly Top Jobs (20th – 26th May) Total Nigeria, UN, Ecobank, Access Bank & More (2) (3) (4)

(1) (Reply)

Top Jobs Of The Future -IT Jobs That Will Remain In Demand Throughout 21 Century by nwabuking24c: 7:30pm On Sep 10, 2018
The 21st century as the information/digital age has presented numerous challenges and opportunities for humanity. From widespread industrial revolution to notable advances in information and communication technology, the 21st century is living to its bidding as an era/dispensation of highly skilled workforce. With artificial intelligence and machine learning capabilities sweeping through the length and breadth of the traditional industries and service sectors, new skills/capabilities have continued to emerge to support the revolution as well as replace mundane ways of doing things, which undoubtedly has improved effectiveness and efficiency of business services. By leveraging on capabilities enabled by technology, businesses have continued to drive down overheads across-board with corresponding increase in business performance/bottom-line, service delivery and customer satisfaction.

Despite the sweeping changes occasioned by technological advancement, certain jobs will not be easily replaced/displaced by technology and automation rather, they will continue to be relevant and complementary to the use of technology/automation in business. The following IT jobs most of which are in cyber security and information assurance fields will continue to be in high demand throughout this century (21st) and beyond.

1. Information Systems Auditor
An Information System Auditor (also known as IS/IT Auditor) is responsible for providing independent assurance to stakeholders (i.e. executive management, board of directors, customers, shareholders and investors) on the effectiveness and adequacy of system, process and operational controls around an organization's information systems and IT infrastructure. Ream more >> http://oxleyconsults.com.ng/job-profiles/information-system-auditor

2. Cyber Security Analyst
A Cyber Security Analyst helps to safeguard an organization's information technology infrastructures by employing set of strategies, methodologies, technologies and processes to manage, detect and prevent cyber threats capable of impacting adversely the confidentiality, integrity and availability of an organization's information technology assets. Read more >> http://oxleyconsults.com.ng/job-profiles/cyber-security-analyst

3. Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's information assets in whatever shape, form or medium it is handled by employing set of strategies, methodologies, technologies and processes to manage threats capable of impacting the confidentiality, integrity and availability such information assets. Read more >> http://oxleyconsults.com.ng/job-profiles/information-security-analyst

4. Security Engineer
A Security Engineer is a specialist who build and maintain systems that are robust enough to withstand malicious attacks and service denials. He/she basically ensure that security is considered and embedded during the design phase of all system development and acquisition projects before they are built/acquired rather than retrofitting controls/security measures later when the system is in production, which are usually expensive and counterproductive. Read more >> http://oxleyconsults.com.ng/job-profiles/security-engineer

5. Threat Intelligence Analyst
Threat intelligence analyst also known as “cyber intelligence analyst,” is an information security professional who defend his/her organization from activities of cyber criminals such as hackers and malicious software developers using advance cyber defense techniques in the areas of network security engineering, vulnerability management and continuous security event monitoring. Read more >> http://oxleyconsults.com.ng/job-profiles/security-engineer

6. Security Architect
Enterprise Security Architect's job description is similar to those of Security Engineer. A Security Architect designs, builds and oversees the implementation of security controls in an organization's IT infrastructure (e.g. networks, operating systems, databases and application). Read more >> http://oxleyconsults.com.ng/job-profiles/security-architect

7. Security Governance Officer
A Security Governance Officer is responsible for the implementation of executive management and Board of Director's information security agenda/strategy or objectives within an organization. He/she provides oversight on all information security activities within the organization in ensuring that IT remains an enabler of the business and information and technology related risk are managed within the organization's risk appetite. Read more >> http://oxleyconsults.com.ng/job-profiles/security-governance-officer

8. IT Risk Analyst
Information Technology (IT) Risk Analyst is a risk assurance function and is primarily responsible for risk identification, assessment, mitigation and continuous improvement (also know as risk optimization) across all IT infrastructure, information system/assets of the organization. Read more >> http://oxleyconsults.com.ng/job-profiles/it-risk-analyst

9. IT Change Manager
IT Change Manager coordinates all change activities/initiatives within an organization's information systems and IT infrastructures. He/she is responsible for the overall quality of the change management process by ensuring that requested changes meet business objectives. http://oxleyconsults.com.ng/job-profiles/it-change-manager

10. Configuration Manager
Configuration Manager is a stakeholder in the IT service and infrastructure management process of an organization and is responsible for defining and operating the configuration management process and system of an organization. He/she ensures a coordinated approach to configurations and parameterizations of IT assets that drive business systems, processes and services within an organization. Read more >> http://oxleyconsults.com.ng/job-profiles/configuration-manager

11. IT Control Analyst (a.k.a Systems Control Analyst)
Just like IT Risk analyst, IT control analyst is responsible for identifying weaknesses within an organization's information systems, processes and infrastructures and ensure the implementation of measures to minimize such risk. However, it specializes in devising, innovating and implementing controls to minimize/mitigate risk, vulnerabilities or threats identified by the IT risk analyst for the realization of business objectives. Read more >> http://oxleyconsults.com.ng/job-profiles/system-control-analyst

12. Security Operations Center (SOC) Analyst
The primary responsibility of a security operations center (SOC) analyst is to ensure that the organization’s information assets are protected from compromise arising from unauthorized access (Confidentiality risk), unauthorized alteration of data/information (integrity risk) and denial of service (availability risk). Read more http://oxleyconsults.com.ng/job-profiles/security-operations-center-analyst

13. Security Information and Event Management (SIEM) Analyst
The security information and event analyst (SIEM) analyst is responsible for the collection, analysis and validation of all Security information and event management (SIEM) activities that impact the organization either from within the network or outside its network. Read more >> http://oxleyconsults.com.ng/job-profiles/security-information-and-event-management-analyst


14. IT Business Relationship Manager
An IT Business Relationship Manager (IT BRM) is a liaison officer for the IT department and interfaces with other departments in an organization. In other words, departments that provides services to IT or consumes IT services liaise with an IT business relationship manager (IT BRM) to communicate requirements needed to effectively provide IT services to the departments. Read more http://oxleyconsults.com.ng/job-profiles/it-business-relationship-manager

Other are;
13. User management Analyst
14. Software Solution Testers
15. Release Manager
18. Software Developers, System Software
19. Software Developers, Application Software
20. Ethical Hacker
21. Penetration Tester
22. Vulnerability Assessor
23. Cryptographer
24. Forensic Expert
25. Incident Responder
26. Source Code Auditor
27. Mobile App Developer

For more on the above and detail job requirements/description, required skill set/experience and professional certification(s) to become any of the above, visit http://oxleyconsults.com.ng/aritcle/top-it-jobs-of-21century

(1) (Reply)

N-power Announces Alternative For Candidates / Sales Girl Needed For A Phone Shop In Galadimawa Abuja / Graduate Trainees Vacancy At UBA Bank | September, 2018

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 18
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.