Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / NewStats: 3,217,449 members, 8,034,277 topics. Date: Saturday, 21 December 2024 at 02:53 PM |
Nairaland Forum / Nairaland / General / Jobs/Vacancies / Top Jobs Of The Future -IT Jobs That Will Remain In Demand Throughout 21 Century (365 Views)
What Salary Range Can Make You Remain In Nigeria? / Why Would You Pay Someone N50k For Jobs Of 4 People? / Weekly Top Jobs (20th – 26th May) Total Nigeria, UN, Ecobank, Access Bank & More (2) (3) (4)
(1) (Reply)
Top Jobs Of The Future -IT Jobs That Will Remain In Demand Throughout 21 Century by nwabuking24c: 7:30pm On Sep 10, 2018 |
The 21st century as the information/digital age has presented numerous challenges and opportunities for humanity. From widespread industrial revolution to notable advances in information and communication technology, the 21st century is living to its bidding as an era/dispensation of highly skilled workforce. With artificial intelligence and machine learning capabilities sweeping through the length and breadth of the traditional industries and service sectors, new skills/capabilities have continued to emerge to support the revolution as well as replace mundane ways of doing things, which undoubtedly has improved effectiveness and efficiency of business services. By leveraging on capabilities enabled by technology, businesses have continued to drive down overheads across-board with corresponding increase in business performance/bottom-line, service delivery and customer satisfaction. Despite the sweeping changes occasioned by technological advancement, certain jobs will not be easily replaced/displaced by technology and automation rather, they will continue to be relevant and complementary to the use of technology/automation in business. The following IT jobs most of which are in cyber security and information assurance fields will continue to be in high demand throughout this century (21st) and beyond. 1. Information Systems Auditor An Information System Auditor (also known as IS/IT Auditor) is responsible for providing independent assurance to stakeholders (i.e. executive management, board of directors, customers, shareholders and investors) on the effectiveness and adequacy of system, process and operational controls around an organization's information systems and IT infrastructure. Ream more >> http://oxleyconsults.com.ng/job-profiles/information-system-auditor 2. Cyber Security Analyst A Cyber Security Analyst helps to safeguard an organization's information technology infrastructures by employing set of strategies, methodologies, technologies and processes to manage, detect and prevent cyber threats capable of impacting adversely the confidentiality, integrity and availability of an organization's information technology assets. Read more >> http://oxleyconsults.com.ng/job-profiles/cyber-security-analyst 3. Information Security Analyst An Information Security Analyst is responsible for protecting an organization's information assets in whatever shape, form or medium it is handled by employing set of strategies, methodologies, technologies and processes to manage threats capable of impacting the confidentiality, integrity and availability such information assets. Read more >> http://oxleyconsults.com.ng/job-profiles/information-security-analyst 4. Security Engineer A Security Engineer is a specialist who build and maintain systems that are robust enough to withstand malicious attacks and service denials. He/she basically ensure that security is considered and embedded during the design phase of all system development and acquisition projects before they are built/acquired rather than retrofitting controls/security measures later when the system is in production, which are usually expensive and counterproductive. Read more >> http://oxleyconsults.com.ng/job-profiles/security-engineer 5. Threat Intelligence Analyst Threat intelligence analyst also known as “cyber intelligence analyst,” is an information security professional who defend his/her organization from activities of cyber criminals such as hackers and malicious software developers using advance cyber defense techniques in the areas of network security engineering, vulnerability management and continuous security event monitoring. Read more >> http://oxleyconsults.com.ng/job-profiles/security-engineer 6. Security Architect Enterprise Security Architect's job description is similar to those of Security Engineer. A Security Architect designs, builds and oversees the implementation of security controls in an organization's IT infrastructure (e.g. networks, operating systems, databases and application). Read more >> http://oxleyconsults.com.ng/job-profiles/security-architect 7. Security Governance Officer A Security Governance Officer is responsible for the implementation of executive management and Board of Director's information security agenda/strategy or objectives within an organization. He/she provides oversight on all information security activities within the organization in ensuring that IT remains an enabler of the business and information and technology related risk are managed within the organization's risk appetite. Read more >> http://oxleyconsults.com.ng/job-profiles/security-governance-officer 8. IT Risk Analyst Information Technology (IT) Risk Analyst is a risk assurance function and is primarily responsible for risk identification, assessment, mitigation and continuous improvement (also know as risk optimization) across all IT infrastructure, information system/assets of the organization. Read more >> http://oxleyconsults.com.ng/job-profiles/it-risk-analyst 9. IT Change Manager IT Change Manager coordinates all change activities/initiatives within an organization's information systems and IT infrastructures. He/she is responsible for the overall quality of the change management process by ensuring that requested changes meet business objectives. http://oxleyconsults.com.ng/job-profiles/it-change-manager 10. Configuration Manager Configuration Manager is a stakeholder in the IT service and infrastructure management process of an organization and is responsible for defining and operating the configuration management process and system of an organization. He/she ensures a coordinated approach to configurations and parameterizations of IT assets that drive business systems, processes and services within an organization. Read more >> http://oxleyconsults.com.ng/job-profiles/configuration-manager 11. IT Control Analyst (a.k.a Systems Control Analyst) Just like IT Risk analyst, IT control analyst is responsible for identifying weaknesses within an organization's information systems, processes and infrastructures and ensure the implementation of measures to minimize such risk. However, it specializes in devising, innovating and implementing controls to minimize/mitigate risk, vulnerabilities or threats identified by the IT risk analyst for the realization of business objectives. Read more >> http://oxleyconsults.com.ng/job-profiles/system-control-analyst 12. Security Operations Center (SOC) Analyst The primary responsibility of a security operations center (SOC) analyst is to ensure that the organization’s information assets are protected from compromise arising from unauthorized access (Confidentiality risk), unauthorized alteration of data/information (integrity risk) and denial of service (availability risk). Read more http://oxleyconsults.com.ng/job-profiles/security-operations-center-analyst 13. Security Information and Event Management (SIEM) Analyst The security information and event analyst (SIEM) analyst is responsible for the collection, analysis and validation of all Security information and event management (SIEM) activities that impact the organization either from within the network or outside its network. Read more >> http://oxleyconsults.com.ng/job-profiles/security-information-and-event-management-analyst 14. IT Business Relationship Manager An IT Business Relationship Manager (IT BRM) is a liaison officer for the IT department and interfaces with other departments in an organization. In other words, departments that provides services to IT or consumes IT services liaise with an IT business relationship manager (IT BRM) to communicate requirements needed to effectively provide IT services to the departments. Read more http://oxleyconsults.com.ng/job-profiles/it-business-relationship-manager Other are; 13. User management Analyst 14. Software Solution Testers 15. Release Manager 18. Software Developers, System Software 19. Software Developers, Application Software 20. Ethical Hacker 21. Penetration Tester 22. Vulnerability Assessor 23. Cryptographer 24. Forensic Expert 25. Incident Responder 26. Source Code Auditor 27. Mobile App Developer For more on the above and detail job requirements/description, required skill set/experience and professional certification(s) to become any of the above, visit http://oxleyconsults.com.ng/aritcle/top-it-jobs-of-21century |
(1) (Reply)
N-power Announces Alternative For Candidates / Sales Girl Needed For A Phone Shop In Galadimawa Abuja / Graduate Trainees Vacancy At UBA Bank | September, 2018
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 18 |