top of page

Fitness Group

Public·17 members

Jobs Information Technology ^NEW^

The site is secure. Thehttps:// ensures that you are connecting to the official website and that anyinformation you provide is encrypted and transmitted securely.

jobs information technology

Overall employment in computer and information technology occupations is projected to grow 15 percent from 2021 to 2031, much faster than the average for all occupations; this increase is expected to result in about 682,800 new jobs over the decade. In addition to new jobs from growth, opportunities arise from the need to replace workers who leave their occupations permanently. About 418,500 openings each year, on average, are projected to come from growth and replacement needs.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Computer specialist jobs at FDA include positions involving responsibility for designing, implementing, maintaining, or modifying systems for solving problems or accomplishing work processes by the use of digital computers.

This series specification describes nine information technology classifications used to perform a variety of tasks in support of systems and services in the following six domains or closely related emerging information technology fields:

Business Technology Management - The management of information technology resources according to an organization's priorities and needs including activities such as information technology policy and program development, information technology portfolio management, information technology procurement, service performance management, process reengineering, business analysis, research and development, strategic planning, digital service user experience engagement, content design, and product and delivery strategy.

Information Security Engineering - The security aspects of the initiation, design, development, testing, operation, and defense of information technology data and environments to address sources of disruption, ranging from natural disasters to malicious acts.

Information Technology Project Management - The management or oversight of all phases of the project management and system development life cycles to ensure efficient and effective delivery of a unique information technology product, service, or system.

Incumbents may install or repair hardware or peripheral equipment; manage user accounts and technology inventory; resolve client incidents or requests; ensure software/hardware compliance with security policies; create, test, maintain, and deploy desktop products; configure and/or modify software programs; perform data import and export activities; monitor information technology systems to ensure integrity and tune the system to meet performance requirements; troubleshoot routine issues; and other related activities.

Incumbents may execute guidelines for technology governance and process improvement; track, monitor, and audit information technology assets; analyze, develop and document business processes; formulate, deliver, and coordinate end user training; resolve client incidents or requests; install, configure, maintain, and troubleshoot applications; research and analyze new client technologies; develop and update controls to ensure availability of systems and databases; maintain software product documentation; design, develop, and implement software that adheres to organizational enterprise requirements; create, enhance, and maintain information technology software solutions; gather, document, and review system requirements and specifications; and test, debug, and evaluate software systems functionality.

Incumbents may: perform feasibility studies and research analysis related to technology projects; provide information technology consultation in support of business programs; establish inventory management guidelines; provide metrics on service level agreements; install or repair hardware or peripheral equipment; develop, implement, and maintain security and privacy training; investigate security incidents; develop and/or review data sharing agreements prior to release of confidential information; analyze business impact and exposure based on emerging security threats; monitor project milestones and deliverables; coordinate and consult with users, administrators, and engineers to identify business and technical requirements; develop and sustain cooperative working relationships with project stakeholders; perform software product deployment and release management activities; define and design software solutions; identify infrastructure system requirements and recommend technology, hardware, software, and plans installation; advise, create, or participate in the design of new system architecture, standards, and methods to support organizational needs; install, configure, administer, test, and maintain communication infrastructure systems; conduct research and perform analysis to recommend system upgrades, cost-effective solutions, and process improvements; troubleshoot, track, and conduct root cause analysis of system/database/operational issues; and act in a lead role over lower-level staff.

Under general direction, incumbents demonstrate a depth of leadership and expertise in one or more domains. Incumbents perform a wide variety of tasks requiring innovative problem-solving where guidance is not readily available. Incumbents optimize and apply architecture solutions for the benefit of the overall organization and play a major role in advising management or formulating information technology strategy and policy within the organization. Incumbents typically work in the Software Engineering, Information Security Engineering, Information Technology Project Management, or System Engineering domains.

Incumbents may: develop and ensure security solutions and technical artifacts are in place throughout all information technology systems and platforms; monitor and assess security controls, conduct security impact analyses, and report system security statuses; perform risk assessments and recommend information technology solutions; analyze incident-related data and determine the appropriate response; design new technologies, architectures, and solutions that will support security requirements; develop implementation plans including cost-benefit or return on investment analyses; design infrastructure configuration and change management standards or requirements; develop or update project plans for information technology projects; lead and mentor project teams; manage integration of information systems and/or subsystems; manage project(s) to ensure adherence to budget, schedule, and scope; review software architecture and make recommendations regarding technical and operational feasibility; plan, design, and implement the enterprise data models using standardized modeling tools to align technology solutions with business strategies; perform configuration management and release management for system components; verify stability, interoperability, portability, security, or scalability of system architecture; create backup and recovery strategies; conduct disaster and recovery analysis, planning, implementation, and administration for systems; and monitor and conduct audits of system capacity, performance, and traffic analysis.

This is the expert advisor level. Under administrative direction, incumbents demonstrate strategic technical leadership, influence, and expertise that drive the organization's use of technology toward constant improvements. Incumbents represent the highest level of expertise available in state service within the Software Engineering, Information Security Engineering, Information Technology Project Management, or System Engineering domains. Incumbents develop the enterprise information technology architecture direction of the organization and advise management and executive level staff on governance and policy that support forward movement. Incumbents may have extensive decision-making authority and direct the most critical/complex projects where the consequence of error may have a serious detrimental effect on the operating efficiency of the organization.

Incumbents may: develop policies and procedures; develop multi-departmental systems; plan, develop, and document policies, requirements, and methodologies; enforce compliance with policies and requirements, and make recommendations; implement security and privacy controls across multiple information technology disciplines; direct or coordinate duties and responsibilities to project personnel; negotiate with project stakeholders or suppliers; conduct presentations or briefings to executive management; guide the development and elaboration of plans and artifacts; provide leadership, guidance, training, and support to project team members; determine the objectives and measures upon which the project will be evaluated; develop and analyze performance and capacity reports; develop and modify technical specifications; develop and implement standards and controls; contribute in the planning of the overall organizational information technology strategy; design, implement, and maintain system architecture across multiple platforms; and coordinate infrastructure system design, modification, upgrade, and implementation.

This is the working supervisory level. Under direction, incumbents plan, assign, and review the work of an information technology program or unit and personally perform the most difficult or sensitive work. This level may supervise lower level information technology and support staff.

This is the full supervisory level. Under general direction, incumbents plan, organize, and direct the work of one or more information technology programs or units, and may occasionally perform the most difficult or sensitive work. This level directly or indirectly supervises all lower level information technology and support staff performing work in any domain or combination of domains. At this level, incumbents may also: identify, document, and monitor defined service levels and performance management standards; manage contracts; ensure compliance to project management standards; develop scope of work; and participate in vendor/product solution evaluation and selection. 041b061a72


Welcome to the group! You can connect with other members, ge...
Group Page: Groups_SingleGroup
bottom of page