Career advice: The most promising IT skills right now
Premier 100 IT Leader Vince Campisi also answers questions on making a belated entry to the profession
Computerworld - Ask a Premier 100 IT Leader Vince Campisi Title: CIO Company: GE Intelligent Platforms
Campisi is this month's Premier 100 IT Leader. If you have a question you'd like to pose to one of Computerworld's Premier 100 IT Leaders, send it to email@example.com.
What are the two or three most promising IT technical skills for the next few years? It isn't a big stretch to predict that roles related to data management and analytics will continue to be in high demand. But I feel that the traditional business intelligence skills are evolving. The paradigms and tools around data replication, data storage and data visualization already look quite different than they did just three to five years ago. A second skill I would highlight is enterprise architecture. These skills and roles aren't talked about now nearly as much as they were when SOA (service-oriented architecture) was such a big focus. I would contend that they are even more important now (and going forward) to truly reap the benefits posed by cloud, mobile and big data.
I am a registered nurse transitioning to IT security. I am in my fifties, so time is a factor and I cannot afford to make any missteps. I need to have an idea of what education (college) and certifications would be the best and quickest route to a top IT security position. Information security professionals have a wide variety of backgrounds, and many do not have a technical degree. I have worked with great people with backgrounds in fields such as psychology and history, for example. But we are now seeing graduates with college degrees in fields such as cybersecurity and risk analysis. Many employers are looking for this type of degree and/or a certification. My advice is to get involved in information security organizations and participate in industry conferences. This will help you establish contacts and become more familiar with IT security in general. Additionally, community colleges that offer courses in IT security are an alternative to pursuing a dedicated degree. Lastly, be sure to target the right entry positions; for example, access management is less technical in nature and can help you segue into a career in IT security.
After serving in Iraq, I went to school for a computer science degree. I will be 29 when I graduate. Will my age hurt my chances in the job market, and if so, how can I offset that? First, thank you for your service! I am confident that the leadership, integrity and commitment to excellence instilled through participation in military service will be important career differentiators for you. Those skills, coupled with your computer science degree, should serve you well in your job search. In fact, you will find that most companies have targeted efforts to recruit veterans, and they do this precisely because of those differentiating skills learned through military service. Just to help illustrate the point, is my company's website for recruiting folks just like you.
More Ask a P100 IT Leader columns
- Career advice: Learn from your mistakes
- Career advice: Moving into Internet security
- Career advice: What separates leaders from managers?
- Career advice: Do IT pros need to know about business?
- Career advice: Initiating change from below
- Career advice: Where to focus? Data, data, data
- Career advice: Moving to the public sector
- Career advice: Fiftysomething and looking for a job
- Career advice: Making IT more influential in the business
- Career advice: Grasping the business
Read more about IT Careers in Computerworld's IT Careers Topic Center.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility Lacking the time for proper training and education, SMB administrators often resort to taking shortcuts to keep their environment running.This paper discusses the...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All IT Careers White Papers | Webcasts