How much crap does an IT specialist have to put up with today
May 2, 2024Below are the IT and Business skill and technical certifications necessary for a long a successful IT career.
Items to Consider
Target Behaviors: Analysis and Problem Solving
1) Follows technical interrelated sets of complex issues without difficulty
2) Asks clarifying and shaping questions geared towards thoroughly assessing critical issues
3) Demonstrates creative and occasionally innovative approaches to information gathering within a structured framework
4) Able to enlist the aid of client staff to provide more information/time than originally requested/agreed
5) Structures complex problems, demonstrating understanding of pros and cons of alternative approaches to structuring
6) Draws sound conclusions, applying previous experience and best practices
7) Comfortably handles shifting problems and issues, quickly integrating new findings
8) Makes distinctive recommendations which clearly demonstrate a comprehensive understanding of the issues, best practices and risk factors, and can be implemented by the client
Client / Business Development
1) Develops strength of relationship that could/does result in follow-on work
2) Understands the implications of the client’s culture and uses this knowledge to increase effectiveness
3) Maintains close contact with client during course of engagement to ensure client goals and concerns are understood and are being addressed by the program of work
4) Identifies areas of client need; works with Organization Leadership to scope them, then provides support in development discussions, preparation and negotiation of arrangement
5) Provides insights and input to new opportunities that result in compelling proposals
IP and Capability Development
1) Actively uses assignments to test new concepts or techniques, enhancing personal and organizational capability
2) Develops and utilizes network of internal and external contacts to enhance thinking
3) Is a “go to” person for advice on complex issues in area of expertise
4) Contributes to the development and delivery of internal training
5) Looks for opportunities to at least co-author/co-present to external audiences in area of specialization
6) Documents insights and re-usable deliverables and encourages their uptake
7) Identifies needs and opportunities for Practice development and proposes plans and solutions to capitalize on those opportunities
Self, Work and Client Management
1) Prepares project plans that are realistic and achievable
2) Communicates expectations to project team members regarding deliverable content and quality and establishes and communicates standards for deliverables
3) Manages scope, changes to assignments and priorities as the project situation changes
4) Effectively monitors the quality and timeliness of delivery of Organization engagements, taking action where appropriate to mitigate emerging risks
5) Manages timely resolution of project (technical, schedule, scope and risk) issues
6) Quickly identifies situations in which client is falling short on commitments and raises issue in a manner that contributes to its resolution
7) Effectively communicates project status to Organization and client management
Leadership
1) Initiative to learn and take initiative
2) Working knowledge of the IT Infrastructure and IT Security Industry
3) Good communalization and Presentation Skills
4) Is a role model for Organizational Values, making decisions that support our Mission and Vision
5) Demonstrates intellectual rigor
6) Leads team to reconsider critical issues by presenting ideas in new ways or with new supporting data
7) Demonstrates significant initiative in area of expertise, enabling movement of the company along a particular strategic or operational dimension
8) Asks questions that help shape others’ thinking
9) Holds self and others accountable for actions and outcomes
10) Demonstrates multi-dimensional decision making that accounts for business, people and client outcomes
Technical IT skills needed
Security Industry Certifications, Knowledge, Practical and Professional Experience:
1) CISSP or equivalence practical and academic experience (over-rated), proven experience it 10 times more worth while
a. Security+
2) CCNA
3) Firewalls;
b. Netscreen
c. Checkpoint
d. Cisco PIX
e. Sidewinder
4) Proxies:
f. Bluecoat
g. Websense
h. MS ISA
5) MCSE/MCSA
i. MS Windows 2008 or 2012
j. MCDST
k. MCTS
6) Certifications:
l. Linux
m. Unix
n. ITIL
o. PMI
Experience in enterprise technology deployments
1) Ability to translate the customer business needs into a customized proof of concept to demonstrate business value.
2) Project experience with IT security technologies.
3) Knowledge of security policy definition, user provisioning.
4) Working knowledge of multiple operating systems, including Windows, Unix and Linux
- Ability to articulate the architecture of Unix OS and user of NIS / LDAP.
- Ability to articulate the architecture of SANS or similar technologies
- Ability to articulate the concept of Unix system kernel
- Authentication;
i. Ability to articulate a password sync solution for Unix, NT, Linux and Mainframe identity management solutions.
ii. Ability to articulate the concept of super-user containment and delegation.
iii. Experience integrating biometric and other Single Sign-On hardware components.
iv. Smart Cards, Token technologies, fingerprint / inis / etc. Technologies.
v. Ability to articulate the concept of User ID Synchronization and how it effects access controls.
vi. Ability to articulate the concepts related to integration of mainframe and client server access and identity management solutions.
5) Ability to articulate the architecture of Windows operating systems and Active Directory Architecture.
a. Describe methods for design / suggestions for directory schema enhancements for performance.
b. A Should include concepts related to partitioning, replicas, fault tolerance and load balancing methods.
c. Discuss the business advantages of a directory backbone.
d. Ability to articulate the concepts of user provisioning workflow (e.g. business approver, technical approver, regular, “HR” manager, etc…)
6) Ability to articulate the concepts of platform hardening
7) Ability to locate and modify the configuration files on the Windows platform
8) Ability to articulate the concept of strong protection around critical applications and data.
9) Ability to describe and demonstrate chalk / white board identity and access control integration components.
10) Describe the concepts and design methods to improve the identity and reliability of directory services.
11) Ability to tailor an identity and Access Management demonstration to a client’s
specific business issues.
12) Ability to articulate the value of a combined access and Identity Management solution.
13) Ability to demonstrate via chalk-talk / whiteboard identity management architecture.
e. Ability to demonstrate access management product integration into enterprise and security management solutions.
f. Ability to translate a proposed identity / access management solution into a valid technical architecture.
14) Experience with directory technologies including MSAD, LDAP, x.500, Novell, Sun etc…
15) Ability to articulate LDAP, CIM, x.500 from IETF, DTMF and ITU.
16) Ability to articulate the concepts of Web services.
17) Ability to articulate the integration between access control and high availability software.
18) Convey the differences between standalone, enterprise, backbone and empire directories.
19) Articulate the security of SSL / TLS.
g. Describe the technical drivers for x.509 / SSL.
h. Convey the performance advantages of SQL, Oracle, DBMS and RDBMS.