SlideShare a Scribd company logo
1 of 8
JOB SEARCH PAPER
The three most interesting jobs chosen for this assignment are
as follows information security analyst, computer network
architects and web developers. For all of the following a job
listing will be found that is currently available on the popular
website monster.com. A full explanation will be provided about
each of the three job descriptions.
Information security analyst
Ability to conduct independent research and analyze complex
requirements, security standards, determining impact and
implementation.Ability to understand, develop and propose
changes to internal procedures in response to environmental
changes.Ability to keep up-to-date with new technologies and
new threats and determine their impact.Ability to meet
deadlines and deliver quality work in a fast paced
environment.ITIL Practitioner level knowledge o willingness to
quickly gain knowledge, applied to processes where role is
applicable.Project Management experience/certification,
preferred.
Computer network architects
Experiencedeveloping, testing,
andsupportingnetworkmanagement, network monitoring,
andnetworktroubleshootingapplicationsinmultiplesystem
environments.Supporttheanalysisofnetworkutilizationmodels,
logicalspecifications
and/oruserrequirementstodesignandsupportsolutionsforthenetwo
rk applicationenvironment.
Web developers- Insight Global Seattle, WA 98104
Client side JS experience on many browsers, including mobile,
and including cross site scripting understanding
AJAX experience with REST API's
CSS on many browsers, including mobile
HTML on many browsers, including mobile
Ability to implement from a PSD mockup
Personal skills, ability to talk to different clients
Some experience coding the middle tier with Java or PHP
Thisfieldrequiresknowledgeofinformationtechnologywhichisuse
dto improveinformationmanagement, organization,
securityandinterpretation.Hereyoucanworkforfirmstohelpthempr
otecttheirvaluableinformation fromcyber-attacksand crimes.
Theseareperfectfieldsinwhichyoucanearngoodmoneywithoutwor
king full time.These jobs
allowyoutoworkoncontractsandearnmoreandworkatyour
owntimeandpaceaswellasonyourownterms.
Larry Neal
CIS 120A
Assignment 3
November 18, 2012
Part I
Computer scientists study a wide range of theory and
practical programs that aim at promoting computer
technologies. The basic task of a computer scientist is designing
and setting up computer software. The knowledge that computer
scientists acquire also help them formulate better ways of using
the computer as well as advance other related sectors of
technology. In addition, a computer scientist studies how to
solve problems that affect the efficiency of computers such as
security details and information storage in general. A software
engineer works to create, formulate and preserve software
systems as well as ensure their efficient functioning and
reliability. A software engineer requires basic computation
skills as well as programming knowledge that work together in
solving critical software issues that are based on computer
hardware.
A computer engineer is a person who basically works on
designing digital software and hardware systems. The basic
skills acquired are focused on designing communication systems
and digital devices that are made of computers or work closely
with computers. The hardware of digital devices like hospital
machinery, cell phones and other electronics all require
integration by a computer engineer. An information technology
expert has experience in technological fields due to a
combination of practical and theoretical knowledge that is
required in all sectors of the modern world.
This field has a complex form of training foundation and for
any person to make it; a lot of work and accuracy is needed. An
information system professional is a person who focuses on
delivering information to all through computer technology. One
works on developing the required information and delivering it
to those who want it in a form that can be easily read and
understood. A management information systems expert works to
process, organize and manage quantitative computer
technological skills.
Part II
Various Computer Careers
Modern day technology has made computers the driving
engine of all aspects of life; education, health, communication
and entertainment all require computers to boost efficient
functionality. There are numerous computer careers that are
studied all over the world. Since computers are the basics of
technology, there are new courses that are being created every
time to advance the effectiveness of computer knowledge and
practices with the purpose of improving life. Today, dozens of
tailor-made career are being formulated to curb the rising
complexities and challenges that come with the computer age
and growth. Below are some of the most effective computer
careers that have boosted the advancement in technology.
Computer support specialists’ jobs are just gaining demand
due to the growth in computer networking. The function of this
particular expert is to provide clients with assistance, advice
and technical support in managing the performance of their
specific computer devices. Here they are basically involved in
providing assistance with software and hardware systems by
interpreting the real problem and offering solutions. These
experts may work under an organization where they offer
computer solutions to clients who walk in or call for technical
assistance.
Systems administrators on the other hand work to improve as
well as provide network availability and efficiency. The
performance and organization of computer network on a day to
day basis solely depends on them. For a credible qualification in
the field, one has to have a bachelor’s degree or a certificate in
the related field. The career has become a full time job in the
recent years with an approximate salary of $ 70,000. The field
is gaining much demand with the increase in computer network
needs thus many students are taking up the course due to the
readily available job market.
Database administrator is yet another computer science
career that is really growing fast. This field has attracted
millions of qualified workers as it directly deals with the
efficient use computer software to organize as well as store data
in the simplest way. Database administrators work in a variety
of organizations in all sectors the social-economic fields. This
can range from shipping companies to financial organizations
that have any form of information records. Here they ensure
data is safely stored and readily available to users as well as
unavailable to unauthorized parties. To be qualified in the field,
you must have a degree in the relevant field and the pay
averages at around $ 73,500.
Software developers are experts who have taken computer
technology to a whole new level and made the impossible
possible. These experts work to create applications that allow
computer users to do and experience things without manually
performing them. In addition, several devices or computer
gadgets can perform a similar task to various users through the
network. The basic aspect of this field is the ability to control
networks that run specific devices. The pay of a software
developer ranges from about $ 90,000-$ 90,530. A bachelor’s
degree is essential in this field so as to ensure sufficient skills
are acquired to crack this complex field.
The most interesting of all is the information security
analyst, computer network architects and web developers. This
field requires knowledge of information technology which is
used to improve information management, organization, security
and interpretation. The most interesting part is that cracking the
information codes and basics is fun and exciting to perform.
Here you can work for firms to help them protect their valuable
information from cyber-attacks and crimes. In addition they
create and formulate an internal network to improve
performance of firms’ employees as well as put up websites for
companies to sell themselves. These are perfect fields in which
you can earn good money without working full time. These jobs
allow you to work on contracts and earn more and work at your
own time and pace as well as on your own terms.
Reference Citations:
. U.S. Department of Labor, Bureau of Labor
. Occupational Outlook Handbook, 2008-09 Edition Web site
. http://computingcareers.acm.org/?page_id=8
. www.bls.gov/oco/ocos268.htm
. Reece, Tamekia. Career World Oct. 2009: 20-23. Print.
Larry Neal
CIS 120A
Assignment 3
November 4, 2012
Page 1 Copyright © [2011] Darrel Karbginsky
Revised: September 5, 2011
CIS120A Jobs Search
Jobs in Computer Information Systems & Information
Technology
For this assignment you will explore some technical career sites
and perform research
into different Computer Information Systems, Computer
Science, and/or Information
Technology jobs. You will write and turn in a paper on what
you found.
Go to one or more of the many Internet Job Web sites found on
the World Wide Web.
Some are http://dice.com, and http://monster.com. There are of
course many more
including your local newspapers.
Search out three different CS/CIS/or IT jobs that interest you
and research what job
skills and education you need for each job. You should be
relating this to the
occupation you wrote about in your last assignment (I will be
checking). In your paper
give a complete description of each job
1
, where you found the job, where is the job
located, what does it pay, what skills and education are needed?
What To Turn In
You will write a paper and in addition to the information
required from above answer the
following questions in your paper. By now you should know
how to turn your work in.
Is this job(s) just a stepping stone to something bigger and
better in future? Why does
each of the different jobs interest you? Also describe where
you would see yourself
professionally 5, 10, and 20 years down the road if you were to
work at these jobs. I am
looking for college level essay writing here and will grade
accordingly. Please refer to
the grading rubric given for the last assignment.
1
You may copy and paste job descriptions word for word from
the web so long as you format the text to
match your own; also provide citations when you copy. MLA
style citations.
http://dice.com/
http://monster.com/

More Related Content

Similar to JOB SEARCH PAPERThe three most interesting jobs chosen for t.docx

MICROSOFT WORD RESEARCH ASSIGNMENT BaqibillahSOFTWARE D
MICROSOFT WORD RESEARCH ASSIGNMENT    BaqibillahSOFTWARE DMICROSOFT WORD RESEARCH ASSIGNMENT    BaqibillahSOFTWARE D
MICROSOFT WORD RESEARCH ASSIGNMENT BaqibillahSOFTWARE D
DioneWang844
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
Heidi Maestas
 

Similar to JOB SEARCH PAPERThe three most interesting jobs chosen for t.docx (20)

Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
Recent trends in career choices.pptx
Recent trends in career choices.pptxRecent trends in career choices.pptx
Recent trends in career choices.pptx
 
Tech Jobs That Don’t Require Coding .pptx
Tech Jobs That Don’t Require Coding .pptxTech Jobs That Don’t Require Coding .pptx
Tech Jobs That Don’t Require Coding .pptx
 
Bachelor of Information Technology Sydney
Bachelor of Information Technology SydneyBachelor of Information Technology Sydney
Bachelor of Information Technology Sydney
 
Careers in it
Careers in itCareers in it
Careers in it
 
Management Information Systems Course Project
Management Information Systems Course ProjectManagement Information Systems Course Project
Management Information Systems Course Project
 
Bachelor Of Information Technology Australia
Bachelor Of Information Technology AustraliaBachelor Of Information Technology Australia
Bachelor Of Information Technology Australia
 
Top 10 best career option for next 10 years
Top 10 best career option for next 10 yearsTop 10 best career option for next 10 years
Top 10 best career option for next 10 years
 
From Novice to Network Administrator Starting Your IT Journey (1).pdf
From Novice to Network Administrator Starting Your IT Journey (1).pdfFrom Novice to Network Administrator Starting Your IT Journey (1).pdf
From Novice to Network Administrator Starting Your IT Journey (1).pdf
 
What skills are essential for a successful career in information technology.docx
What skills are essential for a successful career in information technology.docxWhat skills are essential for a successful career in information technology.docx
What skills are essential for a successful career in information technology.docx
 
MICROSOFT WORD RESEARCH ASSIGNMENT BaqibillahSOFTWARE D
MICROSOFT WORD RESEARCH ASSIGNMENT    BaqibillahSOFTWARE DMICROSOFT WORD RESEARCH ASSIGNMENT    BaqibillahSOFTWARE D
MICROSOFT WORD RESEARCH ASSIGNMENT BaqibillahSOFTWARE D
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Master of IT Australia
Master of IT AustraliaMaster of IT Australia
Master of IT Australia
 
IT Career Development - An Introduction into the Industry
IT Career Development - An Introduction into the IndustryIT Career Development - An Introduction into the Industry
IT Career Development - An Introduction into the Industry
 
CAREER IN I.T.
CAREER IN I.T.CAREER IN I.T.
CAREER IN I.T.
 
Brandon miller final sls
Brandon miller final slsBrandon miller final sls
Brandon miller final sls
 
Brandon miller final sls
Brandon miller final slsBrandon miller final sls
Brandon miller final sls
 
Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021
 

More from priestmanmable

9©iStockphotoThinkstockPlanning for Material and Reso.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docx9©iStockphotoThinkstockPlanning for Material and Reso.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docx
priestmanmable
 
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
priestmanmable
 
A ) Society perspective90 year old female, Mrs. Ruth, from h.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docxA ) Society perspective90 year old female, Mrs. Ruth, from h.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docx
priestmanmable
 
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
priestmanmable
 
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
priestmanmable
 
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
priestmanmable
 
900 BritishJournalofNursing,2013,Vol22,No15©2.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docx900 BritishJournalofNursing,2013,Vol22,No15©2.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docx
priestmanmable
 
9 Augustine Confessions (selections) Augustine of Hi.docx
9 Augustine Confessions (selections) Augustine of Hi.docx9 Augustine Confessions (selections) Augustine of Hi.docx
9 Augustine Confessions (selections) Augustine of Hi.docx
priestmanmable
 
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
priestmanmable
 
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
priestmanmable
 
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
priestmanmable
 
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
priestmanmable
 
8.0 RESEARCH METHODS These guidelines address postgr.docx
8.0  RESEARCH METHODS  These guidelines address postgr.docx8.0  RESEARCH METHODS  These guidelines address postgr.docx
8.0 RESEARCH METHODS These guidelines address postgr.docx
priestmanmable
 
95People of AppalachianHeritageChapter 5KATHLEEN.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docx95People of AppalachianHeritageChapter 5KATHLEEN.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docx
priestmanmable
 
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
priestmanmable
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
priestmanmable
 

More from priestmanmable (20)

9©iStockphotoThinkstockPlanning for Material and Reso.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docx9©iStockphotoThinkstockPlanning for Material and Reso.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docx
 
a 12 page paper on how individuals of color would be a more dominant.docx
a 12 page paper on how individuals of color would be a more dominant.docxa 12 page paper on how individuals of color would be a more dominant.docx
a 12 page paper on how individuals of color would be a more dominant.docx
 
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
 
92 Academic Journal Article Critique  Help with Journal Ar.docx
92 Academic Journal Article Critique  Help with Journal Ar.docx92 Academic Journal Article Critique  Help with Journal Ar.docx
92 Academic Journal Article Critique  Help with Journal Ar.docx
 
A ) Society perspective90 year old female, Mrs. Ruth, from h.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docxA ) Society perspective90 year old female, Mrs. Ruth, from h.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docx
 
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
 
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
 
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
 
900 BritishJournalofNursing,2013,Vol22,No15©2.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docx900 BritishJournalofNursing,2013,Vol22,No15©2.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docx
 
9 Augustine Confessions (selections) Augustine of Hi.docx
9 Augustine Confessions (selections) Augustine of Hi.docx9 Augustine Confessions (selections) Augustine of Hi.docx
9 Augustine Confessions (selections) Augustine of Hi.docx
 
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
 
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
 
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
 
800 Words 42-year-old man presents to ED with 2-day history .docx
800 Words 42-year-old man presents to ED with 2-day history .docx800 Words 42-year-old man presents to ED with 2-day history .docx
800 Words 42-year-old man presents to ED with 2-day history .docx
 
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
 
8.0 RESEARCH METHODS These guidelines address postgr.docx
8.0  RESEARCH METHODS  These guidelines address postgr.docx8.0  RESEARCH METHODS  These guidelines address postgr.docx
8.0 RESEARCH METHODS These guidelines address postgr.docx
 
95People of AppalachianHeritageChapter 5KATHLEEN.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docx95People of AppalachianHeritageChapter 5KATHLEEN.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docx
 
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
 
8-10 slide Powerpoint The example company is Tesla.Instructions.docx
8-10 slide Powerpoint The example company is Tesla.Instructions.docx8-10 slide Powerpoint The example company is Tesla.Instructions.docx
8-10 slide Powerpoint The example company is Tesla.Instructions.docx
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

JOB SEARCH PAPERThe three most interesting jobs chosen for t.docx

  • 1. JOB SEARCH PAPER The three most interesting jobs chosen for this assignment are as follows information security analyst, computer network architects and web developers. For all of the following a job listing will be found that is currently available on the popular website monster.com. A full explanation will be provided about each of the three job descriptions. Information security analyst Ability to conduct independent research and analyze complex requirements, security standards, determining impact and implementation.Ability to understand, develop and propose changes to internal procedures in response to environmental changes.Ability to keep up-to-date with new technologies and new threats and determine their impact.Ability to meet deadlines and deliver quality work in a fast paced environment.ITIL Practitioner level knowledge o willingness to quickly gain knowledge, applied to processes where role is applicable.Project Management experience/certification, preferred. Computer network architects Experiencedeveloping, testing, andsupportingnetworkmanagement, network monitoring, andnetworktroubleshootingapplicationsinmultiplesystem environments.Supporttheanalysisofnetworkutilizationmodels, logicalspecifications and/oruserrequirementstodesignandsupportsolutionsforthenetwo rk applicationenvironment. Web developers- Insight Global Seattle, WA 98104 Client side JS experience on many browsers, including mobile, and including cross site scripting understanding
  • 2. AJAX experience with REST API's CSS on many browsers, including mobile HTML on many browsers, including mobile Ability to implement from a PSD mockup Personal skills, ability to talk to different clients Some experience coding the middle tier with Java or PHP Thisfieldrequiresknowledgeofinformationtechnologywhichisuse dto improveinformationmanagement, organization, securityandinterpretation.Hereyoucanworkforfirmstohelpthempr otecttheirvaluableinformation fromcyber-attacksand crimes. Theseareperfectfieldsinwhichyoucanearngoodmoneywithoutwor king full time.These jobs allowyoutoworkoncontractsandearnmoreandworkatyour owntimeandpaceaswellasonyourownterms. Larry Neal CIS 120A Assignment 3 November 18, 2012 Part I Computer scientists study a wide range of theory and practical programs that aim at promoting computer technologies. The basic task of a computer scientist is designing and setting up computer software. The knowledge that computer scientists acquire also help them formulate better ways of using the computer as well as advance other related sectors of
  • 3. technology. In addition, a computer scientist studies how to solve problems that affect the efficiency of computers such as security details and information storage in general. A software engineer works to create, formulate and preserve software systems as well as ensure their efficient functioning and reliability. A software engineer requires basic computation skills as well as programming knowledge that work together in solving critical software issues that are based on computer hardware. A computer engineer is a person who basically works on designing digital software and hardware systems. The basic skills acquired are focused on designing communication systems and digital devices that are made of computers or work closely with computers. The hardware of digital devices like hospital machinery, cell phones and other electronics all require integration by a computer engineer. An information technology expert has experience in technological fields due to a combination of practical and theoretical knowledge that is required in all sectors of the modern world. This field has a complex form of training foundation and for any person to make it; a lot of work and accuracy is needed. An information system professional is a person who focuses on delivering information to all through computer technology. One works on developing the required information and delivering it to those who want it in a form that can be easily read and understood. A management information systems expert works to process, organize and manage quantitative computer technological skills.
  • 4. Part II Various Computer Careers Modern day technology has made computers the driving engine of all aspects of life; education, health, communication and entertainment all require computers to boost efficient functionality. There are numerous computer careers that are studied all over the world. Since computers are the basics of technology, there are new courses that are being created every time to advance the effectiveness of computer knowledge and practices with the purpose of improving life. Today, dozens of tailor-made career are being formulated to curb the rising complexities and challenges that come with the computer age and growth. Below are some of the most effective computer careers that have boosted the advancement in technology. Computer support specialists’ jobs are just gaining demand due to the growth in computer networking. The function of this particular expert is to provide clients with assistance, advice and technical support in managing the performance of their specific computer devices. Here they are basically involved in providing assistance with software and hardware systems by interpreting the real problem and offering solutions. These experts may work under an organization where they offer computer solutions to clients who walk in or call for technical assistance. Systems administrators on the other hand work to improve as well as provide network availability and efficiency. The performance and organization of computer network on a day to day basis solely depends on them. For a credible qualification in the field, one has to have a bachelor’s degree or a certificate in the related field. The career has become a full time job in the recent years with an approximate salary of $ 70,000. The field
  • 5. is gaining much demand with the increase in computer network needs thus many students are taking up the course due to the readily available job market. Database administrator is yet another computer science career that is really growing fast. This field has attracted millions of qualified workers as it directly deals with the efficient use computer software to organize as well as store data in the simplest way. Database administrators work in a variety of organizations in all sectors the social-economic fields. This can range from shipping companies to financial organizations that have any form of information records. Here they ensure data is safely stored and readily available to users as well as unavailable to unauthorized parties. To be qualified in the field, you must have a degree in the relevant field and the pay averages at around $ 73,500. Software developers are experts who have taken computer technology to a whole new level and made the impossible possible. These experts work to create applications that allow computer users to do and experience things without manually performing them. In addition, several devices or computer gadgets can perform a similar task to various users through the network. The basic aspect of this field is the ability to control networks that run specific devices. The pay of a software developer ranges from about $ 90,000-$ 90,530. A bachelor’s degree is essential in this field so as to ensure sufficient skills are acquired to crack this complex field. The most interesting of all is the information security analyst, computer network architects and web developers. This field requires knowledge of information technology which is used to improve information management, organization, security and interpretation. The most interesting part is that cracking the information codes and basics is fun and exciting to perform. Here you can work for firms to help them protect their valuable
  • 6. information from cyber-attacks and crimes. In addition they create and formulate an internal network to improve performance of firms’ employees as well as put up websites for companies to sell themselves. These are perfect fields in which you can earn good money without working full time. These jobs allow you to work on contracts and earn more and work at your own time and pace as well as on your own terms. Reference Citations: . U.S. Department of Labor, Bureau of Labor . Occupational Outlook Handbook, 2008-09 Edition Web site . http://computingcareers.acm.org/?page_id=8 . www.bls.gov/oco/ocos268.htm . Reece, Tamekia. Career World Oct. 2009: 20-23. Print. Larry Neal CIS 120A Assignment 3 November 4, 2012 Page 1 Copyright © [2011] Darrel Karbginsky Revised: September 5, 2011
  • 7. CIS120A Jobs Search Jobs in Computer Information Systems & Information Technology For this assignment you will explore some technical career sites and perform research into different Computer Information Systems, Computer Science, and/or Information Technology jobs. You will write and turn in a paper on what you found. Go to one or more of the many Internet Job Web sites found on the World Wide Web. Some are http://dice.com, and http://monster.com. There are of course many more including your local newspapers. Search out three different CS/CIS/or IT jobs that interest you and research what job skills and education you need for each job. You should be relating this to the occupation you wrote about in your last assignment (I will be checking). In your paper give a complete description of each job 1 , where you found the job, where is the job located, what does it pay, what skills and education are needed? What To Turn In You will write a paper and in addition to the information
  • 8. required from above answer the following questions in your paper. By now you should know how to turn your work in. Is this job(s) just a stepping stone to something bigger and better in future? Why does each of the different jobs interest you? Also describe where you would see yourself professionally 5, 10, and 20 years down the road if you were to work at these jobs. I am looking for college level essay writing here and will grade accordingly. Please refer to the grading rubric given for the last assignment. 1 You may copy and paste job descriptions word for word from the web so long as you format the text to match your own; also provide citations when you copy. MLA style citations. http://dice.com/ http://monster.com/