14
1 Career Management Website

IT Career Suite Illustration

Embed Size (px)

Citation preview

Page 1: IT Career Suite Illustration

1

Career Management Website

Page 2: IT Career Suite Illustration

2

Page 3: IT Career Suite Illustration

3Continued on next page.

Page 4: IT Career Suite Illustration

4

Career Paths, Continued

Page 5: IT Career Suite Illustration

5

IT Configuration ManagementGS 11-13HardwareMove 2

IT Asset ManagementGS 5-9

Policy & PlanningStart

Database AdministrationGS 9-12SoftwareMove 1

Scenario: John is a GS-9 2210 IT Asset Management Specialist. He wants to position himself to become well rounded in various areas of IT, and eventually become an (Senior Executive Service (SES). This path will illustrate one possible way John can achieve this goal.

Move 1: John made a lateral move to Database Administration and was later promoted to GS-12.

Move 2: John took a downgrade to GS-11 IT Configuration Management and was later promoted to GS-13.

Move 3: John made a lateral move to GS-13 Knowledge Management and was later promoted to GS-15.

Move 4: John was selected for SES.

As John moved, requirements for each position changed. John had to acquire differential competencies of each position by attending technical training and participating in developmental activities.

Note: You do not have to take a downgrade to position yourself for advancement.

Knowledge ManagementGS 13-15SoftwareMove 3

SESMove 4

Horizontal Career Move ExampleBreadth and Depth = Strong Competitor

Page 6: IT Career Suite Illustration

6Continued on next page.

Page 7: IT Career Suite Illustration

7

Career Paths: Policy & Planning, Continued.

Page 8: IT Career Suite Illustration

8

SES

IT Asset Management

GS 5/15

IT Business RelationshipManagement

GS 12/15

IT Capital Planning/InvestmentGS 12/15

IT Enterprise Architecture

GS 12/15

IT Portfolio Management

GS 12/15

IT Quality Process Engineering

GS 12/15

IT Technical Architecture

GS 12/15

IT Workforce Management/Development

GS 12/15

IT Project/Program LeaderGS 9/15

OI&T Management Local(Facility CIO)

GS 12/14

Policy & Planning IT Specialties

IT Performance Management

GS 12/15

OI&T ManagementGS 14/15

IT Specialists in the Hardware and Software career paths may consider career moves into the Policy & Planning career path where there is more opportunity to progress to the GS 15 grade level.

IT PrivacyProtection

GS 5/15

IT Records Management

GS 5/15

IT Security/Information Assurance

GS 9/15

IT Business Continuity

GS 9/15

Page 9: IT Career Suite Illustration

9

Continued on next page.

Page 10: IT Career Suite Illustration

10

Career Path: Policy and Planning: Privacy Protection, continued

Page 11: IT Career Suite Illustration

11Continued on next page.

Page 12: IT Career Suite Illustration

12

Privacy Protection, Continued.

Page 13: IT Career Suite Illustration

13

IT SpecialistGS 5/12

Promotion/transfer from another job specialty.

OI&T ManagementGS 14/15

IT Project/Program Leader GS 9/159/12 Project Coordinator12/15 Project/Program Manager

SES

OI&T Management Local(Facility CIO)

GS 12/14

IT Records Management GS 9/1514/15 Team Leader, Web Master, COTR-Electronic Records12/13 Technical Representative, Requirements Analyst, Web Specialist9/11 Policy and Planner, Customer Support Specialist5/7 Intern/Trainee, Customer Support Assistant/Technician

IT Privacy Protection GS 5/1514/15 Team Leader, Web Master, COTR-Electronic Records12/13 Technical Representative, Requirements Analyst, Web Specialist9/11 Policy and Planner, Customer Support Specialist5/7 Intern/Trainee, Customer Support Assistant/Technician

Career Path Privacy Protection and Records Management

Page 14: IT Career Suite Illustration

14

Comprehensive Job Specialty Overview

Privacy ProtectionGrade, Recommended

Level of Proficiency, and Position Titles

Core, Differential General and Technical Competencies

Scope of Work Complexity, Typical Responsibilities, and Typical Education/Experience

Recommended Training and Developmental Activities

GS 12-13Proficiency Level C:Advanced

Technical RepresentativeRequirements AnalystWeb SpecialistPolicy and Planner

Core:Communications (Oral and Written)Creative ThinkingCustomer ServiceFlexibilityInformation ManagementOrganizational AwarenessPlanning and EvaluationTeamwork

General:Business Enterprise KnowledgeBusiness Operations AnalysisDecision-MakingLegal, Government, and JurisprudencePublic Safety and Security

Technical:Configuration ManagementInformation Resources Strategy and PlanningModeling and SimulationOperations SupportRisk ManagementTechnical Documentation

Work Complexity – Leads the activities associated with privacy protection throughout the life cycle of creation, maintenance, preservation, use, and disposition. Works on multiple projects as a team leader or as a subject matter expert (SME).

Typical Responsibilities – Responsible for leading effective and appropriate management of privacy information to ensure it is protected from unauthorized disclosure or loss. Leads a cross-functional oversight team consisting of representatives from the IT, legal, finance, and business departments to develop an enterprise privacy strategy and policy. Implements and monitors a consistent set of policies and processes related to protection of personally identifiable information (PII). Advises on a policy framework for how people are expected to manage the information they collect and maintain and use information systems to track and identify areas where privacy may be compromised. Works with Corporate Security teams to develop, implement, and enhance workflow and operational processes for protection of PII. Formulates best practices improvements and conversion approaches, and selects and deploys the technology that best fits requirements and content infrastructure. Establishes continuous audit and review processes to ensure compliance with legal and enterprise policies. Trains employees who create and use information advising key employees of the ramifications of the misuses or mishandling of PIl. Facilitates the development of security measures and classification systems to meet legal requirements for the protection of certain types of information that could be considered private. Evaluates user requirements and interfaces and advises customers in content, media, and identifies the most appropriate privacy management resources. Designs and recommends training and awareness products using a range of interface requirements, such as web pages, document libraries, workflows, versioning, organization, protection and security, documentation, style guidelines, and governance methods. Plans, develops, implements, and administers privacy protection management systems and websites. Ensures that relevant legislative and compliance requirements are met. Oversees privacy protection in all types of information from paper to electronic. Designs ad hoc reports. Communicates to upper management and provides reports regarding the quality and progress of the Privacy Protection Program. Assists security in developing maintenance procedures and scripts. Assists in resolving problems with protecting PII through effective use of software and other information management resources. Provides training on the privacy protection policy and systems.

Typical Education/Experience – Bachelor degree in Programming/Systems or Computer Science, specialized training, certification, or equivalent work experience. Typically requires 5-7 years of experience providing document/knowledge management support and 2 years designing and engineering automated records management.

-ARMA International, www.arma.org-Certified International Privacy Professional/Government-Contracting Officer Technical Representative Certification-American Society of Access Professionals (ASAP) conferences and meetings, www.accesspro.org-International Association of Privacy Professionals conferences and meetings, www.privacyassociation.org-INFOSEC conference-Paralegal courses on Privacy Act, HIPAA, and privacy protections under the E-Government Act and the Freedom of Information Act