It’s no secret that computers completely dominate the world. We can’t go a single day without interacting with a computer in some form. Self checkout at the grocery store, withdrawing money from an ATM, pumping gas, or evrn sitting at a traffic light. All of these things involve computers to some degree. The people behind the development, engineering, deployment and maintenance of these machines play an important role in our society. Having a career in technology can be rewarding a nd open many doors to a successful future since computers don’t seem to be going away anytime soon.
How does one get into the IT field though? What are some of the jobs in the IT field? Does it pay well? I’ll answer some of these questions and provide some useful resources and insight into the tech field.
Why get into Information Technology
Why not? The pay is amazing, you work with computers all day, most of these jobs are in climate controlled areas and the work is more taxing on the mind than it is the body. Everyone who got into the IT field has a different reason but one thing that I can say most of us all have in common is our love or curiosity of computers to some degree.
Military and Veteran Resources
Jobs in Information Technology
Lets take a look at some of the jobs that are in the IT field. There are MANY jobs in the IT field and I am not going to cover them all, but I am going to try to cover some of the more well known ones.
Help Desk Technician (IT Customer Support)
This is generally seen as THE entry level position for those interested in getting into the IT field who have no prior experience. Working in computer support is an excellent starting point for those trying to get some more hands on experience. There is no shortage of issues that the support specialist will see.
Working on the front lines are the IT Analysts. These specialists work on collecting information that is collected about user interaction from systems, analyzing the information and reporting the data results to stakeholders. This job is all about improving the efficiency of the systems that they monitor and they often provide valuable input to the team in order to make adjustments.
Network Architect and Network Engineer
While these names might be used interchangeably, they both have very specific roles although their roles might have some overlap in certain areas. Network Architects are mainly responsible for the designing of complex computer networks and systems. The Network Engineer is responsible for implementing the designs of the Architects that include installing and maintaining these computer networks.
Also known as DBAs, these administrators work on setting up, maintaining and upgrading the databases for an organization. DBAs ensure that the databases are operating efficiently. A database is software that structures and organizes data into different fields based on the relationship. Data needs to be secure and only accessed by authorized parties.
On the front lines of the security field are the Security Analyst’s sometimes known as SOC Analysts. These individuals monitor network entry points and endpoints for intrusion, suspicious activity and malicious actions. These analysts are trained to recognize a wide range of security vulnerabilities and remain relevant on new and emerging threats. When a security breach occurs, the analysts report the event.
While the analysts observe for threats in an environment, the security engineer is responsible for predicting threats and hardening networks against vulnerabilities. When a breach occurs, the network security engineers work on isolating the compromised host, quarantining, remediating, and brining systems back online. Security engineers also help maintain the security systems such as firewalls, intrusion detection/prevention systems, endpoint monitoring services and antivirus.
An ethical hacker works on the red team. They simulate a malicious threat actor by actively testing the security of various systems, web applications and networks. Pentesters even work on exploiting physical security as well as finding vulnerabilities in human behavior. Once these vulnerabilities are found, they are often written out in a summary report that is given to the client at the end of the test.
A computer programmer is someone who writes code. This code can be Python, Java, Ruby, HTML, etc. Programmers have a very strong understanding of the programming language that they specialize in. Any good programmer will be proficient in more than just one programming language. Programmers will usually have a bachelors degree at a minimum in addition to their years of experience. There is still a lot to learn for those who get into entry level positions as a programmer though.
C-Level Executive (CIO, CTO, CSO, CISO, Director, Manager)