it career suite illustration
TRANSCRIPT
1
Career Management Website
2
3Continued on next page.
4
Career Paths, Continued
5
IT Configuration ManagementGS 11-13HardwareMove 2
IT Asset ManagementGS 5-9
Policy & PlanningStart
Database AdministrationGS 9-12SoftwareMove 1
Scenario: John is a GS-9 2210 IT Asset Management Specialist. He wants to position himself to become well rounded in various areas of IT, and eventually become an (Senior Executive Service (SES). This path will illustrate one possible way John can achieve this goal.
Move 1: John made a lateral move to Database Administration and was later promoted to GS-12.
Move 2: John took a downgrade to GS-11 IT Configuration Management and was later promoted to GS-13.
Move 3: John made a lateral move to GS-13 Knowledge Management and was later promoted to GS-15.
Move 4: John was selected for SES.
As John moved, requirements for each position changed. John had to acquire differential competencies of each position by attending technical training and participating in developmental activities.
Note: You do not have to take a downgrade to position yourself for advancement.
Knowledge ManagementGS 13-15SoftwareMove 3
SESMove 4
Horizontal Career Move ExampleBreadth and Depth = Strong Competitor
6Continued on next page.
7
Career Paths: Policy & Planning, Continued.
8
SES
IT Asset Management
GS 5/15
IT Business RelationshipManagement
GS 12/15
IT Capital Planning/InvestmentGS 12/15
IT Enterprise Architecture
GS 12/15
IT Portfolio Management
GS 12/15
IT Quality Process Engineering
GS 12/15
IT Technical Architecture
GS 12/15
IT Workforce Management/Development
GS 12/15
IT Project/Program LeaderGS 9/15
OI&T Management Local(Facility CIO)
GS 12/14
Policy & Planning IT Specialties
IT Performance Management
GS 12/15
OI&T ManagementGS 14/15
IT Specialists in the Hardware and Software career paths may consider career moves into the Policy & Planning career path where there is more opportunity to progress to the GS 15 grade level.
IT PrivacyProtection
GS 5/15
IT Records Management
GS 5/15
IT Security/Information Assurance
GS 9/15
IT Business Continuity
GS 9/15
9
Continued on next page.
10
Career Path: Policy and Planning: Privacy Protection, continued
11Continued on next page.
12
Privacy Protection, Continued.
13
IT SpecialistGS 5/12
Promotion/transfer from another job specialty.
OI&T ManagementGS 14/15
IT Project/Program Leader GS 9/159/12 Project Coordinator12/15 Project/Program Manager
SES
OI&T Management Local(Facility CIO)
GS 12/14
IT Records Management GS 9/1514/15 Team Leader, Web Master, COTR-Electronic Records12/13 Technical Representative, Requirements Analyst, Web Specialist9/11 Policy and Planner, Customer Support Specialist5/7 Intern/Trainee, Customer Support Assistant/Technician
IT Privacy Protection GS 5/1514/15 Team Leader, Web Master, COTR-Electronic Records12/13 Technical Representative, Requirements Analyst, Web Specialist9/11 Policy and Planner, Customer Support Specialist5/7 Intern/Trainee, Customer Support Assistant/Technician
Career Path Privacy Protection and Records Management
14
Comprehensive Job Specialty Overview
Privacy ProtectionGrade, Recommended
Level of Proficiency, and Position Titles
Core, Differential General and Technical Competencies
Scope of Work Complexity, Typical Responsibilities, and Typical Education/Experience
Recommended Training and Developmental Activities
GS 12-13Proficiency Level C:Advanced
Technical RepresentativeRequirements AnalystWeb SpecialistPolicy and Planner
Core:Communications (Oral and Written)Creative ThinkingCustomer ServiceFlexibilityInformation ManagementOrganizational AwarenessPlanning and EvaluationTeamwork
General:Business Enterprise KnowledgeBusiness Operations AnalysisDecision-MakingLegal, Government, and JurisprudencePublic Safety and Security
Technical:Configuration ManagementInformation Resources Strategy and PlanningModeling and SimulationOperations SupportRisk ManagementTechnical Documentation
Work Complexity – Leads the activities associated with privacy protection throughout the life cycle of creation, maintenance, preservation, use, and disposition. Works on multiple projects as a team leader or as a subject matter expert (SME).
Typical Responsibilities – Responsible for leading effective and appropriate management of privacy information to ensure it is protected from unauthorized disclosure or loss. Leads a cross-functional oversight team consisting of representatives from the IT, legal, finance, and business departments to develop an enterprise privacy strategy and policy. Implements and monitors a consistent set of policies and processes related to protection of personally identifiable information (PII). Advises on a policy framework for how people are expected to manage the information they collect and maintain and use information systems to track and identify areas where privacy may be compromised. Works with Corporate Security teams to develop, implement, and enhance workflow and operational processes for protection of PII. Formulates best practices improvements and conversion approaches, and selects and deploys the technology that best fits requirements and content infrastructure. Establishes continuous audit and review processes to ensure compliance with legal and enterprise policies. Trains employees who create and use information advising key employees of the ramifications of the misuses or mishandling of PIl. Facilitates the development of security measures and classification systems to meet legal requirements for the protection of certain types of information that could be considered private. Evaluates user requirements and interfaces and advises customers in content, media, and identifies the most appropriate privacy management resources. Designs and recommends training and awareness products using a range of interface requirements, such as web pages, document libraries, workflows, versioning, organization, protection and security, documentation, style guidelines, and governance methods. Plans, develops, implements, and administers privacy protection management systems and websites. Ensures that relevant legislative and compliance requirements are met. Oversees privacy protection in all types of information from paper to electronic. Designs ad hoc reports. Communicates to upper management and provides reports regarding the quality and progress of the Privacy Protection Program. Assists security in developing maintenance procedures and scripts. Assists in resolving problems with protecting PII through effective use of software and other information management resources. Provides training on the privacy protection policy and systems.
Typical Education/Experience – Bachelor degree in Programming/Systems or Computer Science, specialized training, certification, or equivalent work experience. Typically requires 5-7 years of experience providing document/knowledge management support and 2 years designing and engineering automated records management.
-ARMA International, www.arma.org-Certified International Privacy Professional/Government-Contracting Officer Technical Representative Certification-American Society of Access Professionals (ASAP) conferences and meetings, www.accesspro.org-International Association of Privacy Professionals conferences and meetings, www.privacyassociation.org-INFOSEC conference-Paralegal courses on Privacy Act, HIPAA, and privacy protections under the E-Government Act and the Freedom of Information Act