BYOD IT Skills in High Demand
- 24 January, 2014 21:52
If you think BYOD is more media hype than reality, think again. The mega trend is making a very real impact on IT jobs. Tech job positions in highest demand are those associated with BYOD, according to results of a recent salary survey from Janco Associates.
"If you have knowledge and ability to work with BYOD, either in implementation, support or development, this increases your value," says CEO M. Victor Janulaitis at Janco Associates. "It's the hot skill of the day."
In Janco Associates's survey of nearly 1,000 companies, IT compensation and demand remained largely flat, with BYOD-related positions bucking the trend. BYOD is making an impact on all sorts of IT positions, from help desk to mobile app development to security and compliance. Here are two specific hot job titles: supervisor of hardware installations (BYOD) and supervisor of BYOD desktop support.
Indeed, BYOD is one of the only bright spots. The IT job market grew by 74,900 in 2013, slightly better than 62,500 in 2012, according to the Bureau of Labor Statistics. The growth is "not enough to employ the number of IT graduates from U.S. universities or to increase demand," Janco Associates says, adding, "Positions in highest demand are all associated with the quality control, BYOD implementation, and service level improvement."
[ Slideshow: Tech Salary Guide for 2014 ]
There's no question BYOD has far reaching implications.
App developers are busy redesigning Web applications so that information can be rendered on BYOD smartphones and tablets touting an array of screen sizes. BYOD is opening doors to cloud services and shutting them on legacy desktop software. BYOD has even breathed new life into the virtual desktop.
BYOD has led to blockbuster years for mobile device management (MDM) vendors, which has, in turn, led to a fury of market consolidation with giant enterprise tech companies wading into the MDM space. Most recently, VMware acquired AirWatch for $1.175 billion in cash and $365 million in installment payments and assumed equity. This puts IT workers with MDM skills in a good position.
In fact, entire architectures might have to be redesigned to support BYOD. "We're seeing companies look at things like zero trust models in which every device is assumed compromised, [where] there is no concept of a trust network anymore," Forrester Research's David Johnson told CIO.com.
Moreover, Janulaitis says he expects to see BYOD-related certifications coming soon. Certifications typically trail a hot job skill by two to three years, he says, and BYOD has been de rigueur for a couple of years.
Tom Kaneshige covers Apple, BYOD and Consumerization of IT for CIO.com. Follow Tom on Twitter @kaneshige. Follow everything from CIO.com on Twitter @CIOonline, Facebook, Google + and LinkedIn. Email Tom at email@example.com
Read more about byod in CIO's BYOD Drilldown.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
Security in a Faster Forward World
Organizations today operate in a Faster Forward world, as they experience a shift towards an increasingly mobile workforce. Following this, an evolving stream of attackers are now targeting mobile devices where they can more easily access a larger number of high-value corporate and government assets. This paper will guide you through finding the right Web security partner that can improve efficiency while reducing risks and improving web experience.
Forrester Research: Total Economic Impact Of The Management Suite
This paper presents a framework to evaluate the potential financial impact of the User Virtualization Platform on organizations having shared server-based computing environment.
Evolving Threats Demand New Approaches to Security
As the world becomes increasingly hyperconnected, the opportunities for innovation are virtually limitless. At the same time, the complexity and risk associated with those opportunities is great. Security threats have the potential for enormous ramifications, but so does deploying a security strategy that compromises the user experience, performance, and the ability to innovate online. This paper will profile the emerging disruptive players, and identifies the essential steps to establishing a secure environment without compromising performance or experience.