Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

BYOD IT Skills in High Demand

The rise of BYOD is making an impact on a variety of IT positions, from help desk to mobile app development to security and compliance. In fact, according to one research firm, its one of the only bright spots on the IT jobs landscape.

If you think BYOD is more media hype than reality, think again. The mega trend is making a very real impact on IT jobs. Tech job positions in highest demand are those associated with BYOD, according to results of a recent salary survey from Janco Associates.

"If you have knowledge and ability to work with BYOD, either in implementation, support or development, this increases your value," says CEO M. Victor Janulaitis at Janco Associates. "It's the hot skill of the day."

In Janco Associates's survey of nearly 1,000 companies, IT compensation and demand remained largely flat, with BYOD-related positions bucking the trend. BYOD is making an impact on all sorts of IT positions, from help desk to mobile app development to security and compliance. Here are two specific hot job titles: supervisor of hardware installations (BYOD) and supervisor of BYOD desktop support.

Indeed, BYOD is one of the only bright spots. The IT job market grew by 74,900 in 2013, slightly better than 62,500 in 2012, according to the Bureau of Labor Statistics. The growth is "not enough to employ the number of IT graduates from U.S. universities or to increase demand," Janco Associates says, adding, "Positions in highest demand are all associated with the quality control, BYOD implementation, and service level improvement."

[ Slideshow: Tech Salary Guide for 2014 ]

There's no question BYOD has far reaching implications.

App developers are busy redesigning Web applications so that information can be rendered on BYOD smartphones and tablets touting an array of screen sizes. BYOD is opening doors to cloud services and shutting them on legacy desktop software. BYOD has even breathed new life into the virtual desktop.

BYOD has led to blockbuster years for mobile device management (MDM) vendors, which has, in turn, led to a fury of market consolidation with giant enterprise tech companies wading into the MDM space. Most recently, VMware acquired AirWatch for $1.175 billion in cash and $365 million in installment payments and assumed equity. This puts IT workers with MDM skills in a good position.

In fact, entire architectures might have to be redesigned to support BYOD. "We're seeing companies look at things like zero trust models in which every device is assumed compromised, [where] there is no concept of a trust network anymore," Forrester Research's David Johnson told CIO.com.

Moreover, Janulaitis says he expects to see BYOD-related certifications coming soon. Certifications typically trail a hot job skill by two to three years, he says, and BYOD has been de rigueur for a couple of years.

Tom Kaneshige covers Apple, BYOD and Consumerization of IT for CIO.com. Follow Tom on Twitter @kaneshige. Follow everything from CIO.com on Twitter @CIOonline, Facebook, Google + and LinkedIn. Email Tom at tkaneshige@cio.com

Read more about byod in CIO's BYOD Drilldown.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: AirWatch, AirWatch, Apple, Facebook, Forrester Research, Google, Janco Associates, VMware
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: Consumerization of IT | BYOD, Janco Associates, BYOD IT skills, IT careers, IT management, mobile, it skills, BYOD, consumerization of IT
Latest Blog Posts
Whitepapers
  • IBM X-Force Threat Intelligence
    In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
    Learn more »
  • Information Management
    Valuable data can be a needle in a haystack, but by leveraging the value in existing information assets, organisations can generate real and achievable gains in revenue generation, IT investments and productivity gains. This whitepaper discusses how Information Management (IM) is a multi-faceted discipline that can be employed to meet or exceed your business objectives.
    Learn more »
  • The F5 DDoS Protection Reference Architecture part 3 of 3
    This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO