My Future Careers In Computer Information Technology
The Computer Information Technology (CIT) major encompasses many skills and knowledge spanning concepts and ideas from programming to business (Computer Information Technology). This four-year degree will, as follows, act as a basis for most employment and business opportunities involving IT work. Through general education or liberal arts courses, alongside the required technical courses, a CIT degree at Methodist University offers communication and social skills that are universally required in the workforce. Riecken boldly claims that IT staff “are among the most critical members of the corporate ecosystem.” This education opens the doors to an array of occupational choices I can personally find captivating. A major in CIT will jump start an auspicious, yet engaging career path in a wide variety of fields involving problem solving and creativity with information technologies.
Computer hardware and software have become more integrated in society, although the implementation has gotten out of touch for the regular user. Hughes demonstrates in a decades-old study how all types of human services require IT implementation and support with ever-increasing demand for Internet Access: “The strongest agreement was with statements about the use of the Internet for conducting education with clients and in the use of the Internet for their own professional development.” Users do not often understand the background functions of their personal devices or how data is delivered to them. Instruction for operating their devices can be offered as a service to clients, as technical education sees an increasing demand. Digital mediums influence the minds of users, as well. They change the way in which we express our thoughts and opinions, whether through typing or speaking (Hughes). Effects as subtle as ringtones and alerts cause differences in behaviors, orienting our priorities according to physiological reactions in response to electronic stimuli. A CIT degree, therefore, is an estimable background to have in our contemporary economy.
With my degree, one opportunity for employment is a job as a computer programmer. Programmers write and test code that allows computer applications and software programs to function properly (Computer Programmers). Apple, Microsoft, Google might be big names, but based on the job description, I may work for any employer that has a need for apps and programs. The position has room for creativity soft skills in designing all kinds of applications using coding languages. Since I already have instruction in Java, this is personally favorable. The Bureau of Labor Statistics indicates that the median salary comes out to $86,550 per year; hence, I can get paid $41.61 per hour. Additionally, many programmers work from home. This way, there is potential for making a flexible schedule.
A second role I could squeeze into is that of a Security Engineer. These cyber warriors fight cybercrime. Specifically, Webb notes that “engineers keep sensitive data safe from breaches, taps, and leaks.” He uses the cybersecurity lingo to describe attacks that we call hacking threats. The average annual salary is decent at $90,923. This fact ranks a security engineer before a programmer, financially. This type of employment must call for problem-solving soft skills where data needs protection with whatever tools are at an engineer’s disposal. A final component includes ready communication with corporate management about improving organizational security (Webb). I see myself having the most compatibility in this position as it aligns with skills I have tested and certified prior in security analysis.
The last employment opportunity I could dive into after undergrad is Network Architect. These people plan and design, rather than build or support networks. I presume that they are named, consequentially, akin to industrial architects that design structures instead of putting them together as the construction workers would. The average salary in the U.S. is $134,119 per year. If I was in it for the money, I would be planning computer networks.
A business that brings modern IT services to the healthcare sector is a valuable option for a startup. Anvari predicts, “During the next decade, we will undoubtedly see the development and deployment of comprehensive electronic health information systems incorporating all aspects of in-hospital and out-of-hospital care.” The demand is sure, and I would find special purpose in this area by indirectly helping people receive better healthcare. Examples of health information technologies that I want to bring to hospitals are accessible medical records, RFID tracking for patients or medical devices, as well as inventory automation systems. Hospitals, being the clients, would pose a steady source of income, because healthcare is so expensive in the first place. Also, beneficially, they can be found at every location imaginable.
With a knowledge of the new digital demand, the greatest business startup is potentially an IT security contracting company. My business would be large-scale in nature. A corporation model of business fits best, because it could benefit greatly from investors looking to buy shares. They would find me appealing when I become another reputable company thriving in a fast-growing industry. As the need for network and data security continues to skyrocket, the corporation will easily transfer ownership to the next generation of leaders in the field. Positions within the startup should be determined using a certain hierarchy of specialties. For instance, in a security-centric business there are general roles encompassing managers, users, and chief officers. In my case, I would place an experienced board of staffers in my c-suite. We will take on large scale tasks devoted to improving the business in all sorts. Clients will pour in from industrial or manufacturing entities; retail firms; banks; any organization that holds important data.
- Anvari, Mehran. “Impact of Information Technology on Human Resources in Healthcare.” Healthcare Quarterly, 15 Sept. 2007, longwoods.com/content/19320/healthcare-quarterly/impact-of-information-technology-on-human-resources-in-healthcare.
- Best, Richard. “Which Type of Organization Is Best For Your Business?” Investopedia, Investopedia, 28 Aug. 2020, www.investopedia.com/articles/personal-finance/120915/which-type-organization-best-your-business.asp.
- “Computer Information Technology.” Methodist University, 2020, www.methodist.edu/csc/cit/.
- “Computer Programmers : Occupational Outlook Handbook.” U.S. Bureau of Labor Statistics, U.S. Bureau of Labor Statistics, 10 Apr. 2020, www.bls.gov/ooh/computer-and-information-technology/computer-programmers.htm.
- Hughes, Robert, et al. “Information Technology and Human Services.” IDEALS @ Illinois, 1 Jan. 1999, hdl.handle.net/2142/9786.
- “Network Architect Salaries in the United States.” Indeed.com, 30 Aug. 2020, www.indeed.com/salaries/network-architect-Salaries.
- “Network Architect.” Network Architect Training, Certification, Salary, Jobs & Requirements, Informed Decisions Inc., 2020, www.itcareerfinder.com/it-careers/network-architect.html.
- Riecken, Tom. “Learn About Careers in Computer Science.” WhoIsHostingThis.com, 13 Feb. 2018, www.whoishostingthis.com/resources/computer-careers/.
- Webb, Holland. “How to Become a Security Engineer: Cyber Degrees.” CyberDegrees.org, CyberDegrees.org, 20 Aug. 2020, www.cyberdegrees.org/jobs/security-engineer/.
- Wilson, Mark, and Joan Hash. “Building an Information Technology Security Awareness and Training Program.” CSRC, 1 Oct. 2003, csrc.nist.gov/publications/detail/sp/800-50/final.