IT DEPARTMENT
TELECOMMUNICATION COMPANY
INTERNAL FUNCTION
Internal Function
|
Descriptions
|
Potential Risk
|
User
| |
1
|
Network Manager
|
Responsible to install and maintain
company network and give training to staff to provide first technical support. Have recovery plan in order to minimize disruption to the business when the network is down. |
Cyber attacks, spear phishing in order to
attack specific company that is targeted. |
|
2
|
Database Manager
|
Deal in data, financial records,
credit card accounts, billing addresses, and other customer records are all stored in databases. Maintain the functionality and privacy of their database systems. Troubleshooting unseen system problems |
Perennial threat, malware is used to
steal sensitive data via legitimate users using infected devices. |
|
3
|
Technical Manager
|
Provide support to users with computer or other
technical difficulties. Generate ideas for improving technical products . They also must provide guidance for all members of the team when it comes to designing, implementing and updating software. They are responsible for addressing faults within any company system and making sure those faults are fixed. |
Short circuit, the component of
hardware has been stolen. |
|
4
|
Help Desk Manager
|
Manage the service desk and oversee
the delivery of quality of technical support service to clients, internal or external clients who have contracted technical support service. They need both knowledge of the software or hardware systems. |
Human error as they might not answering
or replying calls and emails. |
|
5
|
Application,
Development, Implementation Manager |
Performing systems analysis and
project management activities which include planning, designing, implementing and maintaining district-wide business applications and computer systems. |
System or applications not functioning properly
|
|
6
|
Information
Management and Security Manager |
Coordinate and execute security policies and controls,
as well as assess vulnerabilities within a company. |
Malware infect the network, software or
computer hardware |
|
7
|
DBA
|
A specialized computer systems administrator who
maintains a successful database environment by directing or performing all related activities to keep the data secure. The main responsibility of a DBA professional is to maintain the data integrity. |
Deployment failures at the moment they are
deployed, data leaks and stolen database backups. |
|
8
|
Infrastructure
Technician |
An Infrastructure Technician provides support to
internal and external customers, helping them to be productive when using technology to do their own jobs, by using tools to problem solve and troubleshoot non routine problems. |
Limitation of budget
|
|
9
|
Portal Admin
|
Develop all portal layout and maintain functionality of all site.
|
Portal breakdown
|
|
10
|
Information Security
Analyst |
Monitor computer network for security issues.
Investigate security breaches and other security incident. Install security measures and operate software to protect system and information infrastructures, including firewall and data encryption program. |
Data breach, hacking,
|
|
OUTSOURCED FUNCTION
Outsource Function
|
Description
|
Reason
|
Potential Risk
|
User
| |
1
|
IT Technician
|
Organize and schedule upgrades and maintenance
without deterring others from completing their work. Perform troubleshooting to diagnose and resolve problems such as repair or replace parts and debugging. Maintain records or logs of repairs and fixes and maintenance schedule. |
|
Outsource technician might be busy and cannot
come on time because of other jobs outside. |
|
2
|
IT Solution
Specialist |
Support the technical specification to solve customer’s need
by understand those need and translate them into a platform or configuration for new products or services. |
|
New features and functionality might contain a bugs.
|
-Employees of the company
-IT specialist team
-Customers
|
3
|
Trainer
|
- Training plan
- Timing of different training sessions
- Choosing the relevant training methods
- Preparing the training materials and aids
- Conducting training sessions and
- Evaluating the post training session
|
- New employees of the company
| ||
4
|
System Analyst
|
Specializes in analyzing information systems to
solve company business problem, other than analyse the information technology for their own business. |
|
|
-Employees of the company
-System analyst team
|
5
|
Mobile App
Developer |
create , maintain and implement the source code
to develop mobile apps and programs that meet the needs and requirement of the client by using computer programming languages. |
|
Outsourced developer might not meet our expectation
because they might think that they can easily make the apps by not looking at the important aspects such as security. |
Application, Development, Implementation Manager
|
No comments:
Post a Comment