Sunday, March 24, 2019

IT DEPARTMENT ORGANIZATIONAL CHART

IT DEPARTMENT
TELECOMMUNICATION COMPANY





INTERNAL FUNCTION



Internal Function
Descriptions
Potential Risk
User
1
Network Manager
Responsible to install and maintain
company network and give training
to staff to provide first technical support.
Have recovery plan in order to
minimize disruption to the business
when the network is down.
Cyber attacks, spear phishing in order to
attack specific company that is targeted.
  • Employees of the company
2
Database Manager
Deal in data, financial records,
credit card accounts, billing addresses,
and other customer records are all
stored in databases. Maintain the
functionality and privacy of their
database systems.
Troubleshooting unseen system problems
Perennial threat, malware is used to
steal sensitive data via legitimate
users using infected devices.
  • Employees  of the company
  • Data entry department
3
Technical Manager
Provide support to users with computer or other
technical difficulties. Generate ideas for improving
technical products .
They also must provide guidance for all members
of the team when it comes to designing, implementing
and updating software. They are responsible for addressing
faults within any company system and making sure
those faults are fixed.
Short circuit, the component of
hardware has been stolen.
  • Employees  of the company
  • Customers
4
Help Desk Manager
Manage the service desk and oversee
the delivery of quality of technical
support service to clients, internal
or external clients who have contracted
technical support service. They need both
knowledge of the software or hardware systems.
Human error as they might not answering
or replying calls and emails.
  • Customers
  • the frontline team of service desk
5
Application,
Development,
Implementation
Manager
Performing systems analysis and
project management activities which
include planning, designing, implementing
and maintaining district-wide business
applications and computer systems.
System or applications not functioning properly
  • Employees  of the company
  • Customers
6
Information
Management
and Security
Manager
Coordinate and execute security policies and controls,
as well as assess vulnerabilities within a company.
Malware infect the network, software or
computer hardware
  • Employees  of the company
  • Customers
7
DBA
A specialized computer systems administrator who
maintains a successful database environment by
directing or performing all related activities
to keep the data secure.
The main responsibility of a DBA professional is
to maintain the data integrity.
Deployment failures at the moment they are
deployed, data leaks and
stolen database backups.
  • Employees  of the company
  • Data entry
8
Infrastructure
Technician
An Infrastructure Technician provides support to
internal and external customers, helping them to be
productive when using technology to do their own jobs,
by using tools to problem solve and troubleshoot
non routine problems.
Limitation of budget
  • Employees  of the company
  • Customers
9
Portal Admin
Develop all portal layout and maintain functionality of all site.
Portal breakdown
  • Employees  of the company
  • Customers
10
Information Security
Analyst
Monitor computer network for security issues.
Investigate security breaches and other security incident.
Install security measures and operate software to protect
system and information infrastructures, including
firewall and data encryption program.
Data breach, hacking,
  • Employees
  • DBA



OUTSOURCED FUNCTION 


Outsource Function
Description
Reason
Potential Risk
User
1
IT Technician
Organize and schedule upgrades and maintenance
without deterring others from completing their work.
Perform troubleshooting to diagnose and resolve
problems such as repair or replace parts and debugging.
Maintain records or logs of repairs and fixes and maintenance schedule.
  • Save costs and time
  • No need to hire new technician in every department
Outsource technician might be busy and cannot
come on time because of other jobs outside.
  • Employees of the company
  • Any department that requires technician to upgrade and do maintenance of the system.
2
IT Solution
Specialist
Support the technical specification to solve customer’s need
by understand those need and translate them into a
platform or configuration for new products or services.
  • To oversee what we might overlooked into our system.
New features and functionality might contain a bugs.
-Employees of the company
-IT specialist team
-Customers
3
Trainer
- Training plan
- Timing of different training sessions
- Choosing the relevant training methods
- Preparing the training materials and aids
- Conducting training sessions and
- Evaluating the post training session


- New employees of the company
4
System Analyst
Specializes in analyzing information systems to
solve company business problem, other than analyse
the information technology for their own business.
  • save cost
  • Hardware and software failure such as  data corruption
  • Security breaches
-Employees of the company
-System analyst team
5
Mobile App
Developer
create , maintain and implement the source code
to develop mobile apps and programs that
meet the needs and requirement of the client
by using computer programming languages.  
  • Do not have any specialist in this area
  • Save cost
Outsourced developer might not meet our expectation
because they might think that they can easily make
the apps by not looking at the important aspects such as security.  
Application, Development, Implementation Manager

No comments:

Post a Comment