jackprabha's blog

Computerworld's round of technology vacancies this week found opportunities mainly in startups, looking for professionals related to areas such as development and product. But we also find vacant positions in consultancies that provide technology services to other companies. 


Check the details of the vacancies that are available and, at the end of the text, the links with the vacancy posts published here in the last weeks. Good luck! 


Ahgora

The company from Santa Catarina, which develops technologies for people management, brings 15 open positions, most of them to the Florianópolis region. Among the highlights are five positions of developer, one vacancy for Head of Marketing, one for Head of SDR, one for Data Engineer and one for Data Scientist.  




Easy Copper  

The recurring collection and payment management platform has 5 open positions for PHP Developer. Candidates must have experience with object orientation, relational databases (MySQL), version control (GIT), Composer and use of PHP Frameworks.  




Consolidate

The brand registration startup has 12 open positions in Araranguá (SC) for the positions of Inbound Marketing Analyst, DEV Python (Full / Senior), DEV PHP (Junior / Full), DEV PHP (Senior), Interface Designer UX (Júnior), Copywriter, Software Tester and UI / UX Designer Branding.




Dock

The startup, which helps other companies build and scale financial solutions for their clients, has more than 90 open positions to work in the development areas - backend and full stack, products, human resources and customer success. 


IT Service Technician is a trained computer professional whose primary role in an organization is to help in installing and configuring system software and hardware.

Jan 21 '21 · 0 comments · Tags: technology jobs

A study by the Independent Security Evaluators  (ISE ) consultancy found that the industry focuses almost exclusively on protecting people's health records and rarely addresses protecting patient health from the perspective of a cyber threat. With this focus, organizations perceive threat actors as 'unsophisticated adversaries', as individual hackers.


See more: Managed Storage Services


ISE believes that these institutions ignore the potential for more sophisticated cyber attacks on hospitals by political groups of hackactivists, organized crime and terrorists who are highly motivated and well-funded and as a result several surfaces are left unprotected and the attack strategies that can result in damages to patients, they are not taken into account '.


Cyber ​​attacks and a death

In September 2020, Universal Health Services (UHS) , a network of hospitals and health services with more than 400 facilities in the U.S., Puerto Rico and the United Kingdom, was attacked by Russian ransomware 'Ryuk' .


This was not the first cyber attack on a UHS hospital. Security company Advance Intel through the Andariel intelligence platform reported that trojan malware infected Universal Health Services in the course of 2020.


The UHS network has not confirmed the details of the attack, but reports from UHS officials indicate that the attack was the result of a successful phishing expedition.


The attack deactivated computers and telephone systems and forced hospitals to switch back to manual, paper-based systems to continue operations. They also had to redirect ambulances and move surgical patients to other unaffected facilities.


In general, in large and complex organizations, cleaning and restoring the system is not simple or fast. A UHS press release on 10/12/2020 announced "... we had no indication that any patient or employee's data was accessed, copied or misused". 


He also stated that operations returned to normal after a total of 16 days. That downtime cost more than $ 1,000,000 a day or more, which was a serious blow to UHS finances. It is not known whether the institution paid the ransom.


A cyber attack always has consequences for organizations, but when a ransomware hits the health segment, there is a real risk of death.


In the case of UHS there were unconfirmed rumors that four patients died because doctors had to wait for the results of laboratory tests delivered by couriers, instead of electronic delivery. While these are rumors, there is a known case of a patient who died due to a ransomware attack at a hospital in Europe in September 2020.


The note delivered by the ransomware showed that the intended target was not actually the hospital, but Heinrich Heine University. The police contacted the hackers through the instructions in the ransom note left by the malware and explained the error, after which the hackers withdrew their request and provided the decryption key. However, a patient with a serious illness referred to another distant hospital, died.


IT Analyst has to review existing IT systems and internal processes. They have to work in collaboration with the management to understand IT objectives.

Jan 20 '21 · 0 comments · Tags: it analyst, ransomware

Many developers find themselves pushed into a management role after establishing themselves internally as specialists in a specific area, perhaps they have become the "technology leader" and have been asked to form a team around this technology.


Know more: Managed Meraki Services


That's what happened to Nick Caldwell, currently the Vice President of Engineering at Twitter, who made his first move to management while working for Microsoft, where he developed a deep knowledge of natural language processing (NLP) and the spell check tool built into Microsoft Office Applications.


But that experience can lead to some pitfalls. “They put you in these positions normally because of technical strength, and the number one mistake I see is that you get the job as a strong technologist, so [feels the need] to make copies of you for the team. I made that mistake, ”he says.


Now, Caldwell has learned that "management is about recognizing your limitations and your ability to assemble a team."


Another common path to management is more organic, where senior developers find themselves more inclined to manage people or engage with broader businesses than just their engineering colleagues.


This is the path that is being followed by Jacq Train, leader of the engineering team at the technology arm of the British online food delivery company Ocado. “What I really enjoyed was mentoring more junior engineers and, as I grew into a senior role, collaborating between teams, translating requirements for teams and communicating,” she says.


The IT Analyst will collect information from end users about system performance. They over the projects and handle the upgrades, hardware, and software installations. 

Jan 18 '21 · 0 comments · Tags: it analyst, management routes

# Team:

The format of the contracts can consider a team allocated within the structure of the service provider, or working in the structure of the company, or even hybrid, where part of the structure is in the company and part in the contracted supplier. Whether in company or with a remote structure, the important thing is to have professionals trained and able to attend and forward requests so that users do not have interruptions in their tasks.


# Processes and tools:

In addition to being technically qualified, the right supplier must offer the flexibility option to adapt to the processes and tools already available, adapting to your company's IT environment and structure. Trying to impose a certain way of working or a certain tool already indicates that the supplier may not have the capacity to adapt, also, to the growth in demand.


# Multidisciplinary technical support:

What is the IT team of a company, of whatever size, able to have technical professionals with a high degree of knowledge in areas as diverse as microinformatics, networks, databases, systems? In addition to the Service Desk and Field Desk service professionals  , a specialized partner has a team of specialists who work in a more consultative manner, in depth, or supporting teams in dealing with more complex incidents.


Having an expert and results-oriented outsourced partner, governed by an SLA (Service Level Agreement), you get:


- analysis and classification of errors;


- increased degree of user satisfaction;


- organization of working methods;


- generation of continuous improvements and references for new users;


- availability of updated technological resources;


- restoration of normal service operation (incidents);


- assessment of the impacts of change;


- obtaining analysis of indicators such as satisfaction level, queue / occupancy rate indicators, among others.


Information Technology Technicians must have an associate’s or a bachelor’s degree in information technology or computer science. It will help if they have had formal training.

To begin with, it is interesting to delimit that, by digital transformation, we must understand a phenomenon of adoption of technologies that are transforming the experiences of consumers, workers and entrepreneurs around the world.


Thus, the digital transformation of the manufacturing industry, more specifically, concerns the use of cyber-physical systems in industrial production. It is the set of software and applications that interact between entities, things and humans; between companies, people and devices.


This movement has also been called “Industry 4.0”, or “The Fourth Industrial Revolution”.


It is important to understand that it is not just about using Internet of Things (IoT) solutions and services, Cloud Computing , Big Data, etc. in isolation.


The digital transformation takes place with the combination of these diverse technologies to deliver the activities that cyber-physical systems will demand in the industry.


This is already happening even though we didn't realize it; and it will happen more and more emphatically. The point is that there are still few companies that have realized this.


According to a report by consultancy IDC , about 75% of Latin American companies are still in the primary stages of digital transformation (either resisting the phenomenon or already exploring in a timid, unconscious way). The other 25% are divided between those that can already be considered digital transformers (already obtained synergy between IT and business) and digital disruptors (innovate at an advanced level in the digital environment).


In short, the digital transformation of the manufacturing industry is already a reality and comes to bring gains of scale, facilitate development (of products, services and resources), reduce costs and a series of other advantages that we will see in the following topics.


The Information Systems Security Engineer will research and investigate the potential impact of new threats and exploits. The engineer will guide the Information Security team in examining and developing networks security solutions.

Now that we understand the central idea of ​​IT predictability achieved through partnerships with specialized suppliers, let's go into greater detail on what types of forecasts can be achieved. Check it out below:


Possible costs

A good infrastructure provider (in the cloud , for example) can scale future costs by observing the company's IT resource consumption trends. With this, it is possible to eliminate investments in infra (CAPEX) and to anticipate expenses growth (OPEX) that will be necessary for the business to grow.


IT Finance: 6 tips for more financial control.


Quality gains in operation

Likewise, the implementation of IT infrastructure resources and services can be anticipated. It is possible, for example, to know that the opening of a new branch will require technological adjustments and point to the quality required in this process.


Knowing exactly what gains the company will have in its operation, it is easier to decide which path to follow when making investments in applications and services for this enterprise.


The Field Service Technician delivers the service and customer assistance during field visits as per the client’s requirements. 


Immobilization of resources

Knowing how much capital is invested in each piece of infrastructure also helps to control resources. At the same time, it makes it easier to measure the returns obtained.


Strategic focus

With everything under control, the people responsible for management have continuous reports on the technological capabilities they have. Thus, they are able to focus on business strategy and make IT a partner in this movement.

Jan 10 '21 · 0 comments · Tags: it predictions

Finally, companies where IT is seen only as a support area tend not to see the need to invest in protecting their data.


Therefore, it is necessary to ensure that the technology team is able to act in a more analytical way, work in partnership with specialized suppliers and have time to act proactively. Otherwise, it will continue “putting out the fire”.


As you have seen, information security in companies requires prevention. It is a consequence of strategic action, intelligence actions, attitudes and investments that accompany the computerization of business.


Digital security has become a mandatory concern for any company. Passing laws such as the LGPD and GDPR requires businesses to be more careful with third party data, as well as greater transparency in the way information is managed.


Therefore, care in the area must undergo all procedures. When we talk about cloud computing, a technology that brings benefits such as greater mobility and operational flexibility, the company must ensure that no records are exposed and that this does not lead to risk scenarios.


SonicWall technical support engineers undertake systems administration on the latest operating systems.


The insertion of corporate data in the cloud, therefore, must be accompanied by a series of precautions. By reviewing access control policies, knowing the service provider's routines and evaluating the main market trends, the company can avoid risks and remain in a robust and reliable work environment.

Do you have an IT management policy in your business? Responsible for ensuring that nothing goes wrong with your infrastructure, this is a simple practice that has a great impact on the business environment.


With a well-structured IT management, technology can be taken to more areas of the company without compromising costs or performance. Thus, the business becomes innovative and prepared to seek sales opportunities.


Do you want to know how IT management policy improves the business's operating environment? In this text, we will explain. Discover how to optimize this management and the 5 best measures to achieve your goal. Check out!


The cyber security specialist monitors systems for any unusual activities.  They conduct counteractive protocols and report incidents. 


What is an IT management policy?


Policy-based management is an administrative approach used to simplify the management of a given enterprise. It establishes guidelines for dealing with situations that are likely to occur.


Policies are operational rules that determine ways to maintain order, security, consistency or to promote a goal or mission. In the computing world, policy-driven management is used as an administrative tool in everything that concerns business technology (in the department and in the business as a whole).


Do you have an IT management policy in your business? Responsible for ensuring that nothing goes wrong with your infrastructure, this is a simple practice that has a great impact on the business environment.
With a well-structured IT management, technology can be taken to more areas of the company without compromising costs or performance. Thus, the business becomes innovative and prepared to seek sales opportunities.
Do you want to know how IT management policy improves the business's operating environment? In this text, we will explain. Discover how to optimize this management and the 5 best measures to achieve your goal. Check out!


What is an IT management policy?
Policy-based management is an administrative approach used to simplify the management of a given enterprise. It establishes guidelines for dealing with situations that are likely to occur.
Policies are operational rules that determine ways to maintain order, security, consistency or to promote a goal or mission. In the computing world, policy-driven management is used as an administrative tool in everything that concerns business technology (in the department and in the business as a whole).
In short, when we talk about IT management policy, we refer to a set of processes and strategies aimed at ensuring more integrity, performance, availability and reliability for the company's IT infrastructure. In other words, it aims to structure a group of tools and technologies, in such a way that the business can be more integrated, innovative and supported by digital resources.


In short, when we talk about IT management policy, we refer to a set of processes and strategies aimed at ensuring more integrity, performance, availability and reliability for the company's IT infrastructure. In other words, it aims to structure a group of tools and technologies, in such a way that the business can be more integrated, innovative and supported by digital resources.