|Back to Results Print Page|
|INFORMATION SYSTEMS MANAGEMENT (ISM)|
Warrant Officers serving in the specialty of information systems management are technical specialists in all areas of information systems and information assurance. They serve in command, control, and communication, computer and information technology (C4IT) positions at headquarters, the C4IT Service Center, other centers of excellence (COE) and a variety of other shore units. They are instrumental in the development and supervision of information systems and the enforcement of all information security policy and computer system requirements. Some of the specific areas of responsibility include hardware development, modification, and implementation of application servers; software releases; network hardware (routers, switches, local and wide area networks, etc.); information systems and data security; regulatory compliance, certification and accreditation activities; and organizational information systems standardization, LANS, WANS, and encryption devices. They also organize and supervise personnel working in information systems areas including information systems server system management, exchange server management, network management, telephony system management, information assurance, systems security, and general system support and administration.
The student will be able to develop daily and weekly work schedules; plan and perform mentoring and counseling throughout the organization; develop a quality control program; prepare training and meeting plans; create and deliver cross-departmental written and verbal communications; and develop team configurations for specific areas of responsibility.
The student will be able to initiate, plan, execute, and control a project; apply knowledge, skills, tools, and techniques to project activities; manage tools, funds and human and other resources to accomplish project activities; integrate time, cost, quality control, and risk mitigation activities; and manage the communications process for all stakeholders.
The student will be able to establish budgets for project initiatives; prioritize projects and timelines; forecast program and project strategy; plan programs using program and project software; and identify and manage necessary resources.
The student will be able to utilize efficient and effective operational procedures; manage human and other resources to accomplish tasks and improve organizational performance; design and implement a supply chain logistics plan; conduct organizational planning, programming, and budgeting within an execution cycle; and identify and correct deficiencies in the quality and flow of information.
The student will be able to evaluate and interpret written policy and regulatory guidance to formulate organizational positions; construct effective delivery methods, such as writing and presentation techniques; defend a position for project implementation; formulate new and enhanced project communication to establish the organization’s position; assemble information to develop briefings and enhance analysis of current and emerging projects; write and design technical briefings and presentations; and assemble internal communications, business correspondence and interviews to develop organizational project implementation plans.
The student will be able to identify threats, attacks, and vulnerabilities to computer systems; describe legal and ethical issues of information security; identify and manage risk in a computer system and an organization; develop contingency and continuity plans; plan and implement a basic security policy; identify distributed systems and methods; and define an information assurance strategy and architecture.
Management Information Systems:
The student will be able to specify, manage and maintain computer system hardware; specify, manage and maintain computer operating system and application software; employ security measures and practices in the management of data systems; manage data network and telecommunication systems; perform cyber security audits on computer network infrastructures; develop, document and train computer system operators and users in proper security measures; analyze and optimize computer data network performance; manage information system design and deployment projects; and implement and manage database applications.