Categories
About us Captains’s Log

Calling on Freelancers: A Winning Strategy for IT Departments in Times of Crisis

While flexibility, responsiveness and speed are more necessary than ever, the use of independent consultants takes on a new dimension.

Manage emergencies

IT departments – and especially support services – were put to the test during the lockdown. Between the massive deployment of remote work, the explosion of security threats and the problems of VPN congestion or application availability, support teams have had to deal with a major increase in requests. And this, overnight and under a lot of pressure. The business continuity of the company – and therefore its survival – is at stake.

Imagine that your organization is facing a massive ransomware attack. If you are not able to mobilize the right skills in-house very quickly, you expose yourself to serious consequences in terms of data loss and potential suspension of your activity.

Using freelancers such as cyber security consultants makes it possible to respond very quickly to the overload of work and to absorb the peaks in demand. Whether these are basic requests or tasks requiring specialized skills, calling on additional reinforcements on an ad hoc basis allows the company to have all the responsiveness necessary to respond to these exceptional and urgent situations.

Dealing with uncertainty

While the lockdown has plunged companies into paralysis or at least a slowdown in their activity, the looming economic crisis will be a long-lasting problem. Uncertainty and doubt set in, challenging businesses to continue to grow when they are virtually forced to navigate on sight.

In this context, agility and the ability to adapt are crucial. IT departments have long been used to working in project mode, but this ability to mobilize the best skills very quickly for success will become absolutely essential moving forward.

Ambient instability greatly increases the risk, especially in terms of recruitment. Caught between the need to restart as quickly as possible and the threat of economic crisis, companies must nevertheless act. In the IT field, using freelancers makes it possible to reinforce existing teams in an efficient and less risky manner.

Did you plan to recruit a Data Scientist or a Product Manager on a permanent contract before the economic and health crisis broke out? Opt for a freelance profile while things stabilize internally and externally. Companies can find the talented and experienced consultants they need, while still maintaining the budgetary and organizational flexibility needed if the situation worsens or if the prioritization of certain projects needs to be changed.

Without forgetting that freelancers have, in essence, a great capacity for autonomy and adaptation and are also more used to teleworking. They are therefore a particularly suitable response to the crisis.

Accelerate development

Despite the difficulties and complexity of the current context, there is no reason for companies to get stuck. On the contrary, they must find the tools to continue to develop and grow. This crisis is a test: companies must not only prepare for a quick recovery, but also think beyond the crisis and build solid and innovative models for tomorrow.

For these reasons, structuring technological projects and IT architectures that enable business transformation is at the heart of the game. It is essential, even vital, to continue to implement them, and even to accelerate them. However, the success of these strategic projects largely depends on the teams in charge. So how do you make sure you have the most competent people possible?

Using one or more experienced freelancers on specific IT subjects, such as cloud or machine learning, can save a lot of time and significantly speed up these major projects. In addition, the contractual relationship between freelancers and the company often requires them to make a higher commitment in terms of performance and quality of service.

In conclusion, the use of freelancers is not a one-size-fits-all solution and must be part of a more comprehensive strategy. But it represents a flexible, responsive and efficient solution for IT departments, which must more than ever learn to juggle between internal and external employees to emerge winners from this period of instability. One thing is clear: the success of companies in these times of crisis depends in large part on the skills and talent it can mobilize.

Categories
Growing your career: permanent & freelance IT Consultants

Microsoft Career Paths

Here is an overview of the different Microsoft career paths and what every different role implies in terms of roles and responsibilities.


The Microsoft Career Paths

Administrator

Administrators oversee the implementation of Microsoft platforms and maintain solutions for storage, networking, computing and security.

Responsibilities and skills include:

  • Managing subscriptions and resources
  • Implementing and managing storage
  • Deploying and managing virtual machines
  • Configuring and managing virtual networks
  • Managing identities

AI Engineer

AI engineers design and implement artificial intelligence solutions by leveraging different MS tools.

Cognitive Services, Machine Learning, and Knowledge Mining are part of their toolset. For Azure, for example, areas of focus include:

  • Natural language processing
  • Speech
  • Bots and agents
  • Computer vision

Data Engineer

In charge of mapping out and executing the management, monitoring, security, and privacy of data. Data Engineers are proficient in a platform’s different data services and tools, using them to:

  • Implement data storage solutions
  • Manage and develop data processing
  • Monitor and optimize data solutions
  • Design data storage solutions
  • Design data processing solutions
  • Design for data security and compliance

Data Scientist

Not to be confused with a Data Engineer, this role requires deep knowledge of data science and machine learning. Expertise in data modelling is a must.

A good MS Data Scientist knows well how to:

  • Set up data lake relationships
  • Learning workspace
  • Run experiments and train models
  • Optimize and manage models
  • Deploy and consume models

Developer

At the frontlines of deployment and operations, developers partner with architects and administrators to design, create, test and maintain cloud applications and services.

Among the core competences of developers:

  • Development of infrastructure and storage
  • Development of platforms and solutions
  • Implementation of security
  • Monitoring, troubleshooting, and optimising solutions
  • Connecting to third-party services

DevOps Engineer

Advocates of agile methodologies for software development, DevOps professionals unify teams, processes and technologies to streamline the product pipeline.

Expertise is required in:

  • DevOps development processes
  • Continuous integration & continuous delivery (CI/CD)
  • Dependency management
  • Application infrastructure
  • Continuous feedback

IoT Developer

Designs, develops and maintains Internet of Things solutions and devices within MS environments. From coding to the set-up of physical devices, the IoT Developer is responsible for:

  • Implementing the Azure IoT solution infrastructure
  • Provision and management of devices
  • Implementing Edge Processing and managing data
  • Monitoring, troubleshooting, and optimising IoT solutions
  • Implementing security

Security Engineer

The title here says it all. Security professionals protect the integrity of data, applications and networks by implementing threat detection and security controls.

Functions include:

  • Managing identity and access
  • Implementing platform protection
  • Managing security operations
  • Securing data and applications

Solutions Architect

The Solutions Architect is actually the first person to be involved in a platform’s deployment process. Architects must have a deep understanding of the entire ecosystem to design solutions that run on it.

They must have expertise in:

  • Deployment and configuration of infrastructure
  • Implementing workloads and security
  • Creating and deploy apps
  • Implementing authentication and securing data
  • Developing for cloud and for other storage
  • Determining workload requirements
  • Designing for identity and security
  • Designing a data platform solution and a business continuity strategy
  • Designing for deployment, migration, and integration
  • Designing an infrastructure strategy

Want to learn more about the various Microsoft career paths and how to pursue them? Explore our comprehensive Microsoft Technologies careers guide.

Sign up to to Mission Contol Center Newsletter
Categories
Press review Tech Magazine

Weekly News: Game Streaming and Emissions

Game Streaming and Emissions, or Game vs. the environment

The next generation of video game consoles is hitting the shelves this holiday season. An epic marketing battle precedes its launch, with the PS5 and Xbox Series X fighting to get a head start on each other by selling more consoles than the other.

Yet, ironically, this new generation of consoles might be the last. 

Like it happened in other industries, video games are moving away from local hardware in favour of a distributed computing model. Why spent money in a pricey box when you could stream higher-quality video games directly to your TV or phone in real time? 

With companies like Google and Microsoft having already released their proprietary cloud gaming platforms, it’s just a matter of time before most gaming is done this way. But, as convenient as it sounds, this could have severe environmental implications.  

A new report suggests emissions could rise as much as 30% in a future where game streaming was the norm.

BBC

Low-code is coming to Teams

Earlier this year, Microsoft announced it was building a low-code Dataflex solution for Teams that would allow users to easily develop custom applications without leaving Teams. We got more details this week.

Code-named Project Oakdale, the platform will let teams create quick applications based on shared databases. No need for third-party tools to build an HTML or JavaScript feature that runs on Teams. Just install Project Oakdale and use an Access-like table and form creator to get the job done.

Each team will get its dedicated data environment so that team members can exchange actionable insights and access more relevant information. The applications will also be able to connect with the rest of Microsoft’s ecosystem.

Although it has its limitations, Project Oakdale will be included in the Teams subscription — a big step towards democratising low-code development within the enterprise.

TechRepublic

Also discover our article: The IT Jobs Market of Today

Categories
Uncategorised

Pentester


The pentester is a role related to the field of cybersecurity security. Its name comes from “penetration test.” The main role of a pentester is to ensure the security of information networks and applications (back end of a site, applications, etc.) and protect systems against cyber attacks.

What is the role of the Pentester?


Check website reliability

As the name suggests, the pentester performs tests with controlled intrusions into the company’s computer systems to find possible vulnerabilities.

Fix issues

After the testing stage, the pentester has to find and implement solutions to resolve the flaws identified. They will then have to reinforce and optimize the security of the applications.

Provide advice and guidance

The pentester also plays an advisory role. They must anticipate threats, put in place best practices and recommend more effective protection tools.

Required skills

Programming mastery

The pentester should be proficient and familiar with programming and web programming languages, cryptography, coding systems, and network security auditing (Python, C / C ++, Java, PHP, etc.)

An educational vocation

The pentester must be able to effectively convey encountered flaws to site and application developers. They must therefore be educators with the ability to communicate well with the developers and technical teams, to know how to clearly communicate problems to help manage them as well and quickly as possible.

Rapid action

When an intrusion occurs or a security problem is identified in a computer system, it must be resolved quickly. A poorly protected system can be devastating for the business. The pentester must therefore demonstrate reactivity and proactivity.

Within the industry

A pentester can progress to a managerial position or any other senior position in the field of cybersecurity. Their job is critical in an IT world where cyber attacks are growing more and more recurrent.

Salary

The average daily rate of a pentester fluctuates between €300 and €600.

Training

To be a pentester, you usually need to have an undergraduate or graduate degree in an IT-related discipline and demonstrate at least a base level of cyber security knowledge and experience.