Tob Jobs in 2015

By |2018-05-15T16:19:02-04:00June 10th, 2015|Company, Software Engineering|

In January 2015, U.S. News released its ‘Best Job’ rankings, in which they published their definition of best jobs. These included jobs with generous salaries, offering a challenge without overwhelming stress and room to grow and advance. Most importantly, the most important jobs, or the best jobs, are the ones that are hiring.

Although most of the best jobs listed were in healthcare, it’s interesting to learn three of the top 10 on the list are in IT. Northeast Pennsylvania Business Journal granted UM Technologies the opportunity to share their story and ambition to find local talent to help fill their job positions in IT.

UM Technologies team members Matt Artz, Geoff Speicher and Daniel Sputa gave insight on their long term experience in their roles of IT and the daily responsibilities that come with the position.

In the world of IT, the roles of politician and negotiator are performed by the computer systems analyst. Matt Artz, acting as Director of Business Systems Analysis for UM Tech. Artz plays a major role with the company where the job is not a “typical” computer analysis job of developing, testing and analyzing expansive systems. Instead, Artz is more involved in the anthropologic end of IT where he strives to make software a better experience for the end user and tries to connect how people interact with technology.

Geoff Speicher, Senior Vice President of Operations at UM Tech accrued substantial experience developing software. Software developers are the creative minds behind computer programs, where they either develop the applications that allow people to do specific tasks on a computer or other device, or, develop the underlying systems that run the devices or control networks.

Another IT job is Information Security Analysts, who play an important part in keeping all information systems from being infiltrated by unwanted outside entities. Daniel Sputa, Information Security Analyst at UM Tech, explains commercial systems must use real-time monitoring and scalable threat detection. Establishing a process to protect the security and integrity of data, email and files is in high demand to stop any cyber-infections that could spread and compromise any sensitive information. As cyber-attacks continue to transform and become more advance, Sputa’s responsibilities are advancing daily to ensure he is taking every measure to prevent any attacks on the company’s systems.