The Ace Widget Co. has an ancient computer system. It'd like to upgrade to an Oracle-based operation with wireless capabilities, so employees can access the system with their BlackBerrys. The systems analyst orchestrates the effort. He starts by interviewing users, teasing out what they need as opposed to what they want–the nice-to-have things usually cost more than necessary.
Then, he develops a shopping list, plots a step-by-step game plan, implements the system, tests it, and troubleshoots. He might also supervise the trainers, who will try their best to convince everyone that the new system "really will make your life easier."
Being a systems analysts requires programming skill, but more important is the ability to see the big picture: translate geek-speak into plain English, identify company needs, and get everybody on board.
Strange as it may sound, creative liberal-arts types with computer expertise usually make better systems analysts than pure techies. If you'd love playing with leading/bleeding-edge adult Tinkertoys for a living, this can be a dream career. Yet another plus: Because so much sensitive communication is required, this is among the most offshore-resistant computer-related careers.
The Federal Emergency Management Agency has just hired you through a temp agency, and you've agreed to a six-month contract to help develop a new system for accounting and budgets. You start your day talking with key players in the agency. After the initial meetings, you start researching the best approaches to data security and disaster recovery. After an hour on the computer, you take a break–your eyes are getting tired, and it will also help avoid repetitive strain injury.
Next, you meet with the in-house programmers who will be customizing and debugging some off-the-shelf programs that will be part of the new system. You end the day by heading back to your computer to fill in flow-chart boxes on the master plan you've started to develop.
Smart Specialty
Government agencies and universities hire lots of systems analysts, and they're often the most stable employers. Increasingly, the private sector is using temporary employees, hired just for a specific project.
Nothing can ruin your day like your computer crashing when you haven't saved your work. David Mackey, global security intelligence lead for IBM Global Services, is constantly honing his skills to prevent that from happening. Every day he checks information reported by several dozen media outlets, security organizations, and internal security teams to piece together intelligence on emerging information technology threats. "It's daunting to try to address the myriad of software vulnerabilities, malware variants, and new attacks," Mackey admits.
In 2003 he saw firsthand what computer attacks can do, when the SQL Slammer worm grounded flights and prohibited people from withdrawing money from ATMs. "To see how quickly computer systems around the world could be crippled was both frightening and humbling," he recalls. "However, it was pretty inspiring to see computer teams from around the globe come together and get systems back online."
Mackey's latest worries involve devices most people don't consider computers, such as cellphones, PDAs, and gaming systems. They're vulnerable to attacks, too, he points out. Mackey often probes clients' computers to determine how vulnerable they are. But he's hopeful that businesses will be able to stay one step ahead of the hackers. "I also see organizations addressing vulnerable areas in their business," Mackey says. "And spending money on the people, processes, and technology to ensure protection."
Median Salary
$62,443. More specific salary data, provided by salary.com
Training
A bachelor's degree is normally expected, but not necessarily in computer science. Computer expertise acquired through real-world experience is often acceptable. An M.B.A. is a plus, though for most positions it's not required.