Business priority identified by PRM-Technical section for 2011
Business Challenge Human challenge L&D
week system integration and Understanding IT business end to end proper knowledge on consolidation. different IT systems system capacity limitation Not having IT service road map, Basic of SOA IT system design problems, Requirement changes underutilization of existing Human (Lack of understanding system Advanced skill on database systems specific skill, lack of developing in-house skill, CRM, BSS, OSS, software’s, lack of providing challenging OS(UNIX, Linux) Admin). assignments as to improve and implement develop end to end employee skill, lack of advanced skill on monitoring skill. database skill, CRM, BSS, OSS, OS Admin), System optimization skill: lack of end to end monitoring skill, -IPCC, ECAF and Storage. optimization skill gap software development skill. company strategy on SLA management. High dependency on vendors lack of confidence on employee expertise understanding of internal lack of understanding on fraud Increase awareness on employee on fraud management tools like FMS, EIR,.. internal employee on fraud management leakage limited KPI on fraud detection mechanism. management. limited understanding on exist fraud Essential skill on fraud management tools systems features. management tools. lack of flexibility on applying different Knowledge on best practice detection solution as per the behavior of and international fraud KPI. the fraud Knowledge on all features of FMS. Use new and advanced way of Security management Business continuity and risk management Data center monitoring
Competency assessment done by company
Population Competence Name Definition Level 2 level 3 level 4 Total IT problem management Ability to detect problems, to provide solutions to problems (work around & known errors) and prevents their reoccurrence. Proactively manage problems to minimize impact on business 0 40 69 109 Work station installation Know how to install workstations (office automation, and user telephony) Know how to perform internal and network telecoms installations (IP and voice, infrastructure equipment) Know how to take action on an installed base of internal computer, network and telecoms equipment Know how to manage servers 0 37 51 88 Software techniques Know and integrate use of the software technologies, standards and protocols used in the area 8 40 33 81 Middleware Basic software components offer (transactional monitors, message manager) facilitating communication (synchronous or asynchronous) between different applications in a heterogeneous, distributed environment. 5 40 30 75 Knowledge Of a The activity of the Information System applies to several professional Area functional domains of the integrated operator. This requires knowledge of one or several of these domains (billing, CRM, delivery, network, business intelligence, corporate, etc.) 2 17 18 37 Quality and Standards Establish methods, rules and procedures conforming to an approach quality Know how to support their implementation Know how to audit an organization, system or process. 0 10 24 34 Company IS Strategies Know the Company's information systems strategy (choices, priorities, etc.) Know the products and solutions adopted and be able to promote and support them with conviction, adapting to varied contexts. 2 6 25 33 Software Architecture and The Software Architecture covers the principal rules and Support Platform technologies for Technical Design/encoding/deployment adopted by the Company for implementation in the context of Application Servers (J2EE) and the Technical Architecture principles. 1 8 20 29 Knowledge of security vulnerabilities and attacks and their detection Knowledge of methods / functions of prevention and response to attacks System knowledge on dedicated equipment (firewall, “puits”, etc. ..) Knowledge in basic security mechanisms to be implemented to secure the network (authentication, encryption, integrity, PKI, access control ...) Techniques and parades of the frauds to the services operators Networks and Services Legal Obligations of security Security Contactless cards SIM Cards Technical content protection: DRM, watermarking, fingerprinting ... Secure Transactions Protocols for Mobile and Internet Payment Marking Cryptography and its applications: electronic signature, secure exchanges for e-business (EDI, ebXML ...) Enablers: Identity Management, User Privacy, Archiving .Distribution of contents in HTTP, HTTP adaptive streaming 6 18 4 28 Crisis management Situation report during normal period Definition of the role of the crisis coordinator and appointment Establishment of a crisis team Organization of communication 0 15 11 26 Content security area Knowledge of the security of information systems and networks Knowledge of security systems (DRM, conditional access, etc.) Cryptology techniques Audiovisual and multimedia environments Knowledge of technical content distribution lines 4 8 11 23 Integration Metrology Contribute to verification and optimization on a platform Tests of the global quality of an Information System or an integrated set of applications in terms of security, reliability and performance 5 10 8 23 QoS management Skills corresponding to the knowledge and practice of solutions implementing Group IS solutions (GCC) or market solutions relative to the quality management of network services. 4 8 10 22 Testing and Operability Overall knowledge of the Technical Environment tools (Workstations, Servers, Network, Databases), tools and modeling essential for implementation of Performance and Availability measurements (response times, load tests, operability) for an Application 0 16 5 21 Enterprise networks Know the characteristics of company networks 0 10 10 20 Network Architectural Defining or subdividing (server and network Security Policy infrastructure, segmenting, Administration) the security policy. Implementing, managing and guaranteeing the corresponding security procedures. 2 12 3 17 Functional area and The IS is generally 'subdivided' into functional areas and business process business processes so that it can be worked on work on in smaller blocks, while remaining consistent with the Group's various activities (billing, customer relationship) 2 7 6 15 Audit technique Knowledge of internal audit methodology and standards. Ability to carry out an Audit assignment (preparation of the assignment according to engagement letter (scope, theme, goals), execution of the assignment in the field, drafting of a summary report (findings, causes, recommendations). 0 5 9 14 Digital content protection Digital content protection techniques (smart cards, techniques Digital Rights Management, etc.) 0 3 11 14 CRM Solutions Group IS solutions (GCC) or market solutions (firmware) linked to the customer relationship 0 8 5 13 Intellectual Property Provide intellectual property consulting for the technical consulting teams 0 9 4 13 Organizational awareness Ability to understand the formal and informal structure of the company, as well as its culture and its commercial environment 0 4 9 13 IT security Elements for evaluating risk related to IT and application security 0 4 8 12 Network quality & performance Know the calculation concepts for reliability, availability of networks or strings of network elements Understanding in using service quality concepts Understanding and analyzing the technical parameters of the existing or forthcoming network 2 4 6 12 User Support and Service Knowledge of the organization and operation of a support chain. Know how to analyze dysfunctions and provide functional and implicational support to users and teams (TPM, BPM) 0 9 2 11 Help Desk Tools All IT Help Desk tools comprising Client Relation functions, Supervision and remote control of work stations and finally 'capitalization' (Knowledge Management) by setting up a solutions database for malfunctions which have occurred. 0 3 6 9 IS Business Relations Be able to prospect for and detect new Business in IS technical project management services. Be able to analyse the context of a Business requirement and steer a technical and commercial response, with the support of the experts and consultant 4 3 2 9 Master software security Contribute through action to resolving software security problems and to developing a the 'security' dimension in the software area 0 1 8 9 Knowledge of regulations Know legal and regulatory aspects specific to electronic communications and associated procedures. Have the ability to interpret, analyze the specific regulations or formulate recommendations in terms of regulations 3 5 0 8 Network Service Activation Skills corresponding to the knowledge and practice of solutions implementing Group IS solutions (GCC) or market solutions relative to the activation of services or network domain. 0 5 3 8 Complex network operation study, LL & Know how to carry out a complex study into the structuring NW extension or development of the local loop network and structuring network Complying with the engineering rules and the associated equipment... Know how to utilize and study several technical choices 2 1 4 7 Deferred analysis AQ - MAI Know how to gather and interpret information to analyze it offline and draw up a corrective or preventive action plan Know how to control or carry out reporting during incident analysis and propose corrective action 2 4 1 7 Services design Proposes new functionalities for offer of services, or proposes an evolution for existing functionalities, with respect to business unit expectations 1 2 4 7 Competencies consisting of knowing how to Model the Company are Businesses by Area (Process Analysis) and Analysis Tools and model an IT application from a functional standpoint. Methods Set of analysis and design methods based on UML modeling 'notation' 1 1 4 6 Launch of a product Translate and break down the launch of a product or service into operational action plans 3 3 0 6 Master analysis of a technical area and have a vision of its development Analysis of a technical area Analyze and interpret the news in the technical area (software, service, network) to assess its dynamism and anticipate change 0 2 3 5 Commercial awareness Ability to focus on what is important on the market and understand the impact of all the actions carried out on the customers and the results 0 1 4 5 IS Intelligence and Anticipation Monitor the competition to gather technological intelligence and know the market offering in terms of software packages and functional or development components. Carry out anticipation studies into IS solutions and services and project into future the consequences of a functional or technological choice, and analyze and control the risks. 4 0 1 5 Database management Skills relative to the base of market offers (Publishers or systems 'free software') mentioned in the catalogue of products for the IS of the Group in terms of relational Databases or on Applications Servers. Skills relative to production (data back up, restoration, 'logging'), to performance, to supervision and to integrity of these Databases. 0 4 0 4 operation process Mastery of operation process 0 0 4 4 PF & interpersonal Protocols, functions and network services to support communication services voice services (VoIP, SIP, RTP/RTCP, H323, H248 etc.)on fixed and mobile networks Systems skills on dedicated equipment (ECR, SBC, Call server, interco gateways, MCU etc.) Telephone message systems for companies, company voice services (IPBX) Telepresence, Audioconf Enablers: Instant messaging, Call log, Click to call, SMS (MMS), Extended Message Module (EM2+NOTILUS) 0 4 0 4 Technical qualification of Know how to listen to the customer, analyze their requirements requirements and then qualify them in technical terms 1 1 2 4 Validation and testing tools Master the validation procedures and use of test tools 1 3 0 4 Collection of usage data Know and use the techniques for gathering data on users' actual use 0 1 2 3 Functional IS Architecture Translating Customer Requirements into a Company IS Development Project (applications, data and exchange systems) providing it with open-endedness, opening to partners and customers, and optimized development and operational costs. 1 1 1 3 Technical architecture Designing and utilizing the IS technical architecture or service platforms in compliance with the group's engineering principles and techniques. Ability to define, implement and manage Network, Data and Application Server architecture. ` 0 3 0 3 Technical mastery of the Know the technical content distribution chains content area Technical knowledge of: - Service platforms - Group network architecture - Portal - Terminals 0 1 2 3 User usage tests Lead tests into the behavior of users in their relations with telecommunications services 1 2 0 3 Analysis of budgetary items: expertise in budget preparation (segmentation, allocation methods, Analyses performance assignment of duties, budget period closure), ability to propose concrete solutions meeting operational goals 0 2 0 2 Applying the procedures Know how to interpret and implement the procedures linked to the area and the activity 0 2 0 2 Solutions/techno Skills on equipment, Bays, Robotics, Storage Network safeguard (San) and norms and standards of the domain in terms of Administration, data protection and Performance 0 2 0 2 Billing Solutions Group IS solutions (GCC) or market solutions (firmware) linked to billing 0 0 1 1 Operating Systems, Command of the characteristics of all Operating Systems Administration, Scheduling (proprietary and 'Free Software') and all tools (Schedulers, Command languages, archiving) mentioned in the Company 'catalogue'. Command of implementation solutions (remote actions, graphical interfaces) to optimize, increase reliability and secure administration of the Information Systems implemented on these operating systems. 0 1 0 1