Digital Marketing: Difference between revisions

From Secure Group Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 467: Line 467:
</div>
</div>


=== Secure Group Knowledge ===
<!-- JOB FRAMEWORK -->
To be able to reach Level 3 in our Career Journey there is some specific knowledge from our company that we request from our Digital Marketers. This means that considering the [[KAI]] grades, they will need to score a minimum proficiency considering Secure Group Knowledge in a Documentation level in the following perspectives:
<div class="">
  <div class="box-header center">
== IT Knowledge ==
  </div>
  <div class="box-content framework center">
    <div class="">
{| class="wikitable"
!System Administration
|-
!System Administration - Day to Day Ops
|-
!Networking concepts
|-
!Desktop Software Administration
|}
</div>
</div>
</div> <!-- grid -->


<!-- JOB FRAMEWORK -->
<div class="">
  <div class="box-header center">
== Secure Group Knowledge ==
  </div>
  <div class="box-content framework">
    <div class="center">
{| class="wikitable"
{| class="wikitable"
!colspan="1"|Secure Group Knowledge
!colspan="1"|Secure Group Knowledge
Line 584: Line 608:
|}
|}


=== Basic IT Concepts ===
= Salary Grid =
To be able to reach Level 3 in our Career Journey there are some basic IT concepts we expect the Digital Marketers to master. This means that considering the [[KAI]] grades of proficiency, they will need to score from 4 to 6 in the following items:
 
{| class="wikitable"
!colspan="3"|Basic IT Concepts
|-
!rowspan="1"|'''Category'''
!rowspan="1"|'''Concept'''
!rowspan="1"|'''Description/Example'''
|-
!rowspan="6"|'''System Administration'''
|Operating System (Unix)
|
* What is an operating system
* What's the correlation between Linux and the hardware and software
* What are the pieces from the Operating System and what's their function: Bootloader, kernel, Daemons, Shell, Graphical Server, Desktop Environment, Applications
* What's the importance of using Linux
|-
|Composer/Container (Docker management)
|
* What is the platform
* What can we use Docker for
* What is the Docker engine
|-
|Active Directory
|
* What are objects, resources and security principals in the Active Directory
* What is a Domain Service and what is it for
* What are the major features in Active Directory Domain Services (trees, trust, forest)
|-
|Permission Model (Storage)
|
* What is a Security Descriptor
* What is Access Control List (ACL)
* What is a parent directory and a child directory
|-
|Email Server & Email flow
|
* What's the difference between a transaction e-mail and an email API
* What's the relation between Simple Mail Transfer Protocol (SMTP), Mail Transfer Agent (MTA), Domain Name System (DNS), Mail Exchanger (MX), Post Office Protocol (POP),  Internet Message Access Protocol (IMAP)
|-
|PKI
|
* What is a PKI and what's the importance of it
* What is a Certificate and a Certificate Authority
* What's the importance of a Digital Certificate and how to check it's validity
* What's the difference between a Public Key and a Private Key and what are they used for
* How digital signatures work and how it's related to the authentication
|-
!rowspan="5"|System Administration - Day to Day Ops
|Operations
|
* How to set up a network printer and put it in the correct driver into a print server
* How to set up a working station and advanced drivers configuration
* How to set up a network printer and put it and the correct driver into a print server
* How to update and install a software
|-
|Commands
|
* What are the universal keyboard commands for operating systems
* What is a command line
* What are the most common CMD commands and what are they used for (Ipconfig, Ping, Dir, Nslookup, Tracert)
|-
|Hardware terminology
|
* What are the basic components of a Computer Hardware and what is the relation between them
|-
|Root cause analysis
|
* What is cause and effect and how they are related
* What is an event in a system log
* How to navigate an event using a timestamp
|-
|Security/privacy 101
|
* What are the best practices for Naming files, Organizing files, Archiving files and Sharing files
* What are the basic essential security and encryption measures
* How to create strong passwords and how to keep it safe
* How to check a system for bugs, spyware and other malicious applications
* How to trigger a manual virus/malware scan
* How to detect spot signs of an infection
|-
!rowspan="3"|Networking concepts
|IP
|
* How to determine your IP address
* How to translate from DNS names to IP addresses
|-
|Connectiviy
|
* How to verify physical connectivity to the network
* How to check if you have a logical connection to the network
|-
|Network traffic
|
* What is a path network traffic and what does it take to get to its destination
|-
!rowspan="5"|Programming
|Languages: HTML/CSS
|
* How to write or modify a very simple web page and basic HTML tag
|-
|SDLC
|
* What is the Software Development Life Cycle concept
* What are the phases of the SDLC
* What are software development models
|-
|Version Control
|
* What's version control and where it's used
* How to identify revisions
|-
|Spreadsheets & Basic Math
|
* What is variable and how can you use it?
* What is math, string, array and boolean and what's the relation with programming
* How to work on complex Excel or to use VBA formula
* What are Logical operator (And/Or) and how to use them
|-
|Strings
|
* How to concatenate, trim, manipulate strings in any programming language
|-
!rowspan="4"|Desktop Software Administration
|Search engines and search optimization
|
* How to conduct an advanced search
* How to discern good results from bad results
|-
|Word processing
|
* How to effectively use the spell check
* How to create tables
* How to work with headers and footers
|-
|Browser basics
|
* How to use bookmarks
* How to edit URLs to perform navigation
* How to clear the browser cache
* What are the most common error messages
|-
|Computers
|
* Hook to hook computers up and turn on without any help
|}
 
=== Salary Grid ===
{| class="wikitable"
{| class="wikitable"
!colspan="3"|Digital Marketing
!colspan="3"|Digital Marketing

Revision as of 13:03, 23 January 2020

Our Digital Marketing team is the master of digital tools and they have a passion for complex marketing and technology topics. As tech-savvy professionals, they wield the power of communication by managing our online accounts and campaigns to reinforce our marketing efforts and make our partners stand out.

As a Digital Marketer in Secure Group, you will have the opportunity to develop hard skills and soft skills and progress in our Career Journey focusing on Marketing Automation or Marketing Promotion.

In order to progress in our development path and Level Up or Step Up, our Digital Marketers must:


KAI of the position

General Knowledge Automation


General Knowledge Promotion

Specific Knowledge Promotion

IT Knowledge

System Administration
System Administration - Day to Day Ops
Networking concepts
Desktop Software Administration

Secure Group Knowledge

Secure Group Knowledge What's Expected Impact Product Minimum Grade
User Documentation Good, user-level knowledge regarding the product and its functionalities. From the user documentation, all employees across the company are required to be well aware of our solutions’ core features and functions such as the Password Advisor or how to send an automatic crash report. This knowledge helps us facilitate a user-centric approach internally, which we believe is essential to develop our business and solutions. The user documentation helps team members understand user behavior and needs more thoroughly and feel the impact of their everyday efforts. Secure OS 4
SAS 4
Secure Chat 4
Secure Email 4
Secure Vault 4
Secure Manager 4
Sales Documentation Employees should gain significant knowledge regarding the business side of Secure Group. They need to be aware of commonly used concepts in our day-to-day activities such as our business and distribution model, value proposition, selling prices, key selling points, and target audience. The information in the Sales Documentation supports employees in their daily routine. It conveys the overall business vision within the company. This documentation contributes to making employees aware of how our solutions are distributed, who are our key partners and target market to know exactly the people towards whom team members’ efforts should be aimed. Alignment on company-wide priorities is also achieved through clear communication of our value proposition and key selling points, helping everyone understand the things that matter most. Secure OS 4
SAS 4
Secure Chat 4
Secure Email 4
Secure Vault 4
Secure Manager 4
Support Documentation People within the company need to be aware of commonly occurring problems with our solutions. From the Support Documentation, employees should also extract general level knowledge regarding support processes, the issues that we’re currently having product-wise, and the approach to troubleshooting them. o The Support Documentation helps employees understand short-term priorities more clearly and communicate more openly why they’re needed. It also gives them general knowledge of how to spot and report a problem, which helps us facilitate a company-wide contribution to product development. Last but by no means least, it helps team members understand customers pains and behavioral patterns to strengthen our user-centric approach. Secure OS 3
SAS 3
Secure Chat 3
Secure Email 3
Secure Vault 3
Secure Manager 3
Functional Documentation Through the Functional Documentation, employees should get a thorough understanding of the solutions and their multiple features. People that work closely with the products must understand exactly how they function, how users interact with them, how to configure different settings, and what’s the expected behavior of different software solutions. o The information in the Functional Documentation helps employees whose work is closely connected with our solutions, to gain significant in-depth knowledge into their functionalities that far exceeds users‘ understanding. Such thorough product expertise helps us remain objective, evaluate market data more adequately, and constantly increase our internal expertise. Secure OS 4
SAS 4
Secure Chat 4
Secure Email 4
Secure Vault 4
Secure Manager 4
Technical Documentation Employees concerned with the Technical Documentation and more concretely - software development, must gain complete mastery over all solutions. Such people are regarded as technical experts and need to be well aware of data structures, relational databases, algorithms, programming languages, models, etc. The Technical Documentation is used to make sure people that are technically involved in product development have the required knowledge to perform their day-to-day tasks, optimize our solutions more easily, and support other teams with their in-depth expertise. Secure OS 4
SAS 4
Secure Chat 4
Secure Email 4
Secure Vault 4
Secure Manager 4

Salary Grid

Digital Marketing Step
Level
Individual Contributor Path Management Path 1 2 3 4
1 - 1.500 lv 1.650 lv 1.800 lv 1.950 lv
2 - 2.500 lv 2.650 lv 2.800 lv 2.950 lv
3 Manager 3.500 lv 3.650 lv 3.800 lv 3.950 lv
4 Sr. Manager 4.500 lv 4.650 lv 4.800 lv 4.950 lv
5 Head of 5.500 lv 5.650 lv 5.800 lv 5.950 lv
6 Director 6.500 lv 6.650 lv 6.800 lv 6.950 lv
- Sr. Director 9.000 lv 9.400 lv 9.800 lv 10.200 lv
- Chief of 11.200 lv 11.600 lv 12.000 lv 12.400 lv
- VP 13.400 lv 13.800 lv 14.200 lv 14.600 lv