Red-Hot Tech Jobs in 2012 - Slide 3

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15
Next Red-Hot Tech Jobs in 2012-3 Next

Maintaining data has become an increasingly complex task, which is why companies need professionals who can collect, analyze and mine stored data, as well as offer effective storage strategies. Anticipated base compensation for these professionals is expected to climb 6.7 percent to between $88,000 and $119,000 in 2012.

Lawyers and detectives may be the roles most commonly depicted on TV, but the jobs that get high ratings in real life are often lesser known. According to salary research from Robert Half, demand for positions such as mobile application developers, data warehouse analysts and user experience (UX) designers is expected to grow in the coming year as companies look to invest in their information technology (IT) infrastructure and digital presence.

"A common feature of high-demand jobs is a large degree of specialization," said John Reed, executive director of Robert Half Technology. "Professionals with the best prospects have finely tuned abilities that enable their companies to take advantage of new technology and the increasing amount of information available to them."

The following is an overview of seven high-potential jobs identified by Robert Half for 2012, as well as six more in-demand skills identified by Susan Hall.

More Slideshows:

Ten Tips for Better BI Reporting As more employees in a company become responsible for decision-making, easy access to reporting and analysis has become paramount.

Five Innovations That Will Change Our Lives Within Five Years Five innovations that will change how we live, work and play.

Five Security Predictions for 2012 The top security threats for the coming year.


Related Topics : Application Security, IT Process Management, Six Sigma

More Slideshows

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

NETSCOUTShadowIT0x 6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.