A to Z Software Development Roles

I’m Chris Saunders, a technologist passionate about product delivery and innovation in the technology industry. This blog is where I share my insights, experiences, and ideas around building and delivering exceptional products.

Software Development Roles: Skill Attributes Visualisation

This 3D scatter plot visualises various software development roles based on three key skill attributes:

  • Project Timeline (x-axis): Representing the spectrum from project start to project end.
  • Focus Orientation (y-axis): Spanning from people focused to technology focused roles.
  • Thinking Style (z-axis): Differentiating between operational thinking and strategic thinking.

Each marker represents a distinct role, with its position indicating the relative emphasis on each of these attributes. Use the chart to explore how different roles balance these skills. How one person in a 3D space could assume another role nearby in the space.

Click the "Reset Chart View" button to reset the chart to its default view.

Click the "Set Y and X Front View" button to set the chart to see Y on the left and X on the bottom.

Click the "Set Y and Z Front View" button to set the chart to see Y on the left and Z on the bottom.

Interacting with the 3D Scatter Plot:

Zoom:

  • Mouse Scroll: Scroll the mouse wheel up and down to zoom in and out.

Rotate:

  • Click and Drag: Click and drag on the plot to rotate it in any direction.
  • Right Click and Drag: Right-click and drag on the plot to pan it left, right, up, or down.

Reset Chart View:

  • Reset Button: Click the "Reset Chart View" button below the plot to reset the view to its default position (Y axis left, X axis bottom, and Z axis depth).

Explore:

  • Hover: Hover over a data point to see additional information about the role it represents.

"Z" for Zero-Day Analyst. Software Development Roles: A to Z

As a Zero-Day Analyst, they specialise in identifying and mitigating zero-day vulnerabilities in software and systems. These vulnerabilities, unknown to vendors or developers, are critical targets for exploitation by malicious actors.

Personal Story: In my experience, most zero-day issues fall into one of two categories: The operating system has a vulnerability that requires an upgrade or patch to be applied ASAP. Did you know? Zero-day vulnerabilities are particularly dangerous because there are no patches or fixes available to protect against potential attacks, making them a significant threat.


Popular Posts