recommended reading

Coming IT program managers will be senior leaders

A cadre of newly codified federal information technology positions known as IT program managers will likely be highly paid and highly ranked, with broad authority to manage major technology development initiatives, specialists say.

Generally, IT program managers should oversee a single large-scale information technology initiative that involves multiple teams working on different components, Alan Balutis, a former chief information officer at the Commerce Department and now a director at Cisco's Internet Business Solutions Group, told Nextgov.

"We were looking at a senior executive-level position, someone who, besides any kind of outside education or certification, has actually had growing responsibility for increasingly larger-scale projects," Balutis said.

Balutis was part of a group of former federal chief information officers and other executives who helped outline the scope of the program manager position for White House Chief Information Officer Vivek Kundra.

Establishing the IT program manager position is one goal in Kundra's 25-point plan to reform federal IT management, published in December 2010.

In March, the Office of Personnel Management issued a draft description of the new positions. The comment period for that draft job description closed on April 14, and the office expects to issue a final job description in May, a spokeswoman said.

IT program manager is already a common job title across much of the federal government, the Veteran's Affairs Department's Chief Information Officer Roger Baker said on Monday, but there isn't a codified system for who qualifies for program manager status or what the job should entail.

Balutis' group, the Senior Advisors to Government Executives, described program management as not "institutionalized as an established management discipline" within the government outside of the Defense Department and a few civilian agencies.

The SAGE group is affiliated with the nonprofit Partnership for Public Service.

The comments on OPM's draft job description were largely positive, a spokeswoman said. The primary concern was that the program manager position wasn't distinguished strongly enough from an IT project manager position, created in 2004.

According to the draft description, an IT program manager "coordinates, communicates and integrates IT projects and program activities" and "ensure[s] that the work effort achieves the outcome as specified within the IT business strategies."

An IT project manager, by contrast, "directly manag[es] information technology projects to provide a unique service or product."

Balutis said he'd also like to see more specifics in the final job description.

Balutis described a project manager's job as being wholly responsible for one component of a major IT initiative, such as developing a single software program.

Program managers, he said, should be responsible for something much larger, such as organizing work on multiple new operating systems, making sure things come out as scheduled and overseeing communication between different teams of IT developers, the agency staff that will use the new systems and legal and financial teams.

"All of that would be rolled up under one program manager who would be in charge of the entire array of initiatives," Balutis said, and who would be "guiding the whole change effort and be the point of interface with the senior leadership."

As an example, Balutis cited a $5 billion Commerce Department program to modernize the National Weather Service from the 1990s that included not only upgrading the equipment for collecting weather data but also shifting to an information-gathering model that relied much more on technology and less on employees using rain gauges.

"It's really one of those jobs where there's no such thing as something that's not your responsibility," VA's Baker said.

"A great program manager to me is someone who's got the view that whatever it takes to get the program delivered, that's the best use of my time," Baker said. "Whether that's going up and talking to the secretary to keep my program online ... or filling out paperwork, the most mundane stuff, to get three new programmers a laptop."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.