Project Control Officer

The project control officer bears responsibility for defining clear roles and accountability measures on an IT team. Working under the direction of senior project managers, this mid-level manager oversees the project’s list of action items and briefs the team on weekly or monthly progress. The project control officer may also monitor budget and risk management priorities to ensure that the project stays on track financially. Project control officers typically provide the link between project managers and technical specialists, so a working knowledge of both business administration and information technology is essential.

A computer science or information technology degree is the typical starting point for a project control officer career. A bachelor’s degree offers a solid foundation, with a comprehensive curriculum combining core communication and analytical skills with computer training. Control officers can advance into project management with an MBA or Project Management Professional (PMP) certification.

Recommended Reading: Webopedia’s list of Computer Certifications for Students and IT Professionals.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

SHA-256

SHA-256 is an algorithm used for hash functions and is a vital component...

Document Management System

A document management system is an automated software solution businesses and organizations use...

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a service...