Skip to main content

UX Researcher - Job / Requirements


Today the earth discuss., "The Emergence of the infraweb and new consumption patterns have created new jobs"

UX research tends to understand user expectations and barriers. Among them, that of UX researcher.

It's a varied, exciting job, where you learn to question yourself in the broad sense, while cultivating an ability to listen actively and a keen sense of analysis according to the job description, So you wonder what are the differences with UX and UI design? What training, what roles to perform next and for what salary?

I have to agree when the future candidate should participate in at least three or two open source communities as showcases in Infosec Field, I believe this task is not a worksheet job specially for large companies / organisation flow.

Here are some examples to take as a requirement

Conduct and evaluate quantitative and qualitative research.
Primary and secondary user research.

Marketing ethnographic research.
Gather & analyze data.

Work closely with cross-teams to identify & evaluate R2D

Implement user research strategies and methodologies.

Mentor and coach junior UX researchers on the team.

Perform usability studies with consumers.

Ability to search & use a diverse set of UX research tools.


This is only my personal advice about the position , no more what requirements comes next , if you are ok with this you can start immediately!.

@DRVX92 

Popular posts from this blog

Navigating the CCNA 2024 Update.

  Greetings fellow network enthusiasts and aspiring IT professionals! As the technology landscape continues to evolve, so does the CCNA certification, the industry-standard credential for networking professionals. With an anticipated update in late 2024, it's time to gear up and prepare for the changes that lie ahead. Understanding the Driving Forces: The CCNA 2024 update reflects the ever-changing nature of networking technologies and industry standards. Cisco, recognizing this dynamic environment, is incorporating key trends and advancements into the exam to ensure that certified professionals possess the skills and knowledge required for success in today's complex networking environments. Anticipated Exam Changes: While the official exam blueprint is yet to be released, Cisco has provided some insights into the anticipated changes. Here's a sneak peek into what you can expect: Cloud and Cybersecurity Focus: The updated exam will place a greater em

Q/A Cryptocurrencies - is it Legal , or Not ?

The Law Article codes on this date vary from one country to another, in Morocco it is not legal to carry out transactions according to the following regulations of 2017. According to Wikipedia  :  On November 20, 2017, Morocco's foreign exchange office declares that transactions carried out via virtual currencies constitute a violation of foreign exchange regulations, subject to sanctions and fines. The Library of Congress (LOC) conducts periodic reviews of countries' stances on Bitcoin and cryptocurrencies,  In November 2021 identified 103 countries whose governments directed their financial regulatory agencies to develop regulations and priorities for financial institutions regarding cryptocurrencies and their use in AML & CFT. The L.O.C also identified many countries that allow cryptocurrencies to be used. Several other countries allow Bitcoin to be used in transactions and have developed forms of regulation. Some examples are: - USA - United Kingdom - Israel - Australia

SQL injection: Basics - Tip for Developers Part 1/

  In many forums, and articles available on the internet you always find some articles about what called "dorks" which is a method used by attackers to identify the sql injection possibility on your sql app. Tip for Developers , after the setup of the Anti-DDOS procedures you should secure your code by some basics stuff if you see that something can be possible from the given example. Often using sql operate to a database system: Back-up procedures and the use of secure hardware are as important as comprehensive protection measures against external access, "So-called SQL injections", on the other hand, represent a great danger especially for classic relational database models and the information implemented there. What is an SQL injection? The term SQL injection refers to the exploitation of a security flaw in relational database systems that refer to the SQL language. The attacker uses data entered by the user on the database interface which is not s