Home / Industry

IT Project Management: Best Practices in Small-Scale Engagements

In an age of belt-tightening and doing more with less, not every IT project warrants an executive sponsor, someone who assumes the role of full-fledged project manager. During smaller engagements, the engineer, developer or technician often takes on the PM role, as well as the role of consultant and delivery agent — inheriting all the customer-facing project-tracking duties involved in a project.

Be S.M.A.R.T. about IT Development

If you should find yourself in such an expanded role, remember to be S.M.A.R.T. about IT development and follow these best practices.

During your kick off call, when you are reviewing the statement of work during the project's inception you must ensure that your project goals and milestones are:

Specific: Specificity reduces misunderstandings.

Measurable: A task that is not measurable will never be completed. How would you know when it's finished?

Agreed upon by all parties: If a milestone or task is not agreed upon by all parties, it is not worth doing.

Realistic: It is the task of the delivery engineer to determine what is realistic and craft a plan that takes into account the client approval processes, change management restrictions and human resources.

Time Constrained: A task or milestone that has no time constraints will always be finished "tomorrow" and never today.

On small-scale engagements in which a customer has contracted for a finite number of hours of service (for example, less than 40), the kickoff call may be the only structured status meeting that occurs prior to onsite project delivery (or production migration). This makes the meeting more urgent: it's your chance to open communication channels that are crucial to success.

And while you might think project goals are apparent to everyone, experience tells us that sometimes this simply isn't the case. In fact, it is not uncommon for key personnel to have never seen the SOW (statement of work).

Think about it: representatives from divisions such as network, application, firewall, network operations center (NOC), security operations center (SOC), identity management and the Change Control Board were most likely not involved in crafting the statement of work (SOW) — nor were they consulted prior to the contract being signed. Although the project's success is dependent on their work and expertise, they aren't familiar with the project's goals. It's a mistake to assume they are in the loop, and as manager of the project, you must educate all the key players about all elements of the project.

Moving beyond covering the statement of work, the project goals, and how you plan to complete the project, , you should also bring your sharpest, most probing questions to the meeting. Your goal should be to uncover obstacles encountered in the past and flesh out the details on how to overcome them.

Best practice of all: Remembering that the only dumb question is the one you didn't ask.


About Neustar – Every day, the world generates roughly 2.5 quadrillion bits of data. Neustar isolates certain elements and analyzes, simplifies and edits them to make precise and valuable decisions that drive results. Learn More

Related topics: Cybersecurity


Don't miss a thing – get the Weekly Wrap delivered to your inbox.

Related Blogs

Related News

Explore Topics

Dig Deeper

Mobile Internet

Sponsored by Afilias Mobile & Web Services

IP Addressing

Sponsored by Avenue4 LLC

DNS Security

Sponsored by Afilias


Sponsored by Verisign

Promoted Posts

Buying or Selling IPv4 Addresses?

ACCELR/8 is a transformative IPv4 market solution developed by industry veterans Marc Lindsey and Janine Goodman that enables organizations buying or selling blocks as small as /20s to keep pace with the evolving demands of the market by applying processes that have delivered value for many of the largest market participants. more»

Industry Updates – Sponsored Posts

Verisign Named to the Online Trust Alliance's 2017 Audit and Honor Roll

Attacks Decrease by 23 Precent in 1st Quarter While Peak Attack Sizes Increase: DDoS Trends Report

Leading Internet Associations Strengthen Cooperation

Verisign Releases Q4 2016 DDoS Trends Report: 167% Increase in Average Peak Attack from 2015 to 2016

Verisign Q3 2016 DDoS Trends Report: User Datagram Protocol (UDP) Flood Attacks Continue to Dominate

2016 U.S. Election: An Internet Forecast

Government Guidance for Email Authentication Has Arrived in USA and UK

ValiMail Raises $12M for Its Email Authentication Service

Don't Gamble With Your DNS

Defending Against Layer 7 DDoS Attacks

Understanding the Risks of the Dark Web

New TLD? Make Sure It's Secure

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

How Savvy DDoS Attackers Are Using DNSSEC Against Us

Facilitating a Trusted Web Space for Financial Service Professionals

MarkMonitor Partners with CYREN to Deepen Visibility into Global Phishing Attacks

Verisign Named to the Online Trust Alliance's 2016 Honor Roll

Verisign Q1 2016 DDoS Trends: Attack Activity Increases 111 Percent Year Over Year

Is Your TLD Threat Mitigation Strategy up to Scratch?

i2Coalition to Host First Ever Smarter Internet Forum