Infocomm TechnologyInformation and communications technology professionalsISCO 2511
IT auditor
IT auditors perform audits of information systems, platforms, and operating procedures in accordance with established corporate standards for efficiency, accuracy and security. They evaluate ICT infrastructure in terms of risk to the organisation and establish controls to mitigate loss. They determine and recommend improvements in the current risk management controls and in the implementation of system changes or upgrades.
Do You Have the Skills for This Role?
Core competency requirements inferred from the occupation's skill profile. Take the free assessment to see how you match.
Must-Have Skills (Advanced)
Decision MakingAdvanced
CommunicationAdvanced
Customer OrientationAdvanced
Supporting Skills
Digital FluencyIntermediate
European Skills Framework
Skills and knowledge areas required for this occupation based on European classification.
Essential (17)
systems development life-cyclesystems development life-cycleThe sequence of steps, such as planning, creating, testing and deploying and the models for the development and life-cycle management of a system.product life-cycleproduct life-cycleThe management of the life-cycle of a product from the development stages to the market entry and market removal.ICT quality policyICT quality policyThe quality policy of the organisation and its objectives, the acceptable level of quality and the techniques to measure it, its legal aspects and the duties of specific departments to ensure quality.ICT security standardsICT security standardsBest practices and guidelines established for securing information and communication technology (ICT) systems and data. Standards as is the case of ISO 27000 series, provide a framework for implementi...audit techniquesaudit techniquesThe techniques and methods that support a systematic and independent examination of data, policies, operations and performances using computer-assisted audit tools and techniques (CAATs) such as sprea...ICT security legislationICT security legislationThe set of legislative rules that safeguards information technology, ICT networks and computer systems and legal consequences which result from their misuse. Regulated measures include firewalls, intr...organisational resilienceorganisational resilienceThe strategies, methods and techniques that increase the organisation's capacity to protect and sustain the services and operations that fulfil the organisational mission and create lasting values by ...quality standardsquality standardsThe national and international requirements, specifications and guidelines to ensure that products, services and processes are of good quality and fit for purpose.legal requirements of ICT productslegal requirements of ICT productsThe international regulations related to the development and use of ICT products.ICT process quality modelsICT process quality modelsThe quality models for ICT services which address the maturity of the processes, the adoption of recommended practices and their definition and institutionalisation that allow the organisation to reli...prepare financial auditing reportsprepare financial auditing reportsCompile information on audit findings of financial statements and financial management in order to prepare reports, point out improvement possibilities, and confirm governability.improve business processesimprove business processesOptimise the series of operations of an organisation to achieve efficiency. Analyse and adapt existing business operations in order to set new objectives and meet new goals.analyse ICT systemanalyse ICT systemAnalyse the functioning and performance of information systems in order to define their goals, architecture and services and set procedures and operations to meet end users requirements.execute ICT auditsexecute ICT auditsOrganise and execute audits in order to evaluate ICT systems, compliance of components of systems, information processing systems and information security. Identify and collect potential critical issu...perform quality auditsperform quality auditsExecute regular, systematic and documented examinations of a quality system for verifying conformity with a standard based on objective evidence such as the implementation of processes, effectiveness ...develop audit plandevelop audit planDefine all organisational tasks (time, place and order) and develop a checklist concerning the topics to be audited.perform ICT security testingperform ICT security testingExecute types of security testing, such as network penetration testing, wireless testing, code reviews, wireless and/or firewall assessments in accordance with industry-accepted methods and protocols ...
Optional (17)
ICT network security risksICT network security risksThe security risk factors, such as hardware and software components, devices, interfaces and policies in ICT networks, risk assessment techniques that can be applied to assess the severity and the con...ICT accessibility standardsICT accessibility standardsThe recommendations for making ICT content and applications more accessible to a wider range of people, mostly with disabilities, such as blindness and low vision, deafness and hearing loss and cognit...cyber securitycyber securityThe methods and best practices that protect ICT systems, networks, computers, devices, services, processes and people against unauthorised access, modification and/or denial of service of assets.World Wide Web Consortium standardsWorld Wide Web Consortium standardsThe standards, technical specifications and guidelines developed by the international organisation World Wide Web Consortium (W3C) which allow the design and development of web applications.ICT project managementICT project managementThe methodologies for the planning, implementation, review and follow-up of ICT projects, such as the development, integration, modification and sales of ICT products and services, as well as projects...cloud technologiescloud technologiesThe technologies which enable access to hardware, software, data and services through remote servers and software networks irrespective of their location and architecture.manage IT security compliancesmanage IT security compliancesGuide application and fulfilment of relevant industry standards, best practices and legal requirements for information security.protect personal data and privacyprotect personal data and privacyProtect personal data and privacy in digital environments. Understand how to use and share personally identifiable information while being able to protect oneself and others from damages. Understand t...inform on workplace safety standardsinform on workplace safety standardsInform managers and staff regarding workplace health and safety standards, especially in the case of dangerous environments, such as in the construction or mining industry.develop documentation in accordance with legal requirementsdevelop documentation in accordance with legal requirementsCreate professionally written content describing products, applications, components, functions or services in compliance with legal requirements and internal or external standards.develop ICT workflowdevelop ICT workflowCreate repeatable patterns of ICT activity within an organisation which enhances the systematic transformations of products, informational processes and services through their production.monitor technology trendsmonitor technology trendsSurvey and investigate recent trends and developments in technology. Observe and anticipate their evolution, according to current or future market and business conditions.apply information security policiesapply information security policiesImplement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles.identify legal requirementsidentify legal requirementsConduct research for applicable legal and normative procedures and standards, analyse and derive legal requirements that apply to the organisation, its policies and products.define organisational standardsdefine organisational standardsWrite, implement and foster the internal standards of the company as part of the business plans for the operations and levels of performance that the company intends to achieve.communicate analytical insightscommunicate analytical insightsObtain analytical insights and share them with relevant teams, in order to enable them to optimise supply chain (SC) operations and planning.identify ICT security risksidentify ICT security risksApply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and eval...
Related Occupations
Other occupations in the Other category that share similar skill requirements.
AI Replacement Risk
78/ 100
Very High Risk
Low riskHigh risk