ICT Quality Assurance Engineer creates, maintains and manages technical quality assurance processes and procedures to assess efficiency, validity, value and functional performance of computer systems and environments, and audits systems to ensure compliance with, and adherence to, accredited internal and external industry quality standards and regulations. ICT Quality Assurance Engineer may supervise the work of ICT quality assurance teams.
Level 1 or Equivalent
Computer Systems Auditor
Systems Auditor (ICT)
Skills Assessment Authority
ACS (Australian Computer Society)
Quality Manager (ICT)
On the Occupation Lists:
Combined Skilled Occupations List (STSOL MLTSSL)
Short-Term Skilled Occupation List (STSOL)
RSMS Occupations List (RSMSL)
Not on the Occupation Lists:
Labour Market Testing Required for 457 List (LMTL)
Medium Long Term Strategic Skills List (MLTSSL)
As the occupation features on the Short-term Skilled Occupation List (STSOL), it is possible to apply for a Skilled Nominated 190 visa or a Skilled Regional Nominated 489 visa.
If you are employed in this occupation and you wish to pursue a GSM visa, you will be required to apply for state nomination in order to move to Australia.
Note: *Please note that while the occupation is on the STSOL it remains a possibility that no states currently have a demand for people in that profession. The online assessment only lists occupations which are currently in demand by a state or territory in Australia, so if the occupation does not appear on the online assessment you should consider seeking an employer sponsor in Australia.
Unit Group: 2632 ICT Support and Test Engineers
The job of ICT Quality Assurance Engineer is to develop procedures and strategies to support, create, maintain and manage technical quality assurance processes and guidelines and systems infrastructure, investigate, analyze and resolve system problems and performance issues, and test the behaviour, functionality and integrity of systems.
Most occupations in this unit group have a level of skill commensurate with a bachelor degree or higher qualification. At least five years of relevant experience and/or relevant vendor certification may substitute for the formal qualification. In some instances, relevant experience and/or on-the-job training may be required in addition to the formal qualification (ANZSCO Skill Level 1).
IELTS result with a minimum score of 6 (L, R, W), 7 in speaking and 7 overall;
OET result with a minimum grade B in all sections;
TOEFL iBT with a minimum score (L:12 R:13 W:21 S:23 overall L93);
PTE Academic with a min score of 50 (L, R, W), 65 in speaking and 65 overall
Australian Graduate exceptions apply in some states/territories
Priority Skilled Lists may apply a specific requirement in some states
Countries exempt from submitting IELTS or OET include the UK; Canada; New Zealand; US; and Ireland Where mandatory licensing or registration is required you must demonstrate a level of English either sufficient to meet licensing / registration or a minimum IELTS, or equivalent, whichever is higher.
Scheduling and conducting quality audit inspections, and analyzing and reviewing systems, data and documentation
Identifying variations and potential high-risk areas in securing adherence to standards and procedures
Recommending corrective action plans and improvements in the resolution of non-compliance with standards detected through monitoring and auditing of processes and procedures
Communicating, educating and liaising with users and management to ensure awareness and adherence to standards, procedures and quality control issues and activities
Assisting in troubleshooting, diagnosing, testing and resolving system problems and issues
Developing, conducting and providing technical guidance and training in application software and operational procedures
Analyzing, evaluating and diagnosing technical problems and issues such as installation, maintenance, repair, upgrade and configuration and troubleshooting of desktops, software, hardware, printers, Internet, email, databases, operating systems and security systems
Testing, identifying and diagnosing functionality errors and faults in systems, and programming code within established testing protocols, guidelines and quality standards to ensure systems perform to specification
Performing organizational systems architecture reviews and assessments, and recommending current and future hardware and software strategies and directions
Creating and reviewing technical documentation such as procedural, instructional and operational guides and manuals, technical reports and specifications and maintenance inventory systems
Closely Related Core ICT Units
Business Process Reengineering
Operating systems – (Unix, Linux, Xenix, Network OS)
Business process re-engineering a business process is a set of logically related tasks performed to achieve a defined business outcome. also it is practice of rethinking and redesigning the way work is done to better support an organization’s. Risk Management process of identifying, assessing and controlling threats to an organization’s capital and earnings. These threats, or risks, including financial uncertainty, legal liabilities, strategic management errors, Those threats or the problems are could stalk from a wide variety of sources, like strategic, management errors, including financial uncertainty, accidents and natural disasters. networking is a systematic and logical process that follows a risk based approach to determine whether the information systems of an entity, including its detailed information technology processes, controls and activities access for all user in a way to handle all problems.
Additional Closely Related Core ICT Units
Data communications – (WAN, LAN)
Database Management Systems – (Relational Database, Object Oriented Database)
Information security – (Data security)
Introduction to ICT – (Introduction to Computer Science, Computer Theory, Introduction to Business Computing, Computer Science I)
The way of investigation and analysis technique that saves or preserves the evidence from a particular computing device which would be suitable for law if any cause occurs. Network Security a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Data communication refers a sharing a file and between a sender and a receiver, using computing and communication technologies to transfer data from one place to another. Framework for the design of the computer network in accordance with the user's requirement.0+Graduated Students0+Awards & Recognition0+Professional Teachers0+Project Research
Pricing of Complete RPL Report Writing
We provide our complete RPL Writing service on the basis of your urgency level and prices respectively. There are currently three varients of service that you can purchase which are shown below.
Our Hundreds of Clients are getting Successful
Approval, When will you?
Our primary goal is to see our client's successful approval with a well-formed report following proper guidelines created for the migrants. CDR Writers Australia provides high-quality services to achieve 100% customer satisfaction.