Infocomm TechnologyInformation and communications technology professionalsISCO 2511
ICT system integration consultant
ICT system integration consultants advise on bringing together different systems to interoperate within an organisation for enabling data sharing and reducing redundancy.
European Skills Framework
Skills and knowledge areas required for this occupation based on European classification.
Essential (20)
systems development life-cyclesystems development life-cycleThe sequence of steps, such as planning, creating, testing and deploying and the models for the development and life-cycle management of a system.digital systemsdigital systemsSystems to store, process and spread information in digital form. They are hardware, software and networks, as well as the ways in which these can be employed.inter-organisational middleware systeminter-organisational middleware systemA software infrastructure that acts as an intermediary layer between applications to enable data exchange, interoperability and communication. It aims to provide standardised protocols and services be...web servicesweb servicesXML-based information systems that allows for direct interactions between applications through Internet. It is a set of protocols for transferring data between applications and systems.manage changes in ICT systemmanage changes in ICT systemPlan, realise and monitor system changes and upgrades. Maintain earlier system versions. Revert, if necessary, to a safe older system version.keep up with the latest information systems solutionskeep up with the latest information systems solutionsGather the latest information on existing information systems solutions which integrate software and hardware, as well as network components.provide ICT consulting adviceprovide ICT consulting adviceAdvise on appropriate solutions in the field of ICT by selecting alternatives and optimising decisions while taking into account potential risks, benefits and overall impact to professional customers.optimise choice of ICT solutionoptimise choice of ICT solutionSelect the appropriate solutions in the field of ICT while taking into account potential risks, benefits and overall impact.integrate ICT dataintegrate ICT dataCombine data from sources to provide unified view of the set of these data.use scripting programminguse scripting programmingUtilise specialised ICT tools to create computer code that is interpreted by the corresponding run-time environments in order to extend applications and automate common computer operations. Use progra...monitor technology trendsmonitor technology trendsSurvey and investigate recent trends and developments in technology. Observe and anticipate their evolution, according to current or future market and business conditions.attend to ICT systems qualityattend to ICT systems qualityEnsure correct operations which comply fully with specific needs and outcomes in terms of the development, integration, security and overall management of ICT systems.apply information security policiesapply information security policiesImplement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles.monitor system performancemonitor system performanceMeasure system reliability and performance before, during and after component integration and during system operation and maintenance. Select and use performance monitoring tools and techniques, such ...consult with business clientsconsult with business clientsCommunicate with clients of a business or business project in order to introduce new ideas, obtain feedback, and find solutions to problems.define integration strategydefine integration strategySpecify strategies for system integration, incorporating the time schedule, the processes required to combine components into subsystems and systems, the means on how components will interface as well...ensure proper document managementensure proper document managementGuarantee that the tracking and recording standards and rules for document management are followed, such as ensuring that changes are identified, that documents remain readable and that obsoleted docu...define technical requirementsdefine technical requirementsSpecify technical properties of goods, materials, methods, processes, services, systems, software and functionalities by identifying and responding to the particular needs that are to be satisfied acc...integrate system componentsintegrate system componentsSelect and use integration techniques and tools to plan and implement integration of hardware and software modules and components in a system.verify formal ICT specificationsverify formal ICT specificationsCheck capabilities, correctness and efficiency of intended algorithm or system to match certain formal specifications.
Optional (29)
Agile project managementAgile project managementThe agile project management approach is a methodology for planning, managing and overseeing of ICT resources in order to meet specific goals and using project management ICT tools.model based system engineeringmodel based system engineeringModel-based systems engineering (MBSE) is a methodology for systems engineering that uses visual modelling as the primary means of communicating information. It is focused on creating and exploiting d...software components librariessoftware components librariesThe software packages, modules, web services and resources that cover a set of related functions and the databases where these reusable components can be found.hardware componentshardware componentsThe essential components that make up a hardware system, such as liquid-crystal displays (LCD), camera sensors, microprocessors, memories, modems, batteries and their interconnections.ICT system integrationICT system integrationThe principles of integrating ICT components and products from a number of sources to create an operational ICT system, techniques which ensure interoperability and interfaces between components and t...trading softwaretrading softwareThe finance and trading integrated software solutions.ICT project management methodologiesICT project management methodologiesThe methodologies or models for planning, managing and overseeing of ICT resources in order to meet specific goals, such methodologies are Waterfall, Incremental, V-Model, Scrum or Agile and using pro...Process-based managementProcess-based managementThe process-based management approach is a methodology for planning, managing and overseeing of ICT resources in order to meet specific goals and using project management ICT tools.lean project managementlean project managementThe lean project management approach is a methodology for planning, managing and overseeing of ICT resources in order to meet specific goals and using project management ICT tools.software components supplierssoftware components suppliersThe suppliers who can deliver the required software components.hardware components suppliershardware components suppliersThe suppliers who can deliver the required hardware components.ICT performance analysis methodsICT performance analysis methodsThe methods used to analyse software, ICT system and network performance which provide guidance to root causes of issues within information systems. The methods can analyse resource bottlenecks, appli...system designsystem designThe process of defining the architecture for different components and modules of a system, as well as the relevant data, for satisfying specific requirements.use an application-specific interfaceuse an application-specific interfaceUnderstand and use interfaces particular to an application or use case.manage ICT change request processmanage ICT change request processSpecify the incentive for an ICT change request, stating which adjustment in the system needs to be accomplished and execute or supervise the execution of it.plan migration to cloudplan migration to cloudSelect existing workloads and processes for potential migration to the cloud and choose migration tools. Determine a new cloud architecture for an existing solution, plan a strategy for migrating exis...implement ICT security policiesimplement ICT security policiesImplement statements, assertions or rules that specify the appropriate use and protection of the ICT assets and systems from an organisation. These ICT security policies cover topics such as data clas...provide connected car solutionsprovide connected car solutionsProvide technological applications and services which enable cars to be connected to the internet for data transmission. Connected car solutions involve leveraging technologies such as GPS, sensors, o...create project specificationscreate project specificationsDefine the workplan, duration, deliverables, resources and procedures a project has to follow to achieve its goals. Describe project goals, outcomes, results and implementation scenarios.use different communication channelsuse different communication channelsMake use of various types of communication channels such as verbal, handwritten, digital and telephonic communication with the purpose of constructing and sharing ideas or information.educate on data confidentialityeducate on data confidentialityShare information with and instruct users in the risks involved with data, especially risks to the confidentiality, integrity, or availability of data. Educate them on how to ensure data protection.use back-up and recovery toolsuse back-up and recovery toolsUse tools which allow users to copy and archive computer software, configurations and data and recover them in case of loss.track key performance indicatorstrack key performance indicatorsIdentify the quantifiable measures that a company or industry uses to gauge or compare performance in terms of meeting their operational and strategic goals, using preset performance indicators.write work-related reportswrite work-related reportsCompose work-related reports that support effective relationship management and a high standard of documentation and record keeping. Write and present results and conclusions in a clear and intelligib...implement a virtual private networkimplement a virtual private networkCreate an encrypted connection between private networks, such as different local networks of a company, over the internet to ensure that only authorized users can access it and that the data cannot be...perform project managementperform project managementManage and plan various resources, such as human resources, budget, deadline, results, and quality necessary for a specific project, and monitor the project's progress in order to achieve a specific g...manage cloud data and storagemanage cloud data and storageCreate and manage cloud data retention. Identify and implement data protection, encryption, and capacity planning needs.build business relationshipsbuild business relationshipsEstablish a positive, long-term relationship between organisations and interested third parties such as suppliers, distributors, shareholders and other stakeholders in order to inform them of the orga...implement a firewallimplement a firewallDownload, install and update a network security system designed to prevent unauthorized access to a private network.
Related Occupations
Other occupations in the Other category that share similar skill requirements.
AI Replacement Risk
82/ 100
Very High Risk
Low riskHigh risk