Explore Careers - Job Market Report
Information systems analysts and consultants conduct research, develop and implement information systems development plans, policies and procedures, and provide advice on a wide range of information systems issues. They are employed in information technology consulting firms and in information technology units throughout the private and public sectors, or they may be self-employed.
IT (information technology) consultant, computer consultant, computer systems analyst, informatics consultant, informatics security analyst, information systems business analyst, information systems quality assurance analyst, management information systems (MIS) analyst, systems auditor, systems consultant, systems security analyst.
- Information systems business analysts and consultants confer with clients to identify and document requirements, conduct business and technical studies, design, develop, integrate and implement information systems business solutions, and provide advice on information systems strategy, policy, management, security and service delivery.
- Systems security analysts confer with clients to identify and document requirements, assess physical and technical security risks to data, software and hardware, and develop policies, procedures and contingency plans to minimize the effects of security breaches.
- Information systems quality assurance analysts develop and implement policies and procedures throughout the software development life cycle to maximize the efficiency, effectiveness and overall quality of software products and information systems.
- Systems auditors conduct independent third-party reviews to assess quality assurance practices, software products and information systems.
Education & Job Requirements for Information Systems Analysts and Consultants in Notre Dame-Central-Bonavista Bay Region
Education and job requirements can vary by region. Workers in regulated occupations require a licence to work legally. Workers in non-regulated occupations do not require a licence, but employers may have other certification requirements.
Employment requirements are prerequisites generally needed to enter an occupation.
- A bachelor's degree in computer science, computer systems engineering, software engineering, business administration or a related discipline
Completion of a college program in computer science is usually required.
- Experience as a computer programmer is usually required.
- Certification or training provided by software vendors may be required by some employers.
Regulation by Province/Territory
Some provinces and territories regulate certain professions and trades while others do not. If you have a licence to work in one province, your licence may not be accepted in other provinces or territories. Consult the table below to determine in which province or territory your occupation/trade is regulated.
|Province and Territory||Regulation|
|Newfoundland and Labrador||
|Prince Edward Island||
Programs in the order in which they are most likely to supply graduates to this occupation (Information Systems Analysts and Consultants):
- Computer Science
- Computer and Information Sciences and Support Services, General
- Business Administration, Management and Operations
- Computer Engineering Technologies/Technicians
- Business/Commerce, General
The essential skills profiles can:
- Help determine, based on skill sets, which career may best suit a particular individual.
- Assist job seekers to write a résumé or prepare for a job interview.
- Help employers to create a job posting.
Employers place a strong emphasis on essential skills in the workplace. Essential skills are used in nearly every occupation, and are seen as “building blocks” because people build on them to learn all other skills.
Each profile contains a list of example tasks that illustrate how each of the 9 essential skill is generally performed by the majority of workers in an occupation. The estimated complexity levels for each task, between 1 (basic) and 5 (advanced), may vary based on the requirements of the workplace.
Information systems analysts and consultants
Information systems analysts and consultants conduct research, develop and implement information systems development plans, policies and procedures and provide advice on a wide range of information systems issues. They are employed in information technology consulting firms and in information technology units throughout the private and public sectors, or they may be self-employed.
- Read messages about ongoing work from co-workers, colleagues and clients. (2)
- Read about new products in marketing materials such as brochures, pamphlets and product information sheets. For example, they may learn about ad hoc query and reporting analysis tools that can publish information from data warehouses. (2)
- Read comments, suggestions and responses to frequently asked questions posted on Internet 'listservs' and forums. For example, they may read about new ways to test database platforms. (2)
- Read about new technologies and their applications in professional journals, industry magazines and periodicals. For example, they may read articles that discuss the arrival of radically restructured database architectures. (3)
- Read about database applications, application platforms, computer languages and hardware in reference and technical manuals. They require a strong understanding of information system technology to understand and apply technical information in these lengthy and complex manuals. (4)
- Read about information systems development projects and requirements in documents such as requests for proposals, business plans and reports. They read these documents for detailed information on a broad range of topics such as technical specifications, project deliverables, timelines and financial constraints. (4)
- Scan tables to locate technical specifications and data such as passwords, dates, names and product identifiers. (1)
- Record project activities such as dates, times and actions taken in log books. For example, they may record the length time that systems are down in log books. (1)
- Review defect escalation forms written by co-workers and clients to identify the types and severity of database application problems. (2)
- Review Gantt charts to determine project schedules, resources being allocated and upcoming activities. (2)
- Review and interpret integrity relationship diagrams to determine key database elements such as entities, attributes, relationships and indexes. (3)
- Interpret lengthy passages of computer language code to determine how an application's functionality such as logical branching or object orientation is achieved. (4)
- Interpret process flow charts to understand what data is captured and how it travels between various applications and hardware components. (4)
- Record items discussed with clients using short notes and log entries. For example, they may note that clients understand that toolsets such as Oracle Designer are used to model, create and test their database applications. (1)
- Write memos and e-mail to clients, co-workers and vendors to provide them with work updates and to request information. (2)
- Write concise statements in defect escalation reports to describe the severity and frequency of application problems. (2)
- May write policies and procedures to document database application development processes. Policies may be lengthy and are written using clear and concise language to avoid misinterpretation on the part of readers. (3)
- Write database implementation plans to document the requirements, approaches and potential problem areas prior to commencing projects. They enter information under headings such as technical specifications, project objectives, planned activities and deliverables. (4)
- May write reports describing database audit reviews. They include detailed information about the purpose of the audit, research approaches, constraints and findings. (4)
- May write lengthy proposals that include technical specifications, benefits, methodologies and costing. They must clearly and concisely present highly technical information in a manner that laypeople can understand and apply. (4)
- Pay for supplies using cash or credit cards. (1)
- Check calculations on supplier invoices and approve payments. They confirm quantities, prices and amounts, check tax calculations and verify totals before paying invoices. (2)
- May prepare invoices and collect payments for consulting services. They charge for the number of billable hours worked or for milestones reached, and calculate goods and services tax amounts. (2)
- Schedule work and determine the amount of time it will take to complete projects. They organize task lists, plan around vacations and holidays and balance workloads to determine the time it will take to complete projects. (3)
- Take precise measurements using specialized equipment and techniques. For example, a manufacturing engineer may use micrometers or plastic precision clearance gauges to check the fit of parts or take a series of water meter readings to measure water consumption for various operations within a manufacturing facility. (3)
- Take measurements from construction drawings to confirm the dimensions and locations of structural elements, equipment and electrical, water, heating, ventilation, air conditioning and other systems. They often need to ensure that new pieces of equipment can be accommodated in proposed plant redesigns. (3)
- May use trigonometry and geometry to determine height or depth. For example, an industrial and manufacturing engineer uses trigonometry to calculate the slope, angle and distance required for material handling conveyor systems. (5)
- Compare application load times to norms to determine if computers and operating systems are running efficiently. (1)
- Estimate the number of users who will access applications using an analysis of items such as number of points of access and size of user populations. (2)
- Estimate the amount of time it will take to transfer data from legacy systems to new applications. They consider the type and amount of data and the attributes of both the old and new systems. (2)
- May estimate the resources needed to install new database platforms such as Linux. They consider the costs associated with similar projects, expected installation times, the availability of skilled labour and other variables. (3)
- Discuss task lists, schedules and work loads with co-workers and colleagues. (2)
- Meet clients to discuss topics such as project activities, technical specifications, current business practices, growth plans, regulatory and reporting requirements and security risks. They use clear and succinct language to reduce the chance of misunderstandings. (3)
- May negotiate project fee schedules, timelines and deliverables. They outline their preferred terms and conditions and negotiate concessions as required. (3)
- May meet clients to secure new contracts. They discuss their skill sets, project experiences and the benefits that clients will realize. (3)
- May make presentations to clients. For example, they may present the results of data security audits by providing background information, research findings and the resulting recommendations using language appropriate to the audience's technical backgrounds. (4)
- Encounter clients who lack the technical background needed to understand commonly-used acronyms and information technology jargon. They determine the extent of clients' technical understanding and use more appropriate language. (2)
- Determine that projects will not finish on time due to delays caused by work stoppages, late arriving shipments and technical glitches. They work with suppliers, clients and co-workers to resolve the delays and then establish new timelines. (3)
- Have clients who change specifications after projects have started. They determine the extent of the changes and renegotiate timelines and budgets. (3)
- Discover that database applications are not capable of meeting all the technical specifications requested by clients. They consult with clients to discuss the limitations and determine options such as which of the lower priority functions could be abandoned. (3)
- Decide what labels to assign to fields and tables. (1)
- Choose tests to assess the performance of new software applications and platforms such as Oracle 9i, IBM DB2, Microsoft SQL Server and Sybase Adaptive Server Enterprise. For example, they may use manual or automated tests to ensure that relational databases are performing as expected. (2)
- Decide which applications and database platforms will best meet client needs. They factor in the number of users expected, budgets, scalability requirements and the need for web-based technologies such as Java, HTTP, Web Services and XML. (2)
- May decide to bid on projects. They consider the deliverables, timelines, fee schedules and levels of expertise required. (2)
- Decide how to migrate data from legacy systems to database applications such as DB2 and Sybase by considering data structures, storage requirements and the functionality of new software programs. (3)
- Decide the priority levels of concurrent projects. They consider how delays will affect each project and how they can use available resources to satisfy at least some of their clients. (3)
- Evaluate the acceptability of software performance. They compare the results of manual and automated tests to technical specifications published by suppliers. They verify specifications such as throughput rates, load times, functionality and connectivity. (2)
- Evaluate the ability of legacy databases to meet increased data processing and information sharing demands. They consider system architectures, data processing speeds, defect escalation reports and reporting capabilities. (3)
- May evaluate the adequacy of existing database security measures. They review the security risks presented by current business practices and the protection offered by existing security measures such as the use of passwords, firewalls and virus filters. (3)
- Assess the suitability of database platforms and software applications such as enterprise reporting tools and online transaction processing systems. They consider client needs and resources, and the costs, technical supports and specifications provided by suppliers. (4)
Information systems analysts and consultants organize their daily activities to meet project deadlines. They generally work on multi-disciplinary teams and may be involved on one or more projects simultaneously. Juggling projects is a necessary part of the work and they frequently have to decide which projects to work on next. They must be prepared to shift priorities if important project delivery deadlines are threatened. (3)Significant Use of Memory
- Remember registration dates, passwords and logon codes.
- Remember the functionality of software programs.
- Recall which applications and database platforms work best in on-line environments.
- Recall documentation processes used with previous projects.
- Locate technical specifications, timelines and budgets by referring to proposals, reports and business plans. (1)
- Seek information about system and software malfunctions from co-workers, colleagues and suppliers. (2)
- Consult technical manuals to locate specific information such as program codes and executable commands. (3)
- Use communications software. For example they use e-mail programs like Outlook and Communicator to send and receive e-mail, and attachments such as spreadsheets, reports and diagrams. (2)
- Use the Internet. For example, they use the Internet to access vendor and client websites, contact members of access listservs, forums and remotely access databases. (2)
- Use word processing. For example, they use advanced features such as pagination, footnotes and track changes to create and edit reports and proposals. (3)
- Use graphics software. For example, they use advanced features in diagramming programs such as Visio to create schematics that outline how data flows between applications. (3)
- Use spreadsheets. For example, they use spreadsheets such as Excel and Quatro Pro to test data integrity and to create budgets that incorporate formulas and macros. (3)
- Use other computer and software applications. For example, they use advanced features in project management applications such as Project to organize task lists, schedule activities, balance workloads and create Gantt charts. (3)
- Use databases. They conceptualize, design and create data management systems such as database-centric Internet applications, enterprise reporting tools, ad-hoc query and analysis tools, online transaction processing systems and programs which manage the full life-cycle of data and metadata. (5)
Working with Others
Information systems analysts and consultants generally work independently but they may also work on teams with project leaders, software developers and subject matter experts. These teams are generally formed for specific projects and disband once the work is completed. Information systems analysts and consultants may work on a number of teams simultaneously. Self-employed information systems analysts and consultants may work alone. (3)Continuous Learning
Information systems analysts and consultants must engage in continuous learning because information technologies are changing very rapidly. They are responsible for setting their own learning goals and objectives. Employers encourage continuous learning, but generally do not make it mandatory. They keep abreast of changes by reading industry magazines, listservs, brochures, journals, attending conferences and workshops, and taking courses such as graphics and database programming. Software developers, technical institutes, and universities offer training with costs covered by vendors or employers. They also learn from co-workers and other members of project teams. (3)
Information for Newcomers
Fact Sheet for Internationally Trained Individuals
Are you an internationally trained individual looking for guidance on foreign credential recognition in your profession in Canada? This occupational fact sheet can help you by providing information on:
- the general requirements to work in your profession
- the steps that you can take to find the most reliable sources of information
Provincial credential assessment services assess academic credentials for a fee. Contact a regulatory body or other organization to determine if you need an assessment before spending money on one that is not required or recognized.
The assessment will tell you how your education compares with educational standards in the province or territory where you are planning to settle can help you in your job search.
- British Columbia - International Credential Evaluation Service (ICES)
- Alberta - International Qualifications Assessment Service (IQAS)
- Saskatchewan - International Qualifications Assessment Service The Government of Saskatchewan provides this service through an interprovincial agreement with the Government of Alberta.
- Manitoba - Academic Credentials Assessment Service – Manitoba (ACAS)
- Québec - Service des évaluations comparatives d’études (SECE)
- Northwest Territories - International Qualifications Assessment Service (IQAS). The Government of the Northwest Territories provides this service through an interprovincial agreement with the Government of Alberta.
- Date Modified: