• .

Applications are invited from suitably qualified and experienced persons for the following posts:




  • Degree in IT/Computer Science/Accounting/Auditing;
  • Possess or studying towards CISA, CISM or any other related professional IT audit qualification is a must;
  • Member of ISACA or any other relevant professional body;
  • Financial and IT application experience;
  • Knowledge of firewalls, VPN, Data Loss Prevention and Security Audits;
  • Clear understanding of IT audit methodologies;
  • Awareness of cyber security trends and hacking techniques;
  • At least 3 years work experience in IT or audit related environment.


  • Proven teamwork and problem-solving abilities;
  • Strong ability to work on multiple tasks or assignments;
  • Possess excellent communication skills;
  • Possess strong organizational skills;
  • Possess a high level of professionalism, integrity, and truthfulness in all dealings;
  • Possession of sound independent judgment;
  • Possess strong knowledge of auditing standards, procedures, laws, rules, and regulations;
  • Possess advanced skills in computer applications like Microsoft Word; Excel, PowerPoint, and other accounting software;
  • Strong ability to work with people of diverse backgrounds;



  • Leads the execution of audit assignments that are specialist in nature and provides an independent opinion on the risk and control environment;
  • Profiles clear audit findings for review and drafts the Audit Report relating to work conducted and in accordance with GIA reporting standards;
  • Evaluates information general computing controls and provides value added feedback. Performs various other reviews of IT management policies and procedures to ensure that controls surrounding these processes are adequate;
  • Develops, builds and implements tools (e.g., ACL, SQL and Excel queries) to analyse data to improve audit efficiency and effectiveness, (including for risk assessments);
  • Performs data analysis on complex data sets to provide meaningful information and insight to internal and external management;
  • Interprets data, analyses results using statistical techniques and provides ongoing reports;
  • Develops and implements databases, data collection systems, data analytics and other strategies that optimize statistical efficiency and quality of audits;
  • Conducts IT audits and reviews of systems, applications and IT processes.
  • Performs pre- and post-implementation reviews of system implementations or enhancements;
  • Conducts IT security audits (e.g., network, operating system and data centre), including evaluating if security vulnerabilities are properly identified and mitigated;
  • Filters and “cleans” data by reviewing computer reports, printouts, and performance indicators to locate and correct code problems;

*NB:   Midlands State University is an equal opportunities employer.  In the interest of promoting gender parity, female candidates are encouraged to apply.


Applicants must submit copies of applications with the following: application letter, certified certificates, and curriculum vitae giving full details of names, place, and date of birth, experience, present salary, date of availability, contact telephone number (s), and names and email addresses of three referees to:

The Deputy Registrar (Human Resource)

Midlands State University


Application documents must be in a single-scan pdf format. The closing date for applications is 17 March 2023. Please note that only shortlisted candidates will be communicated to.

To apply for this job email your details to vacancies@staff.msu.ac.zw