Digital & Technology Solutions Professional

A Digital & Technology Solutions Professional provides technology enabled solutions to internal and/or external customers, in a range of areas including software, business and systems analysis, cyber security, data analysis and network infrastructure. They implement technology solutions that enable businesses to develop new products and services and to increase an organisations productivity using digital technologies. They are confident, competent and capable independent Technology Solutions Professionals able to operate in a range of related roles. The occupation is based upon a core set of outcomes that will be supplemented by one, and only one, of six specialism areas detailed below that cover the roles identified by employers. 


  • Information Systems: is able to critically analyse a business domain in order to identify the role of information systems, highlight issues and identify opportunities for improvement through evaluating information systems in relation to their intended purpose and effectiveness.  
  • Systems Development: analyses business and technical requirements to select and specify appropriate technology solutions. Designs, implements, tests, and debugs software to meet requirements using contemporary methods including agile development. Manages the development and assurance of software artefacts applying secure development practises to ensure system resilience. Configures and deploys solutions to end users.  
  • Data: identifies organisational information requirements and can model data solutions using conceptual data modelling techniques. Is able to implement a database solution using an industry standard database management system (DBMS). Can perform database administration tasks and is cognisant of the key concepts of data quality and data security. Is able to manage data effectively and undertake data analysis.  
  • Cyber Security: can undertake a security risk assessment for a simple IT system and propose resolution advice. Can identify, analyse and evaluate security threats and hazards to planned and installed information systems or services (e.g. Cloud services).  
  • Business Organisation: can apply organisational theory, change management, marketing, strategic practice, human resource management and IT service management to technology solutions development. Develops well-reasoned investment proposals and provides business insights.  
  • IT Project Management: follows a systematic methodology for initiating, planning, executing, controlling, and closing technology solutions projects. Applies industry standard processes, methods, techniques and tools to execute projects. Is able to manage a project (typically less than six months, no inter-dependency with other projects and no strategic impact) including identifying and resolving deviations and the management of problems and escalation processes.  
  • Computer and Network Infrastructure: can plan, design and manage computer networks with an overall focus on the services and capabilities that network infrastructure solutions enable in an organisational context. Identifies network security risks and their resolution.

Specialism Outcomes:

Each of the specialisms is set out below. All apprentices will require the core skills and knowledge to be combined with the specialist skills and knowledge to be able to operate effectively in the defined role. The employer will select one, and only one, of the specialisms for the apprentice which is specific to the role the apprentice will be performing. 

Software Engineer Skills:

  • Create effective and secure software solutions using contemporary software development languages to deliver the full range of functional and non-functional requirements using relevant development methodologies.
  • Undertake analysis and design to create artefacts, such as use cases to produce robust software designs.
  • Produce high quality code with sound syntax in at least one language following best practices and standards.
  • Perform code reviews, debugging and refactoring to improve code quality and efficiency.
  • Test code to ensure that the functional and non-functional requirements have been met.
  • Deliver software solutions using industry standard build processes, and tools for configuration management, version control and software build, release and deployment into enterprise environments.

IT Consultant Skills:

  • Perform technical process improvement tasks in a range of environments to solve business problems.  
  • Present optimised solutions to improve business process and workflows through improved technology.  
  • Recommend options based upon risks, costs vs benefits, and impact on other business processes.  
  • Participate in walk-throughs for IT, to identify and document key risks within a client’s organisation.  
  • Support training of end-users in preparation for system activation.  
  • Evaluate the success of a new system, process, initiative, etc.

Business Analyst Skills

  • Develop and apply modelling and analysis techniques to describe business problem scenarios and to help select solutions using a range of industry standard analysis techniques.
  • Elicit and prioritise business requirements for a digital technology system using ‘industry best practice’ methods.
  • Develop a clear, complete, unambiguous and testable requirements specification, including functional, nonfunctional, data, user interface and security requirements.
  • Model the ‘as is’ and future state for a business process using industry standard approaches and notation.
  • Evaluate selected models against business objectives and system requirements.
  • Use ‘industry’ standard tools to facilitate the analysis, documentation and traceability of requirements 

Cyber Security Analyst Skills

  • Analyse and evaluate security threats and vulnerabilities to planned and installed information systems or services and identify how these can be mitigated against.
  • Perform security risk assessments for a range of information systems and propose solutions.
  • Develop a security case against recognised security threats, and recommend mitigation, security controls and appropriate processes.
  • Define and justify a user access policy for an information system given knowledge of the system architecture, security requirements and threat/risk environment. This should be in terms of what they can do, resources they can access, and operations they are allowed to perform.
  • Perform a business impact analysis in response to a security incident and follow a disaster recovery plan to meet elements of a given business continuity policy.
  • Conduct a range of cyber security audit activities to demonstrate security control effectiveness

Data Analyst Skills

  • Import, cleanse, transform, and validate data with the purpose of understanding or making conclusions from the data for business decision making purposes.
  • Present data visualisation using charts, graphs, tables, and more sophisticated visualisation tools.
  • Perform routine statistical analyses and ad-hoc queries.
  • Use a range of analytical techniques such as data mining, time series forecasting and modelling techniques to identify and predict trends and patterns in data.
  • Report on conclusions gained from analysing data using a range of statistical software tools.
  • Summarise and present results to a range of stakeholders making recommendations.  

Network Engineer Skills

  • Plan, design, build and test a simple network to a requirement specification that includes hubs, switches, routers and wireless user devices, applying appropriate security products and processes.
  • Identify the key characteristics of a new network service and develop estimates of the expected traffic intensity and traffic load that the network must support.
  • Determine the minimum network capacity of planned networks to meet network requirements.
  • Design, build, test, configure and optimise a distributed network (more than 1 subnet), including switches, routers and firewalls to meet given requirements.
  • Analyse network performance and troubleshoot typical problems in networks.
  • Identify and evaluate network security risks and incorporate appropriate security products and processes into network designs to increase security, resilience and dependability


  • How business exploits technology solutions for competitive advantage.  
  • The value of technology investments and how to formulate a business case for a new technology solution, including estimation of both costs and benefits.  
  • Contemporary techniques for design, developing, testing, correcting, deploying and documenting software systems from specifications, using agreed standards and tools.  
  • How teams work effectively to produce technology solutions.  
  • The role of data management systems in managing organisational data and information.  
  • Common vulnerabilities in computer networks including unsecure coding and unprotected networks.  
  • The various roles, functions and activities related to technology solutions within an organisation.  
  • How strategic decisions are made concerning acquiring technology solutions resources and capabilities including the ability to evaluate the different sourcing options.  
  • How to deliver a technology solutions project accurately consistent with business needs.  
  • The issues of quality, cost and time for projects, including contractual obligations and resource constraints

Software Engineer Knowledge

  • How to operate at all stages of the software development lifecycle.
  • How teams work effectively to develop software solutions embracing agile and other development approaches.
  • How to apply software analysis and design approaches.
  • How to interpret and implement a design, compliant with functional, non-functional and security requirements.
  • How to perform functional and unit testing.
  • How to use and apply the range of software tools used in Software engineering.

IT Consultant Knowledge

  • How consulting ties into project management, business analysis and business management.
  • The barriers to solving problems or maximizing opportunities.
  • How to present recommendations and influence action.
  • The different structured process approaches for digital technology consulting.
  • How to frame/define business problems objectively before solving them.
  • How to discover hidden requirements using probing techniques to establish trust, using open and closed questions effectively, and avoiding leading questions. 

Business Analyst Knowledge

  • The use of requirements elicitation techniques and their relevance to given situations.
  • The principles of requirements engineering and the importance of managing requirements.
  • How to conduct a range of business/organisational analyses.
  • The use of tools to support modelling and requirements engineering.
  • How the selected models inter-relate with each other.
  • How the products of analysis feed into the design and development of a system. 

Cyber Security Analyst Knowledge

  • The types of security (confidentiality, authentication; non-repudiation; service integrity) and security big picture (network security; host OS security; physical security).
  • The main types of common attack techniques, including phishing, social engineering, malware, network interception, blended techniques, denial of service and theft.
  • How to recognise and assess risk including performing a risk assessment.
  • How to apply penetration testing effectively and how it contributes to assurance.
  • The different approaches to risk treatment and management in practice.
  • What the ‘cyber security culture’ in an organisation is, and how it may contribute to security risk.

Data Analyst Knowledge

  • The quality issues that can arise with data and how to avoid and/or resolve these.
  • The processes involved in carrying out data analysis projects.
  • How to use and apply industry standard tools and methods for data analysis.
  • The range of data protection and legal issues.
  • The fundamentals of data structures, database system design, implementation and maintenance.
  • The organisation's data architecture.

Network Engineer Knowledge

  • The fundamental building blocks (e.g. routers, switches, hubs, storage, transmission) and typical architectures (e.g. server/client, hub/spoke) of computers, networks and the Internet.
  • The main features of routing and Internet network protocols in use, their purpose and relationship to each other, including the physical and data link layer (e.g. https, HTTP, SMTP, SNMP, TCP, IP, etc.).
  • The main factors that affect network performance (e.g. the relationship between bandwidth, number of users, nature of traffic, contention).
  • Failure modes in protocols (e.g. why a protocol may ‘hang’ and the effect of data communication errors).
  • The ways to improve performance (e.g. application of traffic shaping, changes to architecture to avoid bottlenecks, network policy that prohibit streaming protocols).
  • The issues that may arise in the day to day operation of networks and how to resolve them.


Professional, interpersonal and business skills:

  • Fluent in written communications and able to articulate complex issues.  
  • Makes concise, engaging and well-structured verbal presentations, arguments and explanations.  
  • Able to deal with different, competing interests within and outside the organisation with excellent negotiation skills.  
  • Is able to identify the preferences, motivations, strengths and limitations of other people and apply these insights to work more effectively with and to motivate others.
  • Competent in active listening and in leading, influencing and persuading others.  
  • Able to give and receive feedback constructively and incorporate it into his/her own development and life-long learning.  
  • Applies analytical and critical thinking skills to Technology Solutions development and to systematically analyse and apply structured problem solving techniques to complex systems and situations.  
  • Able to put forward, demonstrate value and gain commitment to a moderately complex technology-oriented solution, demonstrating understanding of business need, using open questions and summarising skills and basic negotiating skills.  
  • Able to conduct effective research, using literature and other media, into IT and business related topics.

Attributes and behaviours

  • Have demonstrated that they have mastered basic business disciplines, ethics and courtesies, demonstrating timeliness and focus when faced with distractions and the ability to complete tasks to a deadline with high quality.  
  • Flexible attitude.  
  • Ability to perform under pressure.  
  • A thorough approach to work.  
  • Logical thinking and creative approach to problem solving.

Entry Requirements

Individual employers will set the selection criteria, but this is likely to include three ‘A’ levels, including maths, although some employers will accept other relevant qualifications or experience.?


Typically 36 months

Professional Qualifications / Recognition

Level 6.

BSc (Hons) in Digital & Technology Solutions  


Originally published on, this information has been re-used under the terms of the Open Government Licence.


Recruiting school leavers? We can help