Potential occupational standard
Occupational standard in development
Approved occupational standard
Occupational standard without apprenticeship
Custom occupational card
Apprenticeship
Higher Technical Qualification
T Level
Technical Qualification
Career starter apprenticeship
Royal apprenticeship
Occupational progression
Technical education progression
Mid green occupation
Dark green occupation
Favourite occupation
home Digital
Digital and technology solutions professional - cyber security professional

Digital and technology solutions professional - cyber security professional

Digital

Level 6 - Professional Occupation

Maintaining digital and technology strategies through technology leadership.

Reference: OCC0119F

Status: assignment_turned_inApproved occupation

Average (median) salary: £45,508 per year

SOC 2020 code: 2134 Programmers and software development professionals

SOC 2020 sub unit groups:

  • 2134/03 Software developers
  • 2131/00 IT project managers
  • 2132/08 Technical support managers
  • 2133/05 IT business analysts
  • 2135/01 Cyber operational defence specialists
  • 2136/00 IT quality and testing professionals
  • 2137/00 IT network professionals
  • 2139/02 IT consultants

Technical Education Products

Employers involved in creating the standard:

Accenture, BT, Capgemini, CGI, Ford, Fujitsu, GSK, HMRC, HP, IBM, John Lewis, Lloyds Banking Group, Network Rail, Tata Consulting Services AstraZeneca, Barclays, Bentley, Thales, MC2.

Summary

This occupation is found in organisations where digital technologies can be used to solve problems that exist across a range of functions. Whether looking for ways to reduce waste, increase productivity, ensure resilient and responsive customer service, or create a secure transactional environment, organisations turn to digital and technological solutions to achieve these aims. Wherever these activities take place Digital and Technology Solutions Professionals (DTSPs) are influencing outcomes and making things happen.

DTSPs are found in small, medium and large organisations across all industries such as banking and finance, digital and technology, communications, construction, education, utilities, engineering, law, manufacturing, health, government and public services pharmaceutical, retail and transport.

The broad purpose of the occupation is to evaluate, initiate, create and support business solutions using digital technology. DTSPs use data to evaluate the commercial and security risks and benefits of potential digital and technology solutions before making recommendations for strategies that may have far reaching consequences.

DTSPs are influencers in their organisations with a clear focus on delivering business improvements through digital and technological solutions. They have a passion for digital technology; keeping in touch with emerging trends and developments .

DTSPs have a broad set of skills and knowledge across the main areas of the digital and technology landscape. This enables them to understand the complexity of information systems, systems development, data, cyber security, business organisation, IT project management and computer and network infrastructures . They view all of this with a rigorous approach to commerciality and budget to deliver quality solutions.

In addition to this broad set of skills and knowledge they specialise in one of the following areas:

  • Option 1: Software Engineer
  • Option 2: IT Consultant
  • Option 3: Business Analyst
  • Option 4: Cyber Security Analyst
  • Option 5: Data Analyst
  • Option 6: Network Engineer

For example:

  • In a manufacturing company DTSP Software Engineers could be developing solutions to support the construction of physical products.
  • In a utility company DTSP IT Consultants could be on a remote site to implement a solution for improving energy usage or reducing outages through the application of new technologies.
  • In an engineering company DTSP Business Analysts could be reviewing a change to an engineering process to determine the impact on other processes within the organisation.
  • in a technology company DTSP Cyber Security Analysts could be working with clients to address security management issues in the clients’ processes.
  • In a pharmaceutical company DTSP Data Analysts could be working with large amounts of information to interpret the results of a field trial of a new medicine.

In a communications company DTSP Network Engineers could be involved in developing additions to an existing national network.

In their daily work DTSPs are excellent communicators and may interact with internal and external customers, team members and senior leaders. They can work independently and within multi-disciplinary teams . They may interact with decision-makers, strategists, and policymakers, often in senior roles in private or public sector organisations as well as with individuals and groups (internal and external) with a stake in the defined system, currently or in the future.

An employee in this occupation is likely to have some responsibility for budgets and/or resources, teams, and projects. In some organisations they may hold leadership positions. Work may typically be conducted in a desk-based environment, but that desk may be in an office or on a site depending on the solution being worked upon.

For example. a DTSP Software Engineer could be working on a client’s site during the development and implementation of a new client system.

An employee in this occupation will be responsible for working with little or no supervision and may be accountable for the supervision of others if the position requires it.

DTSPs are at the heart of problem solving, bringing an innovative, multi-disciplined approach to bear where there are unpredictable and variable influencing factors. They may have a remit to commission work from others and hold them accountable for outputs of a technical nature. Their professional position within a business means they fulfil a leadership role within their technical specialism demonstrating a strong ethical awareness of technological trends.

A description of each specialism follows:

Option 1) Software Engineer
The primary role of the Software Engineer is to undertake all requirements during the solution development life-cycle from gathering requirements to analysis, design, code, build, test, implementation and support. They may also be required to supervise the work of junior software developers and others who may be working on elements of the solution and work with product managers and UX designers in implementing solutions. They will apply software engineering principles to all stages of the solution life-cycle, from gathering requirements, undertaking analysis and design, development of code and data requirements whilst also ensuring security feature are addressed. As well as creating new code, they can support existing code by troubleshooting, reverse engineering and conducting root cause analysis. They typically work as part of a large collaborative team and will have responsibility for significant elements of software solutions.

Option 2) IT Consultant
An IT consultant bridges the gap between users and technology: they reinvent the digital world of the future. They require a broad set of skills in business analysis , solutions development, network infrastructure, data, cyber security etc. They use their consulting skills to get to the root of a problem and advise clients, both externally and internally, on how to best utilise technology to meet their business objectives, overcome problems and increase productivity. They provide strategic guidance and training to clients, both externally and internally, about digital and technology solutions. They facilitate changing business processes, improved structure, and efficiency through enhancements to digital and technology solutions . They design, build and install innovative customer experiences using the latest technologies to win business for their organisation.


Option 3) Business Analyst
A business analyst is an interpreter between two worlds: business and IT, bridging the gap of understanding between business and technology teams. They analyse and understand business needs and define and manage business requirements . They oversee design and delivery of tested system solutions throughout a project life-cycle to ensure these meet business requirements . They are key communicators and drivers of collaboration throughout the development life cycle. They are focused on the customer and work closely with the IT delivery team. They are essential in the development of successful digital and technology solutions through their rigorous analysis of business requirements to inform their recommendations and insight.

Option 4) Cyber Security Analyst
A Cyber Security Analyst leads in the work to define, implement and maintain security products and systems within an organisation’s policies and service level agreements . They will need to analyse and understand the points of vulnerability within IT systems and a proactive and agile approach to maintain high levels of systems and organisational security. They will monitor security performance using tools, statistical reporting and analysis, using the output of monitoring to problem solve, propose improvements and implement changes to meet service level requirements. A Cyber Security Analyst leads technical implementation of security infrastructures and technical designs, including producing cost and timescale estimates and identifying risks. After implementation they take ownership for obtaining the information required to diagnose and resolve more complex problems and escalations such as security incidents and business recovery. They engage with third parties to jointly resolve in-depth product issues where necessary and completing cyber risk assessments .

Option 5) Data Analyst
The primary role of a data analyst is to collect, organise and study data to provide new business insight to a range of stakeholders . They are responsible for leading the provision of up-to-date, accurate and relevant data analysis for the organisation. They are typically involved with managing, cleansing, abstracting and aggregating data across the network infrastructure. They look for opportunities to build data driven insights into decision makin g. They have a current understanding of data structures, software development procedures and the range of analytical tools used to undertake a wide range of standard and custom analytical studies , providing data solutions to a range of business issues. They are comfortable supporting teams and colleagues with analytics and report the results of data analysis activities making recommendations to improve business performance .

Option 6) Network Engineer
The primary role of a network engineer is to lead in the planning, design , installation, maintenance and support of communication networks within an organisation or between organisations. They take a proactive and agile approach to maintain high levels of network performance and availability for their users, such as staff, clients, customers and suppliers. They understand network configuration, cloud, network administration and monitoring tools , and give technical advice and guidance to their users . As part of their role they analyse system requirements to ensure the network and its services operate to desired levels with security at the heart of everything they do . They understand data traffic and transmission across the network and have a major role to play in ensuring network security and resilience . They are the key problem solver when networks fail and respond with resilience under pressure.

Employers involved in creating the standard:

Accenture, BT, Capgemini, CGI, Ford, Fujitsu, GSK, HMRC, HP, IBM, John Lewis, Lloyds Banking Group, Network Rail, Tata Consulting Services AstraZeneca, Barclays, Bentley, Thales, MC2.

Typical job titles include:

Business Analyst
Computing Data Analyst
Cyber Security professional
IT Consultant
Network Engineer
Software Engineer

Keywords:

Business Analysis
Code
Computers
Degree
Development
It
Software Analysis
Software Developer
Tech
Technology

Knowledge, skills and behaviours (KSBs)

K1: How organisations adapt and exploit digital technology solutions to gain a competitive advantage.
K2: The principles of strategic decision making concerning the acquisition or development of digital and technology solutions. For example business architecture approaches such as capability models and target operating models.
K3: Principles of estimating the risks and opportunities of digital and technology solutions.
K4: Techniques and approaches involved in creating a business case for new digital and technology solutions. For example journey, product and capability mapping and value chains.
K5: A range of digital technology solution development techniques and tools.
K6: The approaches and techniques used throughout the digital and technology solution lifecycle and their applicability to an organisation’s standards and pre-existing tools.
K7: The roles, functions and activities within digital technology solutions within an organisation.
K8: How teams work effectively to produce digital and technology solutions.
K9: The concepts and principles of leadership.
K10: Management techniques and theories. For example, effective decision making, delegation and planning methods, time management and change management.
K11: The nature and scope of common vulnerabilities in digital and technology solutions. For example, the risks of unsecure coding and unprotected networks.
K12: The role of data management systems within Digital and Technology Solutions.
K13: Principles of data analysis for digital and technology solutions.
K14: A range of quantitative and qualitative data gathering methods and how to appraise and select the appropriate method.
K15: Principles of estimating cost, and time resource constraints within digital and technology solutions activities.
K16: Fundamental computer networking concepts in relation to digital and technology solutions. For example, structure, cloud architecture, components, quality of service.
K17: Reporting techniques, including how to synthesise information and present concisely, as appropriate to the target audience.
K18: Techniques of robust research and evaluation for the justification of digital and technology solutions.
K19: Relevant legal, ethical, social and professional standards to a digital and technology solution. For example, Diversity, Accessibility, Intellectual Property, Data Protection Acts, Codes of Practice, Regulatory and Compliance frameworks.
K20: Sustainable development approaches as applied to digital and technology solutions such as green computing.
K45: Principles of cyber security tools and techniques.
K46: Principles of quantitative and qualitative risk management theory including the role of risk stakeholders.
K47: Concepts and approaches to cyber security assurance.
K48: Key legislative frameworks and the regulatory landscape for cyber security including Data Protection Act 2018 , Network Information System Directive 2018, Regulation of Investigatory Powers Act 2000, ISO 27001.
K49: Approaches to incident response and management including escalation and investigation of cyber security breaches and their root cause.
K50: Ethical principles and codes of good practice of at least one significant cyber security professional body and the ethical responsibilities of a cyber security professional.
K51: Principles of common security architectures and methodologies.
K52: Approaches to deployment of cyber security technology components in digital systems to provide security functionality. For example hardware and software to implement security controls.

S1: Analyse a business problem to identify the role of digital and technology solutions.
S2: Identify risks, determine mitigation strategies and opportunities for improvement in a digital and technology solutions project.
S3: Analyse a business problem in order to specify an appropriate digital and technology solution.
S4: Initiate, design, code, test and debug a software component for a digital and technology solution.
S5: Apply relevant standard processes, methods, techniques and tools. For example, ISO Standards, Waterfall, Agile in a digital and technology solution project.
S6: Manage digital and technology solutions projects. For example, identifying and resolving deviations from specification, applying appropriate Project Management methodologies.
S7: Work effectively within teams, leading on appropriate digital technology solution activities.
S8: Apply relevant organisational theories. For example, change management principles, marketing approaches, strategic practice, and IT service management to a digital and technology solutions project.
S9: Apply relevant security and resilience techniques to a digital and technology solution. For example, risk assessments, mitigation strategies.
S10: Initiate, design, implement and debug a data product for a digital and technology solution.
S11: Determine and use appropriate data analysis techniques. For example, Text, Statistical, Diagnostic or Predictive Analysis to assess a digital and technology solutions.
S12: Plan, design and manage simple computer networks with an overall focus on the services and capabilities that network infrastructure solutions enable in an organisational context.
S13: Report effectively to colleagues and stakeholders using the appropriate language and style, to meet the needs of the audience concerned.
S14: Research, investigate, and evaluate innovative technologies or approaches in the development of a digital and technology solution.
S15: Apply relevant legal, ethical, social and professional standards to a digital and technology solution.
S40: Discover, identify and analyse security threats, attack techniques and vulnerabilities and recommend mitigation and security controls.
S41: Undertake security risk assessments for complex systems without direct supervision and propose a remediation strategy relevant to the context of the organisation.
S42: Recommend improvements to the cyber security approaches of an organisation based on research into future potential cyber threats and considering threat trends.
S43: Manage cyber security risk.
S44: Use appropriate cyber security technology, tools and techniques in relation to the risks identified.
S45: Lead cyber security awareness campaigns and evaluate their effectiveness.
S46: Analyse cyber security requirements against other design requirements for systems or products, identify conflicting requirements and recommend appropriate solutions with clear explanation of costs and benefits.
S47: Lead the design and build of systems in accordance with a security case to address organisational challenges.

B1: Has a strong work ethic and commitment in order to meet the standards required.
B2: Reliable, objective and capable of both independent and team working.
B3: Acts with integrity with respect to ethical, legal and regulatory requirements ensuring the protection of personal data, safety and security.
B4: Commits to continuous professional development; maintaining their knowledge and skills in relation to developments in digital and technology solutions that influence their work.
B5: Interacts professionally with people from technical and non-technical backgrounds. Presents data and conclusions in an evidently truthful, concise and appropriate manner.
B6: Participates in and shares best practice in their organisation, and the wider community for aspects relevant to digital and technology solutions.
B7: Maintains awareness of trends and innovations in the subject area, utilising a range of academic literature, online sources, community interaction, conference attendance and other methods which can deliver business value.
B8: Champions diversity and inclusion in their work ensuring that digital technology solutions are accessible.

Duties

Duty D1

Critically analyse a business domain to identify opportunities for improvement

Duty D2

Analyse business and technical requirements to select and specify appropriate technology solutions.

Duty D3

Identify organisational information requirements and model data solutions using conceptual data modelling techniques

Duty D4

undertake a security risk assessment for a simple IT system to identify, analyse and evaluate security threats and hazards to planned and installed information systems or services (e.g. Cloud services) and provide recommendations.

Duty D5

apply organisational theory, change management, marketing, strategic practice, human resource management and IT service management to technology solutions development.

Duty D6

follow a systematic methodology for initiating, planning, executing, controlling, and closing technology solutions projects using industry standard processes, methods, techniques and tools to execute and manage projects.

Duty D7

plan, design and manage computer networks with an overall focus on the services and capabilities that network infrastructure solutions enable in an organisational context. Identifies network security risks and their resolution.

Duty D8

communicate effectively with a range of stakeholders both technical and non-technical at all levels of influence and responsibility.

Duty D9

devise and engage in continuous professional development

Duty D10

conduct and present effective research using engaging, well-structured approaches

Duty D11

design, build and test high-quality software solutions.

Duty D12

apply engineering principles to all stages of the software development process, from requirements, analysis and design, development and data requirements

Duty D13

Apply skills and knowledge of systems development, cyber security, data, AI and infrastructure in the creation of digital solutions.

Duty D14

Analyse ethical and legal implications of digital and technology solutions and make recommendations as a result of this analysis. For example, with regard to artificial intelligence or the use of personal data.

Duty D15

Mentor others in the development and implementation of digital and technical solutions.

Duty D41

Analyse and evaluate security threats to technology solutions and implement technical and process solutions to mitigate these threats.

Duty D42

Perform security risk assessments within wider IT development teams, ensuring cyber security is embedded within the deliverables of the team.

Duty D43

Lead a range of cyber security audit activities to demonstrate security control effectiveness.

Duty D44

Apply advanced problem solving techniques to address cyber security issues.

Duty D45

Plan and perform a business impact analysis in response to a security incident and implement a recovery plan.

Duty D46

Demonstrate effective management of cyber security processes and systems within the defined Service Level Agreements (SLAs).

Occupational Progression

This occupational progression map shows technical occupations that have transferable knowledge and skills.

In this map, the focused occupation is highlighted in yellow. The arrows indicate where transferable knowledge and skills exist between two occupations. This map shows some of the strongest progression links between the focused occupation and other occupations.

It is anticipated that individuals would be required to undertake further learning or training to progress to and from occupations. To find out more about an occupation featured in the progression map, including the learning options available, click the occupation.

Progression decisions have been reached by comparing the knowledge and skills statements between occupational standards, combined with individualised learner movement data.

Technical Occupations

Levels 2-3

Higher Technical Occupations

Levels 4-5

Professional Occupations

Levels 6-7

Progression link into focused occupation.
assignment_turned_in

Level 4

This is the focused occupation.
assignment_turned_in

Level 6

Progression link from focused occupation.
assignment_turned_in

Level 7

Progression link from focused occupation.
assignment_turned_in

Level 7

Digital