This apprenticeship has been retired

This is not the latest approved version of this apprenticeship. View the latest version

Overview of the role

Maintaining digital and technology strategies through technology leadership.

Digital and technology solutions professional (integrated degree)

Reference Number: ST0119

Details of standard


Typical job titles:

Software developer, Software engineer, Software tester, Application specialist, Business analyst, IT project manager, IT consultant, Network engineer, Cyber security analyst, Database specialist, Data analyst, Digital media Technology practitioner, Systems designer


Typically 36 months




BSc (Hons) in Digital & Technology Solutions

English & Maths

Apprentices without level 2 English and maths will need to achieve this level prior to taking the End-Point Assessment. For those with an education, health and care plan or a legacy statement, the apprenticeship’s English and maths minimum requirement is Entry Level 3. A British Sign Language (BSL) qualification is an alternative to the English qualification for those whose primary language is BSL

Role Profile

A Digital & Technology Solutions Professional provides technology enabled solutions to internal and/or external customers, in a range of areas including software, business and systems analysis, cyber security, data analysis and network infrastructure. They implement technology solutions that enable businesses to develop new products and services and to increase an organisations productivity using digital technologies. They are confident, competent and capable independent Technology Solutions Professionals able to operate in a range of related roles. The occupation is based upon a core set of outcomes that will be supplemented by one, and only one, of six specialism areas detailed below that cover the roles identified by employers.

Entry Requirements

Individual employers will set the selection criteria, but this is likely to include three ‘A’ levels, including maths, although some employers will accept other relevant qualifications or experience.

Core Skills

  • Information Systems: is able to critically analyse a business domain in order to identify the role of information systems, highlight issues and identify opportunities for improvement through evaluating information systems in relation to their intended purpose and effectiveness.
  • Systems Development: analyses business and technical requirements to select and specify appropriate technology solutions. Designs, implements, tests, and debugs software to meet requirements using contemporary methods including agile development. Manages the development and assurance of software artefacts applying secure development practises to ensure system resilience. Configures and deploys solutions to end users.
  • Data: identifies organisational information requirements and can model data solutions using conceptual data modelling techniques. Is able to implement a database solution using an industry standard database management system (DBMS). Can perform database administration tasks and is cognisant of the key concepts of data quality and data security. Is able to manage data effectively and undertake data analysis.
  • Cyber Security: can undertake a security risk assessment for a simple IT system and propose resolution advice. Can identify, analyse and evaluate security threats and hazards to planned and installed information systems or services (e.g. Cloud services).
  • Business Organisation: can apply organisational theory, change management, marketing, strategic practice, human resource management and IT service management to technology solutions development. Develops well- reasoned investment proposals and provides business insights.
  • IT Project Management: follows a systematic methodology for initiating, planning, executing, controlling, and closing technology solutions projects. Applies industry standard processes, methods, techniques and tools to execute projects. Is able to manage a project (typically less than six months, no inter-dependency with other projects and no strategic impact) including identifying and resolving deviations and the management of problems and escalation processes.
  • Computer and Network Infrastructure: can plan, design and manage computer networks with an overall focus on the services and capabilities that network infrastructure solutions enable in an organisational context. Identifies network security risks and their resolution.

Core Technical Knowledge

Knows and understands:

  • How business exploits technology solutions for competitive advantage.
  • The value of technology investments and how to formulate a business case for a new technology solution, including estimation of both costs and benefits.
  • Contemporary techniques for design, developing, testing, correcting, deploying and documenting software systems from specifications, using agreed standards and tools.
  • How teams work effectively to produce technology solutions.
  • The role of data management systems in managing organisational data and information.
  • Common vulnerabilities in computer networks including unsecure coding and unprotected networks.
  • The various roles, functions and activities related to technology solutions within an organisation.
  • How strategic decisions are made concerning acquiring technology solutions resources and capabilities including the ability to evaluate the different sourcing options.
  • How to deliver a technology solutions project accurately consistent with business needs.
  • The issues of quality, cost and time for projects, including contractual obligations and resource constraints.

Core Behavioural Skills

Professional, interpersonal  and business skills

Attributes and behaviours

  • Fluent in written communications and able to articulate complex issues.
  • Makes concise, engaging and well-structured verbal presentations, arguments and explanations.
  • Able to deal with different, competing interests within and outside the organisation with excellent negotiation skills.
  • Is able to identify the preferences, motivations, strengths and limitations of other people and apply these insights to work more effectively with and to motivate others.
  • Competent in active listening and in leading, influencing and persuading others.
  • Able to give and receive feedback constructively and incorporate it into his/her own development and life-long learning.
  • Applies analytical and critical thinking skills to Technology Solutions development and to systematically analyse and apply structured problem solving techniques to complex systems and situations.
  • Able to put forward, demonstrate value and gain commitment to a moderately complex technology-oriented solution, demonstrating understanding of business need, using open questions and summarising skills and basic negotiating skills.
  • ·Able to conduct effective research, using literature and other media, into IT and business related topics.
  • Have demonstrated that they have mastered basic business disciplines, ethics and courtesies, demonstrating timeliness and focus when faced with distractions and the ability to complete tasks to a deadline with high quality.
  • Flexible attitude.
  • Ability to perform under pressure.
  • A thorough approach to work.
  • Logical thinking and creative approach to problem solving.

Review date

This standard will be reviewed in two years from the date of publication.

Specialism Outcomes

Each of the specialisms is set out below. All apprentices will require the core skills and knowledge to be combined with the specialist skills and knowledge to be able to operate effectively in the defined role. The employer will select one, and only one, of the specialisms for the apprentice which is specific to the role the apprentice will be performing.

Software Engineer

The primary role of a software engineer is to be able to design, build and test high-quality software solutions. The software engineer role is broader and with higher levels of responsibility than a software developer as they need to apply engineering principles to all stages of the software development process, from requirements, analysis and design, development and data requirements whilst ensuring security robustness is built in. They will typically be working as part of a larger collaborative team and will have responsibility for significant elements of software projects.


  • Create effective and secure software solutions using contemporary software development languages to deliver the full range of functional and non-functional requirements using relevant development methodologies.
  • Undertake analysis and design to create artefacts, such as use cases to produce robust software designs.
  • Produce high quality code with sound syntax in at least one language following best practices and standards.
  • Perform code reviews, debugging and refactoring to improve code quality and efficiency.
  • Test code to ensure that the functional and non-functional requirements have been met.
  • Deliver software solutions using industry standard build processes, and tools for configuration management, version control and software build, release and deployment into enterprise environments.

Technical Knowledge

Knows and understands:

  • How to operate at all stages of the software development lifecycle.
  • How teams work effectively to develop software solutions embracing agile and other development approaches.
  • How to apply software analysis and design approaches.
  • How to interpret and implement a design, compliant with functional, non-functional and security requirements.
  • How to perform functional and unit testing.
  • How to use and apply the range of software tools used in Software engineering.

IT consultant 

An IT consultant requires a broad set of skills in business analysis, solutions development, network infrastructure, data, cyber security etc. They use their consulting skills in order to advise clients on how to best utilise technology to meet their business objectives, overcome problems and increase productivity. They provide strategic guidance to clients with regard to technology and facilitate changing business processes through enhancements to technology solutions. They provide technical assistance, and are often responsible for providing training.


Be able to:

  • Perform technical process improvement tasks in a range of environments to solve business problems.
  • Present optimised solutions to improve business process and workflows through improved technology.
  • Recommend options based upon risks, costs vs benefits, and impact on other business processes.
  • Participate in walk-throughs for IT, to identify and document key risks within a client’s organisation.
  • Support training of end-users in preparation for system activation.
  • Evaluate the  success  of  a  new  system,  process, initiative,  etc.

Technical Knowledge

Knows and understands:

  • How consulting ties into project management, business analysis and business management.
  • The barriers to solving problems or maximizing opportunities.
  • How to present recommendations and influence action.
  • The different structured process approaches for digital technology consulting.
  • How to frame/define business problems objectively before solving them.
  • How to discover hidden requirements  using  probing techniques  to establish trust, using open and closed questions effectively, and avoiding leading questions.

Business analyst

A business analyst is responsible for assessing the business impact of change, capturing, analysing and documenting requirements and supporting the communication and delivery of requirements with relevant stakeholders. They create detailed analysis of systems and make recommendations for improvement. They produce specifications of user requirements that enable software engineers to develop the right software solutions. They require a broad foundation of skills and knowledge to be able to be effective as their work incorporates all aspects of digital technology systems.


Be able to:

  • Develop and apply modelling and analysis techniques to describe business problem scenarios and to help select solutions using a range of industry standard analysis techniques.
  • Elicit and prioritise business requirements for a digital technology system using ‘industry best practice’ methods.
  • Develop a clear, complete, unambiguous and testable requirements specification, including functional, non- functional, data, user interface and security requirements.
  • Model the ‘as is’ and future state for a business process using industry standard approaches and notation.
  • Evaluate selected models against business objectives and system requirements.
  • Use ‘industry’ standard tools to facilitate the analysis, documentation and traceability of requirements

Technical Knowledge

Knows and understands:

  • The use of requirements elicitation techniques and their relevance to given situations.
  • The principles of requirements engineering and the importance of managing requirements.
  • How to conduct a range of business/organisational analyses.
  • The use of tools to support modelling and requirements engineering.
  • How the selected models inter-relate with each other.
  • How the products of analysis feed into the design and development of a system.

Cyber Security Specialist

A cyber security analyst is responsible for the implementation, maintenance and support of the security controls that protect an organisation’s systems and data assets from threats and hazards. They ensure that security technologies and practices are operating in accordance with the organisation’s policies and standards to provide continued protection. They require a broad understanding of network infrastructure, software and data to identify where threat and hazard can occur. They are responsible for performing periodic vulnerability assessments to evaluate the organisation’s ongoing security posture and will provide visibility to management of the main risks and control status on an ongoing basis. They respond to security incidents and implement resolution activities across the organisation.


Be able to:

  • Analyse and evaluate security threats and vulnerabilities to planned and installed information systems or services and identify how these can be mitigated against.
  • Perform security risk assessments for a range of information systems and propose solutions.
  • Develop a security case against recognised security threats, and recommend mitigation, security controls and appropriate processes.
  • Define and justify a user access policy for an information system given knowledge of the system architecture, security requirements and threat/risk environment. This should be in terms of what they can do, resources they can access, and operations they are allowed to perform.
  • Perform a business impact analysis in response to a security incident and follow a disaster recovery plan to meet elements of a given business continuity policy.
  • Conduct a range of cyber security audit activities to demonstrate security control effectiveness

Technical Knowledge

Knows and understands:

  • The types of security (confidentiality, authentication; non-repudiation; service integrity) and security big picture (network security; host OS security; physical security).
  • The main types of common attack techniques, including phishing, social engineering, malware, network interception, blended techniques, denial of service and theft.
  • How to recognise and assess risk including performing a risk assessment.
  • How to apply penetration testing effectively and how it contributes to assurance.
  • The different approaches to risk treatment and management in practice.
  • What the ‘cyber security culture’ in an organisation is, and how it may contribute to security risk.

Data analyst

The primary role of a data analyst is to collect, organise and study data to provide new business insight. They are responsible for providing up-to-date, accurate and relevant data analysis for the organisation. They are typically involved with managing, cleansing, abstracting and aggregating data across the network infrastructure. They have a good understanding of data structures, software development procedures and the range of analytical tools used to undertake a wide range of standard and custom analytical studies, providing data solutions to a range of business issues. They document and report the results of data analysis activities making recommendations to improve business performance. They need a broad grounding in technology solutions to be effective in their role.


Be able to:

  • Import, cleanse, transform, and validate data with the purpose of understanding or making conclusions from the data for business decision making purposes.
  • Present data visualisation using charts, graphs, tables, and more sophisticated visualisation tools.
  • Perform routine statistical analyses and ad-hoc queries.
  • Use a range of analytical techniques such as data mining, time series forecasting and modelling techniques to identify and predict trends and patterns in data.
  • Report on conclusions gained from analysing data using a range of statistical software tools.
  • Summarise and present results to a range of stakeholders making recommendations.

Technical Knowledge

Knows and understands:

  • The quality issues that can arise with data and how to avoid and/or resolve these.
  • The processes involved in carrying out data analysis projects.
  • How to use and apply industry standard tools and methods for data analysis.
  • The range of data protection and legal issues.
  • The fundamentals of data structures, database system design, implementation and maintenance.
  • The organisation's data architecture.

Network Engineer

The primary role of a network engineer is to design, install, maintain and support communication networks within an organisation or between organisations. They need to maintain high levels of network performance performance and availability for their users, such as staff, clients, customers and suppliers. They will understand network configuration, cloud, network administration and monitoring tools, and be able to give technical advice and guidance. As part of their role they need to be proficient in technology solutions as they will analyse system requirements to ensure the network and its services operate to desired levels. They will need to understand the data traffic and transmission across the network and they have a major role to play in ensuring network security.


Be able to:

  • Plan, design, build and test a simple network to a requirement specification that includes hubs, switches, routers and wireless user devices, applying appropriate security products and processes.
  • Identify the key characteristics of a new network service and develop estimates of the expected traffic intensity and traffic load that the network must support.
  • Determine the minimum network capacity of planned networks to meet network requirements.
  • Design, build, test, configure and optimise a distributed network (more than 1 sub- net), including switches, routers and firewalls to meet given requirements.
  • Analyse network performance and troubleshoot typical problems in networks.
  • Identify and evaluate network security risks and incorporate appropriate security products and processes into network designs to increase security, resilience and dependability.

Technical Knowledge

Knows and understands:

  • The  fundamental    building   blocks   (e.g.   routers, switches, hubs, storage, transmission) and typical architectures (e.g. server/client, hub/spoke) of computers, networks and the Internet.
  • The main  features  of  routing  and  Internet  network protocols in use, their purpose and relationship to each other, including the physical and data link layer  (e.g. https, HTTP, SMTP, SNMP, TCP, IP, etc.).
  • The main factors that affect network performance (e.g. the relationship between bandwidth, number of users, nature of traffic, contention).
  • Failure modes in protocols (e.g. why a protocol may ‘hang’ and the effect of data communication errors).
  • The ways to improve performance (e.g. application of traffic shaping, changes to architecture to avoid bottlenecks, network policy that prohibit streaming protocols).
  • The issues that may arise in the day to day operation of networks and how to resolve them.

Crown copyright © 2024. You may re-use this information (not including logos) free of charge in any format or medium, under the terms of the Open Government Licence. Visit

Status: Retired
Level: 6
Degree: integrated degree
Reference: ST0119
Version: 1.1
Date updated: 01/09/2023
Approved for delivery: 26 March 2015
Route: Digital
Typical duration to gateway : 36 months (this does not include EPA period)
Maximum funding: £25000
Options: Software Engineer, IT Consultant, Business Analyst, Cyber Security Specialist, Data Analyst, Network Engineer
LARS Code: 25
EQA Provider: Office for Students
Employers involved in creating the standard: Accenture, Bright Future, BT, Capgemini, CGI, Ford, Fujitsu, GSK, HMRC, HP, IBM, John Lewis, Lloyds Banking Group, Network Rail, Tata Consulting Services

Version log

Version Change detail Earliest start date Latest start date Latest end date
1.2 Standard, end-point assessment plan and funding band revised 01/09/2023 Not set Not set
1.1 The funding band for this standard has been reviewed as part of the apprenticeship funding band review. The new funding band is £25000 13/05/2019 31/08/2023 Not set
1.0 Approved for delivery 26/03/2015 12/05/2019 Not set

Is this webpage useful?

Thank you for your feedback

Tell us about your experience