Digital & Technology Solutions Professional
A Digital & Technology Solutions Professional provides technology enabled solutions to internal and/or external customers, in a range of areas including software, business and systems analysis, cyber security, data analysis and network infrastructure. They implement technology solutions that enable businesses to develop new products and services and to increase an organisations productivity using digital technologies. They are confident, competent and capable independent Technology Solutions Professionals able to operate in a range of related roles. The occupation is based upon a core set of outcomes that will be supplemented by one, and only one, of six specialism areas detailed below that cover the roles identified by employers.
Typical Job Titles
Software Developer, Software Engineer, Software Tester, Application Specialist, Business IT project Manager, IT Consultant, Network Engineer, Cyber Security Analyst, Database Specialist, Data Analyst, Digital Media Technology Practitioner, Systems Designer
BSc (Hons) in Digital & Technology Solutions
- Information Systems: is able to critically analyse a business domain in order to identify the role of information systems, highlight issues and identify opportunities for improvement through evaluating information systems in relation to their intended purpose and effectiveness.
- Systems Development: analyses business and technical requirements to select and specify appropriate technology solutions. Designs, implements, tests, and debugs software to meet requirements using contemporary methods including agile development. Manages the development and assurance of software artefacts applying secure development practises to ensure system resilience. Configures and deploys solutions to end users.
- Data: identifies organisational information requirements and can model data solutions using conceptual data modelling techniques. Is able to implement a database solution using an industry standard database management system (DBMS). Can perform database administration tasks and is cognisant of the key concepts of data quality and data security. Is able to manage data effectively and undertake data analysis.
- Cyber Security: can undertake a security risk assessment for a simple IT system and propose resolution advice. Can identify, analyse and evaluate security threats and hazards to planned and installed information systems or services (e.g. Cloud services).
- Business Organisation: can apply organisational theory, change management, marketing, strategic practice, human resource management and IT service management to technology solutions development. Develops well- reasoned investment proposals and provides business insights.
- IT Project Management: follows a systematic methodology for initiating, planning, executing, controlling, and closing technology solutions projects. Applies industry standard processes, methods, techniques and tools to execute projects. Is able to manage a project (typically less than six months, no inter dependency with other projects and no strategic impact) including identifying and resolving deviations and the management of problems and escalation processes.
- Computer and Network Infrastructure: can plan, design and manage computer networks with an overall focus on the services and capabilities that network infrastructure solutions enable in an organisational context. Identifies network security risks and their resolution.
Core Technical Knowledge
- How business exploits technology solutions for competitive advantage.
- The value of technology investments and how to formulate a business case for a new technology solution, including estimation of both costs and benefits.
- Contemporary techniques for design, developing, testing, correcting, deploying and documenting software systems from specifications, using agreed standards and tools.
- How teams work effectively to produce technology solutions.
- The role of data management systems in managing organisational data and information.
- Common vulnerabilities in computer networks including unsecure coding and unprotected networks.
- The various roles, functions and activities related to technology solutions within an organisation.
- How strategic decisions are made concerning acquiring technology solutions resources and capabilities including the ability to evaluate the different sourcing options.
- How to deliver a technology solutions project accurately consistent with business needs.
- The issues of quality, cost and time for projects, including contractual obligations and resource constraints.
Core Behavioural Skills
- Fluent in written communications and able to articulate complex issues.
- Makes concise, engaging and well-structured verbal presentations, arguments and explanations.
- Able to deal with different, competing interests within and outside the organisation with excellent negotiation skills.
- Is able to identify the preferences, motivations, strengths and limitations of other people and apply these insights to work more effectively with and to motivate others.
- Competent in active listening and in leading, influencing and persuading others.
- Able to give and receive feedback constructively and incorporate it into his/her own development and life-long learning.
- Applies analytical and critical thinking skills to Technology Solutions development and to systematically analyse and apply structured problem solving techniques to complex systems and situations.
- Able to put forward, demonstrate value and gain commitment to a moderately complex technology-oriented solution, demonstrating understanding of business need, using open questions and summarising skills and basic negotiating skills.
- Able to conduct effective research, using literature and other media, into IT and business related topics.
- Have demonstrated that they have mastered basic business disciplines, ethics and courtesies, demonstrating timeliness and focus when faced with distractions and the ability to complete tasks to a deadline with high quality.
- Flexible attitude.
- Ability to perform under pressure.
- A thorough approach to work.
- Logical thinking and creative approach to problem solving.
Specialism Outcome - Software Engineer
The primary role of a software engineer is to be able to design, build and test high-quality software solutions. The software engineer role is broader and with higher levels of responsibility than a software developer as they need to apply engineering principles to all stages of the software development process, from requirements, analysis and design, development and data requirements whilst ensuring security robustness is built in. They will typically be working as part of a larger collaborative team and will have responsibility for significant elements of software projects.
Be able to:
- Create effective and secure software solutions using contemporary software development languages to deliver the full range of functional and non-functional requirements using relevant development methodologies.
- Undertake analysis and design to create artefacts, such as use case to produce robust software designs.
- Produce high quality code with sound syntax in at least one language following best practices and standards.
- Perform code reviews, debugging and refactoring to improve code quality and efficiency.
- Test code to ensure that the functional and non-functional requirements have been met.
- Deliver software solutions using industry standard build processes, and tools for configuration management, version control and software build, release and deployment into enterprise environments.
Knows and understands:
- How to operate at all stages of the software development lifecycle.
- How teams work effectively to develop software solutions embracing agile and other development approaches.
- How to apply software analysis and design approaches.
- How to interpret and implement a design, compliant with functional, non-functional and security requirements.
- How to perform functional and unit testing.
- How to use and apply the range of software tools used in Software engineering.
Specialism Outcome - IT Consultant
An IT consultant requires a broad set of skills in business analysis, solutions development, network infrastructure, data, cyber security etc. They use their consulting skills in order to advise clients on how to best utilise technology to meet their business objectives, overcome problems and increase productivity. They provide strategic guidance to clients with regard to technology and facilitate changing business processes through enhancements to technology solutions. They provide technical assistance, and are often responsible for providing training.
Be able to:
- Perform technical process improvement tasks in a range of environments to solve business problems.
- Present optimised solutions to improve business process and workflows through improved technology.
- Recommend options based upon risks, costs vs benefits, and impact on other business processes.
- Participate in walk-throughs for IT, to identify and document key risks within a client’s organisation.
- Support training of end-users in preparation for system activation.
- Evaluate the success of a new system, process, initiative, etc.
Knows and understands:
- How consulting ties into project management, business analysis and business management.
- The barriers to solving problems or maximizing opportunities.
- How to present recommendations and influence action.
- The different structured process approaches for digital technology consulting.
- How to frame/define business problems objectively before solving them.
- How to discover hidden requirements using probing techniques to establish trust, using open and closed questions effectively, and avoiding leading questions.
Specialism Outcome - Business Analyst
A business analyst is responsible for assessing the business impact of change, capturing, analysing and documenting requirements and supporting the communication and delivery of requirements with relevant stakeholders. They create detailed analysis of systems and make recommendations for improvement. They produce specifications of user requirements that enable software engineers to develop the right software solutions. They require a broad foundation of skills and knowledge to be able to be effective as their work incorporates all aspects of digital technology systems.
Be able to:
- Develop and apply modelling and analysis techniques to describe business problem scenarios and to help select solutions using a range of industry standard analysis techniques.
- Elicit and prioritise business requirements for a digital technology system using ‘industry best practice’ methods.
- Develop a clear, complete, unambiguous and testable requirements specification, including functional, non-functional, data, user interface and security requirements.
- Model the ‘as is’ and future state for a business process using industry standard approaches and notation.
- Evaluate selected models against business objectives and system requirements.
- Use ‘industry’ standard tools to facilitate the analysis, documentation and traceability of requirements.
Knows and understands:
- The use of requirements elicitation techniques and their relevance to given situations.
- The principles of requirements engineering and the importance of managing requirements.
- How to conduct a range of business/organisational analyses.
- The use of tools to support modelling and requirements engineering.
- How the selected models inter-relate with each other.
- How the products of analysis feed into the design and development of a system.
Specialism Outcome - Cyber Security Analyst
A Cyber Security Analyst is responsible for the implementation, maintenance and support of the security controls that protect an organisation’s systems and data assets from threats and hazards. They ensure that security technologies and practices are operating in accordance with the organisation’s policies and standards to provide continued protection. They require a broad understanding of network infrastructure, software and data to identify where threat and hazard can occur. They are responsible for performing periodic vulnerability assessments to evaluate the organisation’s ongoing security posture and will provide visibility to management of the main risks and control status on an ongoing basis. They respond to security incidents and implement resolution activities across the organisation.
Be able to:
- Analyse and evaluate security threats and vulnerabilities to planned and installed information systems or services and identify how these can be mitigated against.
- Perform security risk assessments for a range of information systems and propose solutions.
- Develop a security case against recognised security threats, and recommend mitigation, security controls and appropriate processes.
- Define and justify a user access policy for an information system given knowledge of the system architecture, security requirements and threat/risk environment. This should be in terms of what they can do, resources they can access, and operations they are allowed to perform.
- Perform a business impact analysis in response to a security incident and follow a disaster recovery plan to meet elements of a given business continuity policy.
- Conduct a range of cyber security audit activities to demonstrate security control effectiveness.
Knows and understands:
- The types of security (confidentiality, authentication; non-repudiation; service integrity) and security big picture (network security; host OS security; physical security).
- The main types of common attack techniques, including phishing, social engineering, malware, network interception, blended techniques, denial of service and theft.
- How to recognise and assess risk including performing a risk assessment.
- How to apply penetration testing effectively and how it contributes to assurance.
- The different approaches to risk treatment and management in practice.
- What the ‘cyber security culture’ in an organisation is, and how it may contribute to security risk.
Specialism Outcome - Network Engineer
The primary role of a network engineer is to design, install, maintain and support communication networks within an organisation or between organisations. They need to maintain high levels of network performance performance and availability for their users, such as staff, clients, customers and suppliers. They will understand network configuration, cloud, network administration and monitoring tools, and be able to give technical advice and guidance. As part of their role they need to be proficient in technology solutions as they will analyse system requirements to ensure the network and its services operate to desired levels. They will need to understand the data traffic and transmission across the network and they have a major role to play in ensuring network security.
Be able to:
- Plan, design, build and test a simple network to a requirement specification that includes hubs, switches, routers and wireless user devices, applying appropriate security products and processes.
- Identify the key characteristics of a new network service and develop estimates of the expected traffic intensity and traffic load that the network must support.
- Determine the minimum network capacity of planned networks to meet network requirements.
- Design, build, test, configure and optimise a distributed network (more than 1 sub- net), including switches, routers and firewalls to meet given requirements.
- Analyse network performance and troubleshoot typical problems in networks.
- Identify and evaluate network security risks and incorporate appropriate security products and processes into network designs to increase security, resilience and dependability.
Knows and understands:
- The fundamental building blocks (e.g. routers, switches, hubs, storage, transmission) and typical architectures (e.g. server/client, hub/spoke) of computers, networks and the Internet.
- The main features of routing and Internet network protocols in use, their purpose and relationship to each other, including the physical and data link layer (e.g. https, HTTP, SMTP, SNMP, TCP, IP, etc.).
- The main factors that affect network performance (e.g. the relationship between bandwidth, number of users, nature of traffic, contention).
- Failure modes in protocols (e.g. why a protocol may ‘hang’ and the effect of data communication errors).
- The ways to improve performance (e.g. application of traffic shaping, changes to architecture to avoid bottlenecks, network policy that prohibit streaming protocols).
- The issues that may arise in the day to day operation of networks and how to resolve them.
For more information about our degree programme, please enter your details below and we will get back to you.