Infocomm TechnologyInformation and communications technology professionalsISCO 2511
blockchain architect
Blockchain architects are ICT system architects that are specialized in blockchain-based solutions. They design architecture, components, modules, interfaces, and data for a decentralized system to meet specified requirements.
European Skills Framework
Skills and knowledge areas required for this occupation based on European classification.
Essential (45)
blockchain signature schemesblockchain signature schemesEssential digital signature schemes include the RSA scheme, the El-Gamal scheme, Hash functions, Birthday Attacks, the Digital Signature Standard.systems development life-cyclesystems development life-cycleThe sequence of steps, such as planning, creating, testing and deploying and the models for the development and life-cycle management of a system.blockchain componentsblockchain componentsThe study of essential blockchain components and concepts such as peer networks, smart contracts, memberships, events, ledgers, system integration, wallets, and system management.blockchain architectureblockchain architectureThe design structure of a peer-to-peer network of computers that functions as backend for systems and applications The network is constructed as a virtual machine without a central system that manages...digital identity managementdigital identity managementThe process of providing, managing, auditing and securing digital identities to facilitate and enable approved, authentic requests or connections to view company data, services, systems, networks, and...digital systemsdigital systemsSystems to store, process and spread information in digital form. They are hardware, software and networks, as well as the ways in which these can be employed.distributed ledger technologydistributed ledger technologyThe distributed ledger theories, applied principles, architectures and systems, such as decentralization, consensus mechanisms, smart contracts, trust, etc.blockchain opennessblockchain opennessThe different levels of openness of a blockchain, their differences, and their advantages and disadvantages. Examples are permissionless, permissioned, and hybrid blockchains.decentralised identifiersdecentralised identifiersThe knowledge of decentralised identifiers (DIDs). DIDs enable verifiable and decentralised digital identity related to different subjects determined by the controllers of these descentralised identif...blockchain applicationsblockchain applicationsThe knowledge of applications where blockchains can provide significant added value. They include applications in Banking and Finance (International Payments, Capital Markets, Trade Finance, Regulator...smart contractsmart contractA software program in which the terms of a contract or transaction are directly coded. Smart contracts are executed automatically upon fulfilment of the terms and therefore require no third party to o...blockchain concept applicationblockchain concept applicationThe process of transferring essential blockchain and, more generally, distributed ledger concepts to diverse application domains. For this, the domain-specific challenges, solutions, and consequences ...blockchain-based services regulationblockchain-based services regulationKey legal regulations around the blockchain, both existing and emerging ones. In Europe, regulations around the Digital Euro and Crypt-Assets, as well as the Pan-European blockchain regulatory sandbox...blockchain terminologyblockchain terminologyThe terms used in blockchain sector which include account, attestation, block, Byzantine fault, coin, consensus, crypto-, decentralized application (DApp), DeFi, digital identity, distributed ledger, ...blockchain platformsblockchain platformsThe different integrated infrastructures, each with their own characteristics, that allow the development of blockchain applications. Examples are multichain, ehtereum, hyperledger, corda, ripple, ope...blockchain applications security principlesblockchain applications security principlesThe essential security principles, methods and controls for blockchain applications. Identity and access management, key management, data privacy, secure communication, smart contract security, and tr...business processesbusiness processesProcesses which an organisation applies to improve efficiency, set new objectives and reach goals in a profitable and timely manner.data security principlesdata security principlesThe principles of information and data security. They include, among others, confidentiality, integrity, and availability.blockchain historyblockchain historyKey historical facts and milestones in the blockchain technology as well as the implementations and applications that emerged on top of it.blockchain design patternsblockchain design patternsRe-usable blockchain solution approaches including non-blocking user interface design, asynchronous API design, secure synchronization , time stamping, enterprise business integration, simple assets, ...distributed ledger technologies vulnerabilitiesdistributed ledger technologies vulnerabilitiesThe knowledge of the essential distributed ledger vulnerabilities including exchange hack, 51% attack, exitscam, extortion, DeFi, phishing, and drawing conclusions.blockchain-based business modelsblockchain-based business modelsThe study of diverse blockchain business models such as Blockchain-Based Software Products, Blockchain Development Platforms, Token Economy-Utility Token Business Model, P2P Blockchain Business Model,...design thinkingdesign thinkingThe process used to identify creative solutions to problem solving, by putting the user at its core. The five stages approach-empathise, define, ideate, prototype and test-are meant to challenge assum...distributed ledger technologies consensus protocolsdistributed ledger technologies consensus protocolsThe knowledge of essential blockchain consensus protocols including Proof-of-Work (PoW), Proof-of-Stake (PoS), Delegated Proof-of-Stake (DPoS), Practical Byzantine Fault Tolerance (pBFT).blockchain consensus mechanismsblockchain consensus mechanismsThe different mechanisms and their characteristics that ensure a transaction is propagated correctly in the distributed ledger.blockchain mining principlesblockchain mining principlesEssential blockchain and cryptocurrency mining types and principles include ASIC mining, GPU mining, CPU mining, Cloud mining, and Mining pools.develop blockchain innovative architecturesdevelop blockchain innovative architecturesDevelop new blockchain architectures that address properties and priorities as they are needed by specific applications. Argue the advantages and shortcomings of such new architectures with respect to...identify blockchain innovation opportunitiesidentify blockchain innovation opportunitiesIdentify blockchain innovation opportunities through the introduction of blockchain-based solutions, within a particular sector, but also across sectors. Understand the consequences of essential block...explain blockchain implicationsexplain blockchain implicationsExplain the consequences, impact, and implications of using blockchain technology on the business processes they drive, as well as on a larger scale, also including social and ecological aspects.analyse blockchain use casesanalyse blockchain use casesAnalyse blockchain use cases in different sectors against their needs in terms of blockchain technology and architecture. Particularly, key blockchain use cases in Business, Finance and Banking such a...recognise blockchain application areasrecognise blockchain application areasRecognise opportunities for the introduction of blockchain-based solutions in various application domains (e.g., supply chains, product-service systems, finances, etc.), as well as their transformativ...evaluate blockchain architecturesevaluate blockchain architecturesEvaluate blockchain architectures with respect to their suitability for specific applications, given the specific importance and priorities of architecture properties for these applications.create business process modelscreate business process modelsDevelop formal and informal descriptions of the business processes and the organisational structure by using business process models, notations and tools.analyse ICT systemanalyse ICT systemAnalyse the functioning and performance of information systems in order to define their goals, architecture and services and set procedures and operations to meet end users requirements.define roadmap for blockchain in applicationsdefine roadmap for blockchain in applicationsDefine and follow a roadmap for the introduction of blockchain in a particular application. Identify the key actions and roles required, as well as the essential milestones and deliverables to achieve...design process for blockchain-based systemsdesign process for blockchain-based systemsDesign processes for blockchain-based systems which involves the clear identification of problems to be solved through blockchain, specifying the business requirements, identifying a consensus mechani...develop blockchain technologydevelop blockchain technologyDevelop and integrate blockchain technology in new or existing ICT infrastructures, and understand the key challenges and solution approaches to this integration.design information systemdesign information systemDefine the architecture, composition, components, modules, interfaces and data for integrated information systems (hardware, software and network), based on system requirements and specifications.outline blockchain-based identity managementoutline blockchain-based identity managementOutline blockchain-based identity management and access control in terms of how they work, what their benefits are compared to current solutions, and how they can be applied for specific applications.interpret technical requirementsinterpret technical requirementsAnalyse, understand and apply the information provided regarding technical conditions.explain distributed ledger technologies principlesexplain distributed ledger technologies principlesExplain the principles of the system architecture underlying distributed ledger technologies (DLT), in particular blockchain. Understand the DLT system architecture in terms of functional components i...recognise blockchain risksrecognise blockchain risksRecognise risks associated with blockchain and cryptocurrency. Apart from standard risks associated with the business processes they are driving, blockchains bear value-transfer risks linked to the pe...define technical requirementsdefine technical requirementsSpecify technical properties of goods, materials, methods, processes, services, systems, software and functionalities by identifying and responding to the particular needs that are to be satisfied acc...implement cryptographic constructsimplement cryptographic constructsImplement cryptographic constructs such as hash functions, symmetric-key algorithms, and asymmetric-key algorithms, in the context of specific applications.define software architecturedefine software architectureCreate and document the structure of software products including components, coupling and interfaces. Ensure feasibility, functionality and compatibility with existing platforms.
Optional (11)
cryptocurrencycryptocurrencyDigital and encrypted currency or medium of exchange with decentralized network grounded on blockchain technology, since the value of the cryptocurrency is not managed or maintained by central authori...decentralized application frameworksdecentralized application frameworksThe different software frameworks, and their characteristics, advantages and disadvantages, that allow the development of decentralized applications on blockchain infrastructure. Examples are truffle,...software components librariessoftware components librariesThe software packages, modules, web services and resources that cover a set of related functions and the databases where these reusable components can be found.statisticsstatisticsThe study of statistical theory, methods and practices such as collection, organisation, analysis, interpretation and presentation of data. It deals with all aspects of data including the planning of ...service-oriented modellingservice-oriented modellingThe principles and fundamentals of service-oriented modelling for business and software systems that allow the design and specification of service-oriented business systems within a variety of archite...data analyticsdata analyticsThe science of analysing and making decisions based on raw data collected from various sources. Includes knowledge of techniques using algorithms that derive insights or trends from that data to suppo...cloud technologiescloud technologiesThe technologies which enable access to hardware, software, data and services through remote servers and software networks irrespective of their location and architecture.ICT encryptionICT encryptionThe conversion of electronic data into a format which is readable only by authorized parties which use key encryption techniques, such as Public Key Infrastructure (PKI) and Secure Socket Layer (SSL).design cloud architecturedesign cloud architectureDesign a multi-tier cloud architecture solution, which tolerates faults and is fit for the workload and other business needs. Identify elastic and scalable computing solutions, select high-performing ...debug softwaredebug softwareRepair computer code by analysing testing results, locating the defects causing the software to output an incorrect or unexpected result and remove these faults.develop software prototypedevelop software prototypeCreate a first incomplete or preliminary version of a piece of software application to simulate some specific aspects of the final product.
Related Occupations
Other occupations in the Other category that share similar skill requirements.
AI Replacement Risk
81/ 100
Very High Risk
Low riskHigh risk