to work under pressure and maintain a professional demeanour. The following will be considered an asset: Professional certification such as SAP Certified Technology Professional, SAP Access Control 12.0, CISSP, CISM, or other relevant security certifications. Qualify the criteria of UK Security clearance. Strong understanding of IT and Business process Controls for S/4 HANA and other relevant SAP application More ❯
privilege access management for SAP and non SAP applications The following will be considered an asset: Professional certification such as SAP Certified Technology Professional, SAP Access Control 12.0, CISSP, CISM, or other relevant security certifications. Qualify the criteria of UK Security clearance. Connect to your business - Technology and Transformation Distinctive thinking, deep expertise, innovation and collaborative working. That's what More ❯
Design practices, and lifecycle risk management Exceptional communication and stakeholder engagement skills, with confidence navigating regulatory, technical, and executive domains It would be great if you also had: CISSP, CISM, CRISC or equivalent TOGAF or SABSA enterprise architecture credentials IEC 62443 Cybersecurity Expert or Practitioner certification Familiarity with ITIL, ISO 27019, and NCSC guidance for OT & ICS At Sword, our More ❯
the ability to work as a team and under your own initiative. Ability to communicate clearly with colleagues and clients at all levels. Preferred Skills Professional certifications: CRISC, CISA, CISM, CISSP, CBCI, ISO 22301 Lead Implementer/Auditor, PRINCE2/AgilePM. Prior involvement in regulatory remediation Technical financial services knowledge, including an understanding of the Insurance, Asset Management and Banking More ❯
advantageous Comfortable creating design documentation and presenting to clients Key Responsibilities: Specialised technical knowledge and experience of cyber security as evidenced by relevant industry qualifications (e.g. GICSP, GCIP, CISSP, CISM) Knowledge in cyber security frameworks and standards as well as a deep understanding of cyber security regulations as they apply to different sectors Analysis and management of risks and cybersecurity More ❯
vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both to your More ❯
vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both to your More ❯
vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both to your More ❯