Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
strategies. Oversee release schedules, ensuring incident-free deployments with minimal business impact. Infrastructure & Security: Implement security best practices for Salesforce, including role-basedaccesscontrol and compliance monitoring. Work closely with security teams to mitigate risks and enforce governance policies. Optimise performance and scalability of Salesforce infrastructure. Establish More ❯
Reading, England, United Kingdom Hybrid / WFH Options
GTS Group Ltd
and Logic Apps Integrate internal systems with NetSuite (REST & SOAP APIs) Architect slick SQL-based solutions (tables, views, stored procs) Enforce bulletproof security & governance (OAuth2, RBAC, Key Vault) Optimise for performance, cost, and reliability (hello, retries and throttling) Champion DevOps best practices (CI/CD, environment strategies) Spot opportunities and transform them into working solutions Stay More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Run-Time Group Ltd
Identity Management) identity and access management knowledge, fitting for someone managing enterprise cloud environments. Roles/Groups (including built-in) Related to RBAC (Role-BasedAccessControl) and security best practices in Azure. ServiceNow Hyper-V/Windows 11 Scripting experience in Python, Bash Powershell More ❯
High Wycombe, Buckinghamshire, England, United Kingdom Hybrid / WFH Options
Dreams Ltd
O, and other ERP systems. - Translate business needs into clear functional and technical requirements for development and configuration teams. - Support the design and implementation of role-basedsecurity models and manage user access within D365 F&O. - Work closely with cross-functional teams to ensure alignment between business objectives and system capabilities. … process analysis and process improvement techniques. - Demonstrated ability to gather and document reporting requirements for tools like Power BI and ERP systems. - Solid knowledge of role-basedsecurity models and user access management. - Ability to effectively translate business needs into actionable functional and technical specifications. - Familiarity with ERP systems and their integration More ❯