• Home
  • Search Jobs
  • Register CV
  • Post a Job
  • Employer Pricing
  • Contact Us
  • Sign in
  • Sign up
  • Home
  • Search Jobs
  • Register CV
  • Post a Job
  • Employer Pricing
  • Contact Us
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

2 jobs found

Email me jobs like this
Refine Search
Current Search
solutions architect ksa
SAP SuccessFactors Employee Central Payroll (ECP) Consultant
DXC Technology Inc.
Job Description Here at DXC Technology we continue to significantly expand our SAP business across the UK and Europe. We are actively looking for SAP SuccessFactors Employee Central Payroll (ECP) Consultant to join our growing team. If you're passionate about working across the full lifecycle of SAP payroll projects-from pre-sales through delivery-this role is ideal. You'll collaborate with clients across multiple industries, applying deep payroll expertise to deliver value-driven HR and payroll solutions. About the Role As an experienced SAP SuccessFactors ECP Functional Consultant you will support large-scale payroll transformations and migrations from SAP ECC6 Payroll. The role requires deep configuration experience in SAP ECP, strong understanding of payroll schemas and processes, and the ability to work with HR, IT, and business stakeholders. You will contribute to design, build, deployment, testing, and optimization of payroll processes across multi-country environments. Due to the nature of our clients work we can only consider sole British Nationals that have lived and worked in the UK consecutively for the past 5 years, unfortunately we are unable to consider dual nationals currently. Key Responsibilities Lead configuration and design of SAP SuccessFactors ECP, including payroll schemas, rules, wage types, and off-cycle payroll. Collaborate with HR and IT leaders to define payroll digital roadmaps and transition strategies. Deliver expert advisory on ECP best practices, architecture, and payroll integration design. Support migrations from SAP ECC payroll to ECP, including mapping of payroll rules/data. Ensure accurate EC ECP employee master data and time data replication. Perform payroll parallel runs, analysis, and reconciliation of payroll results. Work with Integration teams to design interfaces (GL posting, bank files, WPS, GOSI, payslips). Drive testing cycles (SIT, UAT, regression) and lead payroll go-live readiness. Establish governance frameworks for payroll releases, compliance, and security. Ensure GDPR, data privacy, payroll compliance, and audit controls are embedded. Support pre-sales, proposals, effort estimation, and solution demonstrations. Essential Requirements Demonstrated advanced expertise in SAP HCM Payroll and solid hands on experience in SAP ECP. Strong hands on experience configuring payroll schemas, PCRs, wage types, and payroll rules. Experience in EC-ECP integration and payroll migration projects (preferably ECC ECP). Strong understanding of payroll legislation (KSA or global experience preferred). Experience working with SAP CPI or middleware for payroll interfaces. Ability to lead workshops, gather requirements, and engage with senior stakeholders. Strong analytical, troubleshooting, and payroll testing skill. Certifications & Qualifications Bachelor's degree in HR Technology, Computer Science, Business, or similar. SAP SuccessFactors Employee Central Payroll certification preferred. Why DXC Technology? At DXC, you'll join a team that values innovation, collaboration, and impact. We work with major global clients to solve complex challenges and build digital solutions that power transformation. You'll have the opportunity to grow your SAP expertise, share your ideas, and be part of a culture that celebrates continuous learning. You will also benefit from our Flexible Benefits Package including flexible options for private medical insurance, dental, travel cover, and more. You will also have access to exclusive discounts on restaurants and everyday purchases. At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We're committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available.
Jan 01, 2026
Full time
Job Description Here at DXC Technology we continue to significantly expand our SAP business across the UK and Europe. We are actively looking for SAP SuccessFactors Employee Central Payroll (ECP) Consultant to join our growing team. If you're passionate about working across the full lifecycle of SAP payroll projects-from pre-sales through delivery-this role is ideal. You'll collaborate with clients across multiple industries, applying deep payroll expertise to deliver value-driven HR and payroll solutions. About the Role As an experienced SAP SuccessFactors ECP Functional Consultant you will support large-scale payroll transformations and migrations from SAP ECC6 Payroll. The role requires deep configuration experience in SAP ECP, strong understanding of payroll schemas and processes, and the ability to work with HR, IT, and business stakeholders. You will contribute to design, build, deployment, testing, and optimization of payroll processes across multi-country environments. Due to the nature of our clients work we can only consider sole British Nationals that have lived and worked in the UK consecutively for the past 5 years, unfortunately we are unable to consider dual nationals currently. Key Responsibilities Lead configuration and design of SAP SuccessFactors ECP, including payroll schemas, rules, wage types, and off-cycle payroll. Collaborate with HR and IT leaders to define payroll digital roadmaps and transition strategies. Deliver expert advisory on ECP best practices, architecture, and payroll integration design. Support migrations from SAP ECC payroll to ECP, including mapping of payroll rules/data. Ensure accurate EC ECP employee master data and time data replication. Perform payroll parallel runs, analysis, and reconciliation of payroll results. Work with Integration teams to design interfaces (GL posting, bank files, WPS, GOSI, payslips). Drive testing cycles (SIT, UAT, regression) and lead payroll go-live readiness. Establish governance frameworks for payroll releases, compliance, and security. Ensure GDPR, data privacy, payroll compliance, and audit controls are embedded. Support pre-sales, proposals, effort estimation, and solution demonstrations. Essential Requirements Demonstrated advanced expertise in SAP HCM Payroll and solid hands on experience in SAP ECP. Strong hands on experience configuring payroll schemas, PCRs, wage types, and payroll rules. Experience in EC-ECP integration and payroll migration projects (preferably ECC ECP). Strong understanding of payroll legislation (KSA or global experience preferred). Experience working with SAP CPI or middleware for payroll interfaces. Ability to lead workshops, gather requirements, and engage with senior stakeholders. Strong analytical, troubleshooting, and payroll testing skill. Certifications & Qualifications Bachelor's degree in HR Technology, Computer Science, Business, or similar. SAP SuccessFactors Employee Central Payroll certification preferred. Why DXC Technology? At DXC, you'll join a team that values innovation, collaboration, and impact. We work with major global clients to solve complex challenges and build digital solutions that power transformation. You'll have the opportunity to grow your SAP expertise, share your ideas, and be part of a culture that celebrates continuous learning. You will also benefit from our Flexible Benefits Package including flexible options for private medical insurance, dental, travel cover, and more. You will also have access to exclusive discounts on restaurants and everyday purchases. At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We're committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available.
Information Systems Security Manager (ISSM) Subject Matter Expert
Sumaria Systems, Inc. Bedford, Bedfordshire
To join our dynamic, professional team, review our list of jobs below to find the one that is the perfect fit for you. If none of these are right for you right now, submit your application to the general consideration posting. Information Systems Security Manager (ISSM) Subject Matter Expert Job Title: Information Systems Security Manager (ISSM) Subject Matter Expert Job Description: Sumaria Systems is seeking an Information System Security Manager (ISSM) to ensure system and application deliverables meet all required cyber security policies and regulations for the Technical Advisory and Assistance Services (TAAS) program at Hanscom AFB. This is a full-time position. ISSM SME responsibilities include, but are not limited to: Manage the system/application Assessment and Authorization (A&A) efforts, to include assessing and guiding the quality and completeness of A&A activities, tasks, and resulting artifacts mandated by governing DoD and Department of the Air Force policies (i.e., RMF). Develop and conduct a Continuous Monitoring plan in support of A&A activities to maintain ongoing awareness of cybersecurity, vulnerabilities, and threats to facilitate risk-based decision making. Maintain and report system assessment and authorization status and issues in accordance with DoD Component guidance. Participate in meetings/teleconferences, change control boards (CCBs) and working groups (WGs) to ensure the continued alignment of cybersecurity requirements in the technical baselines, the system security architecture, information flows, design, and the security controls. Evaluate system sources of changes such as Deficiency Reports (DRs), Problem Reports (PRs), Change Requests/Proposals (CRs/CPs), and AF Form 1067s; provide inputs to the root cause analysis reporting and the formulation of recommended solution from alternatives; determine the security impacts of proposed or actual changes to the system, environment, threats, and vulnerabilities; and if any, document in written reports the changes/revisions to the system's RMF artifacts. Review and provide inputs to modification packages, program/system documents and support agreements updates, and communications and network infrastructure upgrades to ensure proper cybersecurity configuration modification management; implementation of technical, managerial, operational requirements; and support requirements (e.g. planning, testing, test infrastructure, documentation, training, etc.) are identified. Review system test plans and test results and if necessary, observe system testing for security control implementation IAW cybersecurity policies, guidance, and plan. Document findings in a report. Perform security impact analysis on any system change and appropriately prepare letters of assurance, security impact letters, and risk assessment letters to include exceptions, deviations, or waivers to cybersecurity requirements when applicable. Continuously monitor intelligence and open-source information for vulnerabilities affecting AFNWC/NCL systems, assess risk, and provide POA&M recommendations to ISSM and PM as required. Act as the primary cybersecurity technical advisor to Program Management and System Engineers for systems under their purview. Coordinate Trusted Systems and Networks (TSN) and Supply Chain Risk Management (SCRM) evaluation of program information, software, and hardware throughout the program life cycle. Ensure that cybersecurity-related events or configuration changes that may impact systems authorization or security posture are formally reported to the AO and other affected parties, such as IOs and stewards and AOs of interconnected DoD ISs. Ensure that cybersecurity inspections, tests, and reviews are synchronized and coordinated with affected parties and organizations. Perform cybersecurity inspections, tests, and reviews. Ensure ISSMs are appointed in writing and provide oversight to ensure they are following established cybersecurity policies and procedures. Ensure that Information and System Owners associated with DoD information received, processed, stored, displayed, or transmitted on each system are identified to establish accountability, access approvals, and special handling requirements. Maintain a repository for all organizational or system-level cybersecurity-related documentation. Ensure implementation of IS security measures and procedures including reporting incidents to the appropriate reporting chains and coordinating system-level responses to unauthorized disclosures in accordance with DoD Manual 5200.01, Volume 3 for classified information or DoD Manual 5200.01, Volume 4 for Controlled Unclassified Information (CUI), respectively. Ensure handling of possible or actual data spills of classified information resident in ISs, are conducted in accordance with DoD 5200.01, Volume 3. Ensure the secure configuration and approval of IT below the system level (i.e., products and IT services) in accordance with applicable guidance prior to acceptance into or connection to a DoD IS or PIT system. Author, monitor, and record system information in applicable databases. Prepare and record system, security status, and portfolio management information into the Air Force Information Technology Investment Portfolio Suite (referred to as ITIPS) for Federal Information Security Management Act (FISMA); Security, Interoperability, Supportability, Sustainability, Usability (SISSU); Clinger Cohen Act; and other statutory compliance. Author, review, certify, and/or maintain security management plans and RMF package artifacts including but not limited to: RMF Implementation Plans, System Security Management Plans, Information Support Plans, Program Protection Plans (PPPs), Security Risk Analyses, Security Vulnerability and Countermeasure Analyses, Vulnerability Management Plans, Common Control Packages, Security Concepts of Operations, Operational Security (OPSEC) Plans, Authority-to-Connect guest system packages, and other system/network security related documents. Prepare, maintain, and submit a monthly report that captures the status of each A&A package to include an integrated schedule capable of showing high-level views of all packages and have the ability to delve in-depth into individual packages. Items to be addressed shall include: Authorization Status, RMF Progress, PoA&M Status, FISMA Compliance, Delivery of Documentation and Artifacts, Status of Incomplete items, Completed or Upcoming Reviews, Open Actions and Status, and Key Schedule Milestones. Support and assist external teams in the evaluation of systems Cybersecurity posture to include teams performing non-regular cyber tests, war-games, cyber penetration tests, and cyber studies conducted by the NSA, DISA, Air Force Audit Agency, or other organizations. Support the development, coordination, and implementation of cybersecurity-related special projects and taskers, e.g., Defensive Cyber Operations (DCO), Higher Headquarter requests, Notice to Airmen (NOTAMs), Technical Change Orders (TCOs), System Program Office (SPO), 16th AF, USSTRATCOM, USCYBERCOM, SAF/A6, SpOC/S6, AFGSC/A6, 460 Space Wing, and AFNWC/NC efforts. For each system, maintain a current software bill of materials that contains the elements identified in the National Telecommunications and Information Administration publication "The Minimum Elements for a Software Bill of Materials", July 12, 2021. Shall meet the Advanced level qualification requirements for Information System Security Manager (722) or Vulnerability Assessment Analyst (541) as outlined in DoD Cyber Workforce Framework - DoDI 8140.01, DoDI 8140.02, and DoDM 8140.03. Perform Information Systems Security Management (722) and Vulnerability Assessment Analyst (541) Core/Additional Tasks and meet the KSAs as outlined in DoD Cyber Workforce Framework - DoDI 8140.01, DoDI 8140.02, and DoDM 8140.03. Required Skills/Education: Bachelor's degree in a related field. Must hold one of the following certifications: CISSP, CISM, GSLC, or CCISO. Experience with the certification and accreditation process. Significant experience in vulnerability scanning and analysis, including the use of automated tools and vulnerability management systems. Knowledge of intrusion prevention and network access control tools/systems. Understanding of system audit principles and security risk assessment. Strong understanding of security policy advocated by the U.S. Government including the Department of Defense and appropriate civil agencies, e.g., NIST. Able to perform work that involves ensuring the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools. Knowledge of cryptography and cryptographic key management concepts. General experience includes development of both common user and special purpose command and control/information systems with increasing responsibilities in the scope and magnitude of the systems for which solutions have been implemented. Must have a solid understanding of network infrastructure and mission assurance. Familiar with Federal government and DOD standards for IA/security including DIACAP, FISMA, NIST, and OMB. Must have solid communications skills and be capable of working with all levels of an organization. Education: Master's Degree Years of Experience: Over 10 years Travel: Minor Security Clearance Required: Top Secret/SCI Position Type: Full Time . click apply for full job details
Jan 01, 2026
Full time
To join our dynamic, professional team, review our list of jobs below to find the one that is the perfect fit for you. If none of these are right for you right now, submit your application to the general consideration posting. Information Systems Security Manager (ISSM) Subject Matter Expert Job Title: Information Systems Security Manager (ISSM) Subject Matter Expert Job Description: Sumaria Systems is seeking an Information System Security Manager (ISSM) to ensure system and application deliverables meet all required cyber security policies and regulations for the Technical Advisory and Assistance Services (TAAS) program at Hanscom AFB. This is a full-time position. ISSM SME responsibilities include, but are not limited to: Manage the system/application Assessment and Authorization (A&A) efforts, to include assessing and guiding the quality and completeness of A&A activities, tasks, and resulting artifacts mandated by governing DoD and Department of the Air Force policies (i.e., RMF). Develop and conduct a Continuous Monitoring plan in support of A&A activities to maintain ongoing awareness of cybersecurity, vulnerabilities, and threats to facilitate risk-based decision making. Maintain and report system assessment and authorization status and issues in accordance with DoD Component guidance. Participate in meetings/teleconferences, change control boards (CCBs) and working groups (WGs) to ensure the continued alignment of cybersecurity requirements in the technical baselines, the system security architecture, information flows, design, and the security controls. Evaluate system sources of changes such as Deficiency Reports (DRs), Problem Reports (PRs), Change Requests/Proposals (CRs/CPs), and AF Form 1067s; provide inputs to the root cause analysis reporting and the formulation of recommended solution from alternatives; determine the security impacts of proposed or actual changes to the system, environment, threats, and vulnerabilities; and if any, document in written reports the changes/revisions to the system's RMF artifacts. Review and provide inputs to modification packages, program/system documents and support agreements updates, and communications and network infrastructure upgrades to ensure proper cybersecurity configuration modification management; implementation of technical, managerial, operational requirements; and support requirements (e.g. planning, testing, test infrastructure, documentation, training, etc.) are identified. Review system test plans and test results and if necessary, observe system testing for security control implementation IAW cybersecurity policies, guidance, and plan. Document findings in a report. Perform security impact analysis on any system change and appropriately prepare letters of assurance, security impact letters, and risk assessment letters to include exceptions, deviations, or waivers to cybersecurity requirements when applicable. Continuously monitor intelligence and open-source information for vulnerabilities affecting AFNWC/NCL systems, assess risk, and provide POA&M recommendations to ISSM and PM as required. Act as the primary cybersecurity technical advisor to Program Management and System Engineers for systems under their purview. Coordinate Trusted Systems and Networks (TSN) and Supply Chain Risk Management (SCRM) evaluation of program information, software, and hardware throughout the program life cycle. Ensure that cybersecurity-related events or configuration changes that may impact systems authorization or security posture are formally reported to the AO and other affected parties, such as IOs and stewards and AOs of interconnected DoD ISs. Ensure that cybersecurity inspections, tests, and reviews are synchronized and coordinated with affected parties and organizations. Perform cybersecurity inspections, tests, and reviews. Ensure ISSMs are appointed in writing and provide oversight to ensure they are following established cybersecurity policies and procedures. Ensure that Information and System Owners associated with DoD information received, processed, stored, displayed, or transmitted on each system are identified to establish accountability, access approvals, and special handling requirements. Maintain a repository for all organizational or system-level cybersecurity-related documentation. Ensure implementation of IS security measures and procedures including reporting incidents to the appropriate reporting chains and coordinating system-level responses to unauthorized disclosures in accordance with DoD Manual 5200.01, Volume 3 for classified information or DoD Manual 5200.01, Volume 4 for Controlled Unclassified Information (CUI), respectively. Ensure handling of possible or actual data spills of classified information resident in ISs, are conducted in accordance with DoD 5200.01, Volume 3. Ensure the secure configuration and approval of IT below the system level (i.e., products and IT services) in accordance with applicable guidance prior to acceptance into or connection to a DoD IS or PIT system. Author, monitor, and record system information in applicable databases. Prepare and record system, security status, and portfolio management information into the Air Force Information Technology Investment Portfolio Suite (referred to as ITIPS) for Federal Information Security Management Act (FISMA); Security, Interoperability, Supportability, Sustainability, Usability (SISSU); Clinger Cohen Act; and other statutory compliance. Author, review, certify, and/or maintain security management plans and RMF package artifacts including but not limited to: RMF Implementation Plans, System Security Management Plans, Information Support Plans, Program Protection Plans (PPPs), Security Risk Analyses, Security Vulnerability and Countermeasure Analyses, Vulnerability Management Plans, Common Control Packages, Security Concepts of Operations, Operational Security (OPSEC) Plans, Authority-to-Connect guest system packages, and other system/network security related documents. Prepare, maintain, and submit a monthly report that captures the status of each A&A package to include an integrated schedule capable of showing high-level views of all packages and have the ability to delve in-depth into individual packages. Items to be addressed shall include: Authorization Status, RMF Progress, PoA&M Status, FISMA Compliance, Delivery of Documentation and Artifacts, Status of Incomplete items, Completed or Upcoming Reviews, Open Actions and Status, and Key Schedule Milestones. Support and assist external teams in the evaluation of systems Cybersecurity posture to include teams performing non-regular cyber tests, war-games, cyber penetration tests, and cyber studies conducted by the NSA, DISA, Air Force Audit Agency, or other organizations. Support the development, coordination, and implementation of cybersecurity-related special projects and taskers, e.g., Defensive Cyber Operations (DCO), Higher Headquarter requests, Notice to Airmen (NOTAMs), Technical Change Orders (TCOs), System Program Office (SPO), 16th AF, USSTRATCOM, USCYBERCOM, SAF/A6, SpOC/S6, AFGSC/A6, 460 Space Wing, and AFNWC/NC efforts. For each system, maintain a current software bill of materials that contains the elements identified in the National Telecommunications and Information Administration publication "The Minimum Elements for a Software Bill of Materials", July 12, 2021. Shall meet the Advanced level qualification requirements for Information System Security Manager (722) or Vulnerability Assessment Analyst (541) as outlined in DoD Cyber Workforce Framework - DoDI 8140.01, DoDI 8140.02, and DoDM 8140.03. Perform Information Systems Security Management (722) and Vulnerability Assessment Analyst (541) Core/Additional Tasks and meet the KSAs as outlined in DoD Cyber Workforce Framework - DoDI 8140.01, DoDI 8140.02, and DoDM 8140.03. Required Skills/Education: Bachelor's degree in a related field. Must hold one of the following certifications: CISSP, CISM, GSLC, or CCISO. Experience with the certification and accreditation process. Significant experience in vulnerability scanning and analysis, including the use of automated tools and vulnerability management systems. Knowledge of intrusion prevention and network access control tools/systems. Understanding of system audit principles and security risk assessment. Strong understanding of security policy advocated by the U.S. Government including the Department of Defense and appropriate civil agencies, e.g., NIST. Able to perform work that involves ensuring the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools. Knowledge of cryptography and cryptographic key management concepts. General experience includes development of both common user and special purpose command and control/information systems with increasing responsibilities in the scope and magnitude of the systems for which solutions have been implemented. Must have a solid understanding of network infrastructure and mission assurance. Familiar with Federal government and DOD standards for IA/security including DIACAP, FISMA, NIST, and OMB. Must have solid communications skills and be capable of working with all levels of an organization. Education: Master's Degree Years of Experience: Over 10 years Travel: Minor Security Clearance Required: Top Secret/SCI Position Type: Full Time . click apply for full job details

Modal Window

  • Home
  • Contact
  • About Us
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • Facebook
  • Twitter
  • Google Plus
  • LinkedIn
Parent and Partner sites: IT Job Board | Jobs Near Me | RightTalent.co.uk | Quantity Surveyor jobs | Building Surveyor jobs | Construction Recruitment | Talent Recruiter | Construction Job Board | Property jobs | myJobsnearme.com | Jobs near me
© 2008-2026 Jobsite Jobs | Designed by Web Design Agency