Software Implementation Consultant

London
3 weeks ago
Create job alert

Software Implementation Consultant
Location: London (Hybrid) | Type: Full-time | Clearance: SC Eligible
About Acuity Risk Management
Acuity Risk Management Ltd, established in 2005, provides STREAM, an award-winning Cyber GRC SaaS platform. We empower organizations to visualize risks, prioritize mitigation, and make data-driven decisions.
Join a high-growth, innovative company delivering results for global corporations and government bodies.
Why Join Us?

  • Pivotal role – Contribute to our expansion and success.
  • Cutting-edge tech – Work with our leading Cyber GRC platform.
  • Career growth – Develop alongside an ambitious company.
  • Global clients – Work with blue-chip companies in cybersecurity and risk management.
    The Role
    You’ll deliver hands-on implementation services, including configuration, data migration, and report development for STREAM. Supporting pre-sales and customer projects, you’ll ensure clients achieve their risk management goals.
    Key Responsibilities as a Software Implementation Consultant:
  • Configure STREAM for pre-sales demonstrations and proofs of concept.
  • Conduct workshops to gather requirements and implement STREAM.
  • Import and organize data from Excel into STREAM.
  • Develop custom reports, dashboards, and exports using Power BI.
  • Create and test STREAM Webforms for clients.
  • Deliver on-site and remote training on STREAM.
  • Act as the primary consultant for assigned clients, ensuring ongoing customer success.
    Key Requirements of a Software Implementation Consultant:
  • 3–5 years experience in software implementation or consultancy.
  • Strong Microsoft Excel and Word skills.
  • Ability to analyze, organize, and manipulate data effectively.
  • Experience creating reports for business stakeholders.
  • Excellent problem-solving and communication skills.
  • Technical background and experience building client relationships.
    Desirable Skills as a Software Implementation Consultant:
  • Advanced Excel (VBA/macros), SQL, Power BI.
  • Programming experience (JavaScript, Python, PowerShell).
  • Knowledge of ISO 27001, NIST, Cyber Essentials, PCI DSS.
  • Familiarity with cloud technologies and multi-user software systems.
    Security Clearance
    This role requires SC clearance (five years of UK residency) or potentially DV clearance (10 years of UK residency). UK nationality (dual nationals may be considered on a case-by-case basis).
    Apply now to join our growing team and make an impact in cybersecurity and risk management

Related Jobs

View all jobs

Lead Controls Engineer

It Manager

Automation Software Manager

Solution Architect

Senior Java Backend Engineer

Senior FPGA Design Engineer

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.