Technical Lead - CMMS Project

Clifton Hampden
1 week ago
Create job alert

Technical Lead - CMMS Project

Overall Purpose:
UKAEA are undertaking a significant business transformation to upgrade their Computerised Maintenance Management (CMMS) and transition to an Enterprise Asset Management System (EAMS). As the Technical Lead, you will oversee the programme's implementation workstream. You will provide expert advice, guidance, and technical support for the successful implementation, configuration, and sustainability of the new CMMS/EAMS, ensuring compliance with regulatory requirements, alignment with best practices, and long-term system lifecycle management.

You will collaborate with external vendors, system integrations and cross-functional departments to ensure the successful deployment and utilisation of this critical technology. Your expertise will be instrumental in enhancing our maintenance and asset management practices, driving operational efficiency, and supporting our mission.
Accountabilities:
The Technical Lead acts as the primary advisor to UKAEA and the project team; offering support to the Project Manager and Subject Matter Experts by providing insights and resolving technical challenges to ensure alignment with project goals.

Key responsibilities include:

  • Offer advice and guidance on CMMS/EAMS best practice
  • Offer subject matter knowledge and expertise on maintenance operations and workflows
  • Offer details of statutory and regulatory compliance requirements aligned with standards such as BESA SFG20, Uniclass 2015
  • Facilitate vendor led configuration workshops to support technical delivery of the CMMS with input from business SME's and guidance from stakeholders
  • Review vendor proposals and curriculum for the training of UKAEA Teams
  • Execution of the technical implementation plan
  • Offer advice on training types and content
  • Identify technical risks and challenges and propose appropriate mitigations
  • Provide inputs and advice on the development of use cases
  • Collaborate with external vendors, Data Lead, Test Manager and in house SMEs to develop functional requirement specification
  • Support technical delivery of the new CMMS
  • Participate in CMMS/EAMS system lifecycle sustainability an benefits realisation modelling.
  • Participate in Technical Change Review Board and risk review meetings.
  • Participate in lifecycle lesson learnt reviews
  • Support UKAEA Computing teams in ensuring cybersecurity measures are in place for the new system.
  • Offer advice and guidance on technical resourcing as appropriate
    Specific Qualifications/Experience:
    The Technical Lead should have a strong background in system architecture and integration, with hands-on experience in the implementation of multiple CMMS/EAMS projects, such as those involving platforms like Maximo, SAP, or Hexagon.
    The Technical Lead should bring expertise in configuration management, API management, cybersecurity, ensuring compliance with industry standards. Effective problem solving, communication, and collaboration skills are essential to support cross functional teams and stakeholders.
    Formal qualifications could include a degree in Computer Science or a related field, with certifications such as Agile Scrum Master, Certified Reliability Leader being advantageous. The Technical Lead is expected to be at the Culham site 3 days a week.

    Rullion celebrates and supports diversity and is committed to ensuring equal opportunities for both employees and applicants

Related Jobs

View all jobs

Technical Specialist

Technical Architect

Automation Systems Lead (none IT)

Infrastructure Manager - Infrastructure Team Leader

Head of Electronic and Electrical Engineering

Development & Cloud Solutions Architect

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.