Information Management and Data Consultant

Aberdeen, Scotland, United Kingdom - Remote

Applications have closed

Sword is a leader in data insights, digital transformation, and technology services with a substantial reputation in software development, complex business IT projects and mission critical operations. With over 2,500 Technology, Digital & Software specialists working globally, we unlock solutions to the most critical business technology challenges.

We are a trusted partner to a significant number of Energy sector clients in the UK. Our Aberdeen based team employs talented individuals who deliver Information Technology and Data Management solutions, leveraging the latest developments in systems and technology, whilst delivering a consistently first-class service to our customers.

As an Information Management Consultant you will work collaboratively within our customer’s asset team and deliver expert IM services to multiple functions across the business in accordance with their requirements.

The ideal candidate must have consultancy skills with experience across Information Management, including defining standards for Engineering Information Management, delivery of various IM systems and a strong understanding of the requirements for Cradle to Grave Lifecycle information management of Asset Information.

Responsibilities:

  • Implementing and sustaining the adoption of digital information management solutions and best practices in accordance with Company strategies, policies and procedures (information security, retention and personal data protection)
  • Working with Asset functions to assess information needs, agree priorities and deliver improvement opportunities through the implementation of lean techniques and improved collaboration
  • Executing project delivery in line with Company Project Management methodologies
  • Delivering business process improvements with a focus on improving information flow efficiency, document retention and information protection – specially promoting the adoption and governance of Office 365 information stores
  • Governing access to Asset information stores analysing and approving security access requests and maintaining the Asset folder structure
  • Contributing to the creation and maintenance of policies and processes within Corporate Management Systems
  • Coordinating solution deployment and adoption within the Assets.

Requirements

  • Information Management knowledge and experience gained within the energy sector would be desirable
  • Educated to Degree level (preferable)
  • Working knowledge of business analysis and project delivery is essential
  • As as a product owner , experience of agile project management methodology
  • Skills and experience in analytical techniques, business case development, strategy and policy definition, decision-making and project management
  • Energetic, autonomous, self-starter, confident communicator
  • Able to work as part of an established team and build excellent working relationships.

Benefits


Sword offer career paths in rapidly evolving technology spaces including Data & AI, Modern Workplace Transformation, Digital Services, Modern Managed Services, Information Management & Content Services.

Our team culture is based on building inclusive teams, investing in training and development, the quality of our interactions with our customers and our position as an employer of choice in the areas in which we operate.

All Sword colleagues are supported and encouraged to develop their career with Sword through our personal training and development plan alongside a competitive salary, pension, private healthcare and employee assistance programme.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Agile Governance Strategy

Perks/benefits: Career development Competitive pay

Regions: Remote/Anywhere Europe
Country: United Kingdom
Job stats:  4  1  0
Category: Consulting Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.