Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Global ERP Solution Architect

Job Title: Global ERP Solution Architect
Contract Type: Permanent
Location: London, London
Industry:
Salary: £65000 - £75000 per annum + benefits
Start Date: ASAP
REF: CA/MON-3754
Contact Name: Cristian Amanta
Contact Email: cristian@montash.com
Job Published: about 1 year ago

Job Description

Technology Agnostic ERP Applications Architect

I am currently working with one of the most recognised brands in the world that is going through a large IT Transformation.

They are seeking a technology agnostic ERP Applications Architect to join their team. We are seeking a strong candidate with solid experience ERP Applications (SAP, Infor, Sage etc) to join their team.

My client is seeking someone that will work as a strategic architect to streamline their current ERP applications and create the roadmap for the future of their ERP applications.


Role and Responsibilities:

  • Experience with ERP strategic leadership.
  • Develop and review enterprise wide strategy and support the strategic requirements of the business.
  • Develop and maintain Enterprise Architecture that encompasses organization wide view of current and future business, information applications and technology architectures.
  • Develop business capability models to support current and future business objectives to help create application roadmaps.
  • Understand and investigate application roadmaps and technical architectural developments of IT vendors and system suppliers.
  • Accountable to identify compliance issues between business strategies, enterprise transformation activities and technology directions.
  • Reviewing and endorsing proposed projects to ensure architectural compliance is maintained when new systems, infrastructure and processes are implemented.
  • Define and manage the development and maintenance of application, data and technical architectures; evaluation and assessment of technology; maintenance of architecture and technology standards, software re-use policies, and compliance issues.
  • Understand to establish standards across the enterprise and coordinating such compliance efforts with Corporate Review Board and Governance Council.
  • Identifying architectural fit for any new planned purchases of application software packages, software products or services.
  • Demonstrated understanding and experience delivering programs to meet relevant statutory and organizational risk/compliance programs
  • Engage and influence Senior IT and business leadership and provide the key link between business strategies, enterprise transformation activities and technology directions.
  • Developing the architectural whitepapers, standards, policies, design patterns and agreeing these with all stakeholders.
  • Experience in the application of one or more EA frameworks and any associated architectural development methods is preferred: TOGAF (or) Zachman.

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...