SQA Consulting Limited

Transformation Services

Advisory & Transformation, Agile Enablement, Architecture & Design Augmentation, Business Modelling, Change Management, CI/CD Pipeline, Cloud Migration, Demand Management, Devsecops Enablement, Legacy Technical Assessment, Process Cost Optimisation, Product Engineering, Release Management, Security Vulnerability Assessment, Tooling Migration & Integration, Training

Features

  • Requirements Verification & Validation
  • Functional Testing, Business Process Automation
  • Integration Testing
  • Performance, Stress and Volume Testing
  • Security Testing
  • Regression Testing
  • User Acceptance Testing
  • Operational Acceptance Testing
  • Defect Management
  • Production Defect Coordination

Benefits

  • Save Time, Money rasing defects against design and not code
  • Ensure application basics are compliant with requirements
  • Ensure all integration points and applications are working properley
  • Ensure solution scalability and response times
  • Remove applicaiton vunrabilities and protect data as well as reputation
  • Ensure all as is functionality is not impacted by change
  • Ensure users are statified with the application release
  • Ensure transition to operations teams
  • Raise, categorise, prioritise, track and retest defects found in test
  • Enable future fixes based on informed decisions

Pricing

£280 to £1,500 a person a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at patrick.chatee@sqa-consulting.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

3 8 7 2 2 0 1 0 1 4 1 9 2 5 4

Contact

SQA Consulting Limited Patrick Chatee
Telephone: 01773525440
Email: patrick.chatee@sqa-consulting.com

Planning

Planning service
Yes
How the planning service works
We can support via the provision of highly skilled business analysts to help generate your solution requirements or we can ratify your requirements and provide confidence that your solution works as expected. We will provide complete coverage and tractability ensuring functional and integration correctness as well as scalability and vulnerability confidence. We provide Security Threat Modelling and XSite Scripting Solutions, Penetration and Vulnerability testing. We target Code, Libraries, Run Time Data Flow, Software Architecture, HPPT Traffic, Frameworks, Runtime Control Flow, Server Configuration, Backend Connections, Configuration Data, Platform Runtime etc.
Planning service works with specific services
No

Training

Training service provided
Yes
How the training service works
We provide detailed training on all facets of our stated portfolio, our methodology follows the following approach, enabling self-sufficiency for our clients as part of the engagement journey:

Advise

We review & refine our client’s processes & tooling, recommending change & integration to benefit delivery through automation

Change

We run projects in collaboration with our clients to ensure that the recommended change delivers the anticipated business benefit

Train

We train our client’s to ensure that the benefits delivered through change projects are sustained

Support

We provide support to our clients to ensure they continue to reap ongoing benefits after project completion

Operate

We provide expertise to manage business processes & technologies on behalf of our clients
Training is tied to specific services
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
We help buyers migrate to and between cloud services by validating their chosen solutions
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
All Quality Assurance services are based on requirements. We can help reverse engineer requirements if required. We provide full traceability and coverage. We are proficient in the latest tooling, traditional and digital specific. We can provide onsite and off premise solutions. Managed Services, Solution Based or Resource Augmentation. Are services include, Requirements Verification and Validation, Functional, Integration, Performance, Stress and Volume, User Acceptance, Compatibility, Accessibility and Operational Acceptance. We can deploy solutions using all testing methodologies, these include, V-Model, Waterfall, Agile, Business Driven and Testing Driven Development.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
Certified security testers
No

Ongoing support

Ongoing support service
Yes
Types of service supported
Hosting or software provided by a third-party organisation
How the support service works
Our our methodology follows the following approach, ensuring support models are robust both with SQA support or handing over responsibility of support to the client:

Advise - we review & refine our client’s processes & tooling, recommending change & integration to benefit delivery through automation

Change - we run projects in collaboration with our clients to ensure that the recommended change delivers the anticipated business benefit

Train - we train our client’s to ensure that the benefits delivered through change projects are sustained Support We provide support to our clients to ensure they continue to reap ongoing benefits after project completion

Operate - we provide expertise to manage business processes & technologies on behalf of our clients

Service scope

Service constraints
There are no known constraints with our service offering, subject to agreeing cross party scope, budget and dependencies on a per client engagement basis

User support

Email or online ticketing support
No
Phone support
No
Web chat support
No
Support levels
Our support is performed on a consulting basis

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
QMS International
ISO/IEC 27001 accreditation date
06/10/2021
What the ISO/IEC 27001 doesn’t cover
None
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Social Value

Equal opportunity

Equal opportunity

SQA Consulting Ltd aims to be an equal opportunities employer, to act fairly & to prevent unlawful direct or
indirect discrimination in any aspect of employment including hours & place of work, recruitment,
training, pay, benefits, promotion, discipline, & redundancy.
In developing the requirements for a job, either with regard to the duties & responsibilities or the person
specifications, only requirements that are necessary & justifiable for the effective performance of the job
will be included & which do not restrict applications from candidates as a result of their sex, age, ethnic
origin, marital status, disability, sexual orientation or religious beliefs.

All applicants for employment or promotion, will be considered on their merits & selected based on
objective criteria, related to the job. The Company will put in place reasonable adjustments within the
workplace for those applicants or employees who are disabled or become disabled whilst employed by
the Company.

Pricing

Price
£280 to £1,500 a person a day
Discount for educational organisations
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at patrick.chatee@sqa-consulting.com. Tell them what format you need. It will help if you say what assistive technology you use.