Transformation Services
Advisory & Transformation, Agile Enablement, Architecture & Design Augmentation, Business Modelling, Change Management, CI/CD Pipeline, Cloud Migration, Demand Management, Devsecops Enablement, Legacy Technical Assessment, Process Cost Optimisation, Product Engineering, Release Management, Security Vulnerability Assessment, Tooling Migration & Integration, Training
Features
- Requirements Verification & Validation
- Functional Testing, Business Process Automation
- Integration Testing
- Performance, Stress and Volume Testing
- Security Testing
- Regression Testing
- User Acceptance Testing
- Operational Acceptance Testing
- Defect Management
- Production Defect Coordination
Benefits
- Save Time, Money rasing defects against design and not code
- Ensure application basics are compliant with requirements
- Ensure all integration points and applications are working properley
- Ensure solution scalability and response times
- Remove applicaiton vunrabilities and protect data as well as reputation
- Ensure all as is functionality is not impacted by change
- Ensure users are statified with the application release
- Ensure transition to operations teams
- Raise, categorise, prioritise, track and retest defects found in test
- Enable future fixes based on informed decisions
Pricing
£280 to £1,500 a person a day
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
3 8 7 2 2 0 1 0 1 4 1 9 2 5 4
Contact
SQA Consulting Limited
Patrick Chatee
Telephone: 01773525440
Email: patrick.chatee@sqa-consulting.com
Planning
- Planning service
- Yes
- How the planning service works
- We can support via the provision of highly skilled business analysts to help generate your solution requirements or we can ratify your requirements and provide confidence that your solution works as expected. We will provide complete coverage and tractability ensuring functional and integration correctness as well as scalability and vulnerability confidence. We provide Security Threat Modelling and XSite Scripting Solutions, Penetration and Vulnerability testing. We target Code, Libraries, Run Time Data Flow, Software Architecture, HPPT Traffic, Frameworks, Runtime Control Flow, Server Configuration, Backend Connections, Configuration Data, Platform Runtime etc.
- Planning service works with specific services
- No
Training
- Training service provided
- Yes
- How the training service works
-
We provide detailed training on all facets of our stated portfolio, our methodology follows the following approach, enabling self-sufficiency for our clients as part of the engagement journey:
Advise
We review & refine our client’s processes & tooling, recommending change & integration to benefit delivery through automation
Change
We run projects in collaboration with our clients to ensure that the recommended change delivers the anticipated business benefit
Train
We train our client’s to ensure that the benefits delivered through change projects are sustained
Support
We provide support to our clients to ensure they continue to reap ongoing benefits after project completion
Operate
We provide expertise to manage business processes & technologies on behalf of our clients - Training is tied to specific services
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
- We help buyers migrate to and between cloud services by validating their chosen solutions
- Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- Yes
- How the quality assurance and performance testing works
- All Quality Assurance services are based on requirements. We can help reverse engineer requirements if required. We provide full traceability and coverage. We are proficient in the latest tooling, traditional and digital specific. We can provide onsite and off premise solutions. Managed Services, Solution Based or Resource Augmentation. Are services include, Requirements Verification and Validation, Functional, Integration, Performance, Stress and Volume, User Acceptance, Compatibility, Accessibility and Operational Acceptance. We can deploy solutions using all testing methodologies, these include, V-Model, Waterfall, Agile, Business Driven and Testing Driven Development.
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security testing
- Security incident management
- Security audit services
- Certified security testers
- No
Ongoing support
- Ongoing support service
- Yes
- Types of service supported
- Hosting or software provided by a third-party organisation
- How the support service works
-
Our our methodology follows the following approach, ensuring support models are robust both with SQA support or handing over responsibility of support to the client:
Advise - we review & refine our client’s processes & tooling, recommending change & integration to benefit delivery through automation
Change - we run projects in collaboration with our clients to ensure that the recommended change delivers the anticipated business benefit
Train - we train our client’s to ensure that the benefits delivered through change projects are sustained Support We provide support to our clients to ensure they continue to reap ongoing benefits after project completion
Operate - we provide expertise to manage business processes & technologies on behalf of our clients
Service scope
- Service constraints
- There are no known constraints with our service offering, subject to agreeing cross party scope, budget and dependencies on a per client engagement basis
User support
- Email or online ticketing support
- No
- Phone support
- No
- Web chat support
- No
- Support levels
- Our support is performed on a consulting basis
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International
- ISO/IEC 27001 accreditation date
- 06/10/2021
- What the ISO/IEC 27001 doesn’t cover
- None
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Social Value
- Equal opportunity
-
Equal opportunity
SQA Consulting Ltd aims to be an equal opportunities employer, to act fairly & to prevent unlawful direct or
indirect discrimination in any aspect of employment including hours & place of work, recruitment,
training, pay, benefits, promotion, discipline, & redundancy.
In developing the requirements for a job, either with regard to the duties & responsibilities or the person
specifications, only requirements that are necessary & justifiable for the effective performance of the job
will be included & which do not restrict applications from candidates as a result of their sex, age, ethnic
origin, marital status, disability, sexual orientation or religious beliefs.
All applicants for employment or promotion, will be considered on their merits & selected based on
objective criteria, related to the job. The Company will put in place reasonable adjustments within the
workplace for those applicants or employees who are disabled or become disabled whilst employed by
the Company.
Pricing
- Price
- £280 to £1,500 a person a day
- Discount for educational organisations
- No