Procurement technical and business support
RJD is privately owned and is independent of any systems integrators or product/service providers
We provide specialist services in the Cyber and Resilience domain through our:
RJD has a culture of client first that permeates our business relationships. We place great emphasis on behaviours that enhance client relationships beyond that of a legal contract. We ensure that we enhance our clients’ business by delivering our solutions while remaining in the background unless they call us forward. This engenders a more effective engagement and trust relationship with our clients.
As a business we have the agility to respond quickly and seamlessly to needs, short notice demands or changing circumstances. Our can do attitude is particularly evident in our delivery of demanding projects where we will adjust course as required to ensure the right outcomes are achieved. This is vital behaviour in our sector as situations and requirements can, and do, change rapidly. We actively avoid the delivery of shelf-ware. Our ethos is to drive system and capability improvements and sustainable through life cost reduction.
RJD Technology Limited is registered in the UK with Companies House. Registered Office: 8 The Green, Rowlands Castle, Hants, PO9 6BN, UK
As a business we continue to grow and have an ongoing need for talented Consultants who can contribute to and lead growth. You must have the flexibility to work on a number of projects simultaneously and have a sound understanding of complex systems.
If you are interested in RJD Technology please view our vacancies or contact us to discuss other possible opportunities. If none of the current vacancies match your skills but you feel that your broad consultancy skills would fit with RJD, please contact us.
RJD is undertaking an increasing volume of system engineering analysis tasks. These are based upon use of Sparx’s Enterprise Architect tool, augmented by RJD’s proprietary tools and processes. The core element of the work is to build EA models of the people, process and systems that are used to deliver business outcomes. This work is then used to perform vulnerability analyses using a variety of threat cases.