S1SEVEN

S1SEVEN

Simplify Compliance with Digital Material Passports (DMP) The Go-to Solution for Tamper-Evident Origin, Quality and Environmental Footprint — seamlessly integrated into existing Business Software.
Berlin, DE

Description

The Digital Material Passport (DMP) enables global supply chains to establish material trust by serving as a verifiable record of compliance with regulatory, technical, and environmental criteria. It provides a structured, open-source JSON format to consolidate material data, which is embedded in a PDF for seamless integration into existing workflows without needing OCR or manual entry. A key feature is its blockchain-backed, tamper-evident design, which verifies authenticity and integrity, creating a tamper-proof audit trail. The DMP solution covers quality assurance, supply chain compliance, and carbon accounting, enabling secure data exchange and automated compliance without direct supplier-customer technical alignment. It is designed to help companies stay ahead of regulations like CBAM, EUDR, and CPR, and serves as a foundation for Digital Product Passports (DPPs) to support the circular economy.

Technology & Skills

Uncover the hard and soft skills and tools employed by the organization, and gain insight into the technologies that drive their success
PYTHON
DATA ANALYSIS
PROTOTYPING
FINANCIAL CRIME
ANOMALY DETECTION
RISK
MODELING
CAUSAL INFERENCE
MODEL DEPLOYMENT
SPARK
R
CLIENT COMMUNICATION
DEVICE INTELLIGENCE
FRAUD
BEHAVIORAL BIOMETRICS
MACHINE LEARNING
SQL
GRAPH ANALYTICS
BI
TABLEAU
DASHBOARDING
COHORT ANALYSIS
EDA
DATA PIPELINE
SIGMA
METABASE
SAAS
NEGOTIATION
PIPELINE
DIGITAL-IDENTITY
NETWORKING
CONSULTATIVE SELLING
DISCOVERY
DIGITAL TRANSFORMATION
PRESENTATIONS
AML
FRAUD PREVENTION
CONTRACTING
SOLUTIONS ENGINEERING
BEHAVIOR BIOMETRICS
SALES CYCLE MANAGEMENT
ROADMAP
FRAUD DETECTION
STAKEHOLDER MANAGEMENT
REQUIREMENTS
DEVICE IDENTIFICATION
NODE.JS
TROUBLESHOOTING
MOBILE
ANDROID
AUTOMATION
TEST CASE
BUG TRACKING
TEST PLAN
PLAYWRIGHT
APPIUM
XCTEST
RECRUITING
SOURCING
INTERVIEWING
ATS
INTERNATIONAL RECRUITING
CANDIDATE EXPERIENCE
ENGINEERING
TALENT STRATEGY
B2B SAAS
OFFER
SCREENING
KUBERNETES
DOCKER
PERFORMANCE
SECURITY
CLOUD
LLM
PRIVACY
OBSERVABILITY
GO
RELATIONAL DATABASE
DATA PROCESSING
SCIKIT-LEARN
PYTORCH
PANDAS
NUMPY
FEATURE ENGINEERING
PROBABILISTIC MODELING
BROWSER API
MONITORING
COMPLIANCE
CI/CD
NOSQL
FEATURE PIPELINE
BEHAVIORAL DATA
TYPESCRIPT
REACT
API
NODE
FINTECH
TERRAFORM
POSTGRES
JAVA
PRODUCTION
BIGQUERY
DATA ENGINEERING
DATAFLOW
APACHE BEAM
BIGTABLE
RUBY
BACKEND
ENGLISH
POSTGRESQL
TRACING
PROMETHEUS
GRAFANA
DATADOG
ON-CALL
HELM
QUERY OPTIMIZATION
ELASTICSEARCH
ARGOCD
INTEGRATION
PROJECT MANAGEMENT
PRESENTATION
PAYMENTS
KYC
RISK MANAGEMENT
CUSTOMER SUCCESS
ACCOUNT MANAGEMENT
DATA SCIENCE
SOLUTION ARCHITECTURE
BUSINESS INTELLIGENCE
SOLUTIONS ARCHITECTURE
RISK ANALYTICS
ANALYTICS
KPI
GPU
EXPERIMENTATION
ETL
DATA WAREHOUSING
DATA PIPELINES
KUBEFLOW
BACKEND DEVELOPMENT
ML OBSERVABILITY
SDK
IMPLEMENTATION
BASH
CLIENT SUPPORT
OPENAPI
GOLANG
TECHNICAL COMMUNICATION
POSTMAN
JSON
WEB DEVELOPMENT
REQUIREMENTS ANALYSIS
ONBOARDING
COMMUNICATION
B2B
PIPELINE MANAGEMENT
PLANNING
SALES STRATEGY
ENTERPRISE SALES
DOCUMENTATION
SCRIPTING
INCIDENT RESPONSE
GCP
THREAT MODELING
CODE REVIEW
PENETRATION TESTING
SECURE CODING
VULNERABILITY ASSESSMENT
WEB APPLICATION
APPLICATION SECURITY
SAST
DAST
SCA
SDLC
IAST
VULNERABILITY TRIAGE
MOBILE APPLICATION
JAVASCRIPT
AWS
SECURITY ARCHITECTURE
VULNERABILITY MANAGEMENT
SIEM
FORENSICS
AUDIT
LOGGING
CONFIGURATION MANAGEMENT
TCP/IP
NETWORK SECURITY
POWERSHELL
EDR
AUDIT LOGGING
PCI DSS
NESSUS
OPENVAS
SECURE CONFIGURATION
QUALYS
ANALYSIS
INTEGRATIONS
PRODUCT
AI
DASHBOARD
A/B TESTING
PROOF OF CONCEPT
PRICING
KAFKA
EXPERIMENT DESIGN
VECTOR DATABASE
TRANSACTIONS
FLINK
FEAST
POC
REAL-TIME PROCESSING
QUANTITATIVE ANALYSIS
FEATURE STORE
REAL-TIME DECISIONING
POV
BANDIT MODEL
STORYTELLING
MENTORSHIP
FRAUD ANALYTICS
REAL-TIME DECISION SYSTEMS
BANDIT ALGORITHMS
WIRE
PRODUCT MANAGEMENT
ARCHITECTURE
PAYMENT
BANKING
CORE BANKING
SYSTEM ARCHITECTURE
ACH
ACCOUNT OPENING
WIRE TRANSFER
RTP
PILOT
API MAPPING
CERTIFICATION
BANK CORE
ARTIFACT SIGNING
INFRASTRUCTURE AS CODE
CLOUD SECURITY
VAULT
IAC
SECRETS MANAGEMENT
SBOM
OPENTELEMETRY
SECRET MANAGEMENT
SNYK
TRIVY
KMS
SOAR
OPENTOFU
POLICY AS CODE
CONTAINER SCANNING
OPA
REGO
CHECKOV
PARTNER MANAGEMENT
RISK ANALYSIS
IDENTITY VERIFICATION
SCORING
3DS
VENDOR INTEGRATION
ATO
CARD FRAUD
BANK FRAUD
TRUST & SAFETY
AZURE
CYBERSECURITY
GOOGLE CLOUD
PROBABILISTIC MATCHING
NON-RELATIONAL DATABASE
STATISTICS
RISK MODELING
FORECASTING
PARTNERSHIP
REVENUE
SNOWFLAKE
ENABLEMENT
DATABRICKS
SYSTEM INTEGRATOR
CO-SELLING
GO-TO-MARKET
GTM
EXECUTIVE RELATIONS
FRONTEND
FIGMA
UI
UX
PRODUCT DESIGN
DESIGN SYSTEM
HTML
CSS
USER-CENTERED DESIGN
COMPONENTS
AUTO-LAYOUT
RESEARCH
USER RESEARCH
DATA VISUALIZATION
FRONT-END
VARIANTS
TESTING
PROBLEM-SOLVING
SECURITY TESTING
WEB
EXPLORATORY TESTING
API TESTING
MOBILE TESTING
BUG REPORTING
BURP SUITE
WEBDRIVERIO
CRASHLYTICS
WEB TESTING
TESTMO
CHARLES PROXY
ADB
XCODE
XCUITEST
TEST MANAGEMENT
TRANSACTION MONITORING
REGULATORY REPORTING
CASE MANAGEMENT
STRATEGY
PARTNERSHIPS
HYPERSCALER