providing contracted IT support to ensure that the client s staff are able to do their job in support of their organisation's commercial goals i.e., access, shared resources, configuration, software installations, intranet and internet access, document management, hardware break fix and smart hands. To act upon Incidents and Service Requests assigned to you and your team in … the ITSM toolset or equivalent ticketing system. To own end to end Incident and queue management, including 3rd party ticket management as well as requests for additional services hardware/software, system access, configuration, desk moves and setup, and support where IT presence is required. To engage escalation policies and procedures in order to ensure adherence to … To provide technical troubleshooting under the guidance of 3rd line resolver groups for technologies such as Infrastructure devices, Network devices, and Communication Services To be responsible for hardware asset management, stock control and regular audits, including the allocation of new starter equipment and updating ConfigurationManagement Database. Collecting leaver equipment and updating ConfigurationManagement Database More ❯
autonomy to make technical decisions and help shape how platform engineering is done as the team continues to scale. Tech stack AWS (Core services - EC2, RDS, S3, IAM, etc.) ConfigurationManagement Ansible Monitoring and Observability Grafana, Prometheus Kubernetes (building and managing production clusters) Terraform (IaC provisioning) Python or Java (scripting, automation) GitHub Actions (CI/CD pipelines) What More ❯
autonomy to make technical decisions and help shape how platform engineering is done as the team continues to scale. Tech stack AWS (Core services - EC2, RDS, S3, IAM, etc.) ConfigurationManagement Ansible Monitoring and Observability Grafana, Prometheus Kubernetes (building and managing production clusters) Terraform (IaC provisioning) GitHub Actions (CI/CD pipelines) What They’re Looking For Experience More ❯
technical teams. Monitoring and analysing alerts and logs from LogRhythm, CyberArk, Semperis and other security tools, but experience with other cyber tools would also suffice. Participating in the change management process to ensure proposed changes are reviewed for security risk. Contributing to penetration testing planning, coordination and tracking of remediation. Maintaining risk logs and status dashboards for security findings … Hands-on experience with tools such as LogRhythm, Semperis. Experience administrating PAM solutions, such as CyberArk. Understanding of NCSC cyber security principles and good practice. Familiarity with change and configurationmanagement from a cyber perspective. Working knowledge of ISO 27001 or NIST standards. Relevant certifications (e.g., Security+, CySA+, CISMP) are desirable. If you are interested, please apply at More ❯