What you’ll be handling: First and second-line support across hardware, software, and systems Escalation and collaboration with 2nd/3rd line engineers when needed Diagnosing issues across Microsoft, Apple, and Linux-based devices Handling setups, leavers, account creation, and hardware returns Managing stock levels and keeping server rooms shipshape Supporting project work and occasional visits to nearby … offices Performing upgrades and repairs (think laptops, memory, disks) What we’re looking for: Essentials: 2+ years of commercial IT support experience (1st/2nd line) Solid troubleshooting across Microsoft, Apple & Linux Strong grasp of networking fundamentals (TCP/IP) Great communication and team-first attitude Full, clean UK driving licence Bonus Skills (not deal-breakers): Microsoft365More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Pontoon
appropriate security controls. What We're Looking For Strong background in cyber security, with 7+ years of relevant experience. In-depth knowledge of cloud platforms such as AWS and Microsoft Azure, as well as Microsoft Entra ID and M365. Familiarity with frameworks such as NIST CSF, Cyber Assessment Framework (CAF), and NCSC Cloud Security Principles. Proven ability to More ❯
and XDR. Within Threat Hunting, you will conduct daily hunting investigations using prewritten queries across a range of multi-tenant hunting platforms, including but not limited to M365D XDR, Microsoft Sentinel and Splunk. The Threat Intelligence team perform the collection, aggregation, analysis and contextualisation of healthcare and security information to produce actionable cyber threat intelligence. The Incident Management team … Cyber Security incidents and to triage and raise incidents to organisations and NHS staff Work as part of the Theat Hunting team to investigate multi-tenant threat hunting platforms - M365 XDR, Microsoft Sentinel and Splunk and review automated threat hunt queries Work as part of the Threat Intelligence team to collect, aggregate and contextualise healthcare security information to produce More ❯