Fareham, Hampshire, England, United Kingdom Hybrid / WFH Options
Matchtech
Key Responsibilities Infrastructure Support & Maintenance Manage and maintain servers, network devices, and storage systems. Support and monitor virtual environments (VMware/Hyper-V). Perform system updates, backups, and patchmanagement to ensure security and reliability. Assist with infrastructure scalability and capacity planning. 2nd Line Technical Support Deliver responsive 2nd line support for desktop, hardware, software, and network More ❯
client satisfaction, and continuous improvement across service delivery functions. Key Responsibilities: Lead and manage the IT service delivery team to meet SLAs and KPIs. Oversee incident, problem, and change management processes. Act as the primary point of contact for client escalations and service reviews. Collaborate with technical teams to ensure seamless service transitions and implementations. Monitor performance metrics and … Required Skills & Experience: Proven experience in IT service delivery or operations management. Strong understanding of technical support on a 1st or 2nd line knowledge base. Excellent communication and stakeholder management skills. Experience with PSA ticketing systems (Halo). Ability to lead cross-functional teams and manage competing priorities. Familiarity with cybersecurity and patchmanagement practices is a More ❯
Farnborough, Hampshire, United Kingdom Hybrid / WFH Options
Leidos
will be responsible for planning and implementing appropriate security controls to ensure that the information within is kept secure. Key functions/outputs: Vulnerability Scanning & Reporting Endpoint Security Incident Management & Tickets System Hardening Change Work Participation in Regular Meetings Documentation Vulnerability Scanning & Reporting Code Scans: perform regular code scans to audit code quality metrics, potential bugs, and security vulnerabilities. … Vulnerability Management Tooling: perform regular Vulnerability Management Scans and ensure that the warehouse and plugins are kept up to date to capture new vulnerabilities. Reporting: assist the Vulnerability and Patch Manager with generating regular vulnerability management reports, which are to be provided to the cyber security and IA lead. Endpoint Security: Endpoint Protection: perform regular updates … and threats are being blocked. Access Control: ensuring that access controls have been implemented correctly to only allow authorised users to gain access to certain data and systems. Incident Management & Tickets: Incident Identification: help to recognise and confirm potential incidents through alerts, logs and user reports. This includes distinguishing between true threats and false positives. Incident Response: respond to More ❯