Bury, Greater Manchester, United Kingdom Hybrid / WFH Options
The Sustainable Partnership
major incidents or repeated failures. Maintain and develop technical documentation, fault-finding guides, and repair procedures. Liaise with inverter and equipment manufacturers for escalated technical support cases, RMAs, and firmware updates. Collaborate with the field teams to identify common failure modes and propose mitigation strategies. Assist with commissioning and performance validation for new sites or retrofit works. Site attendance for More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
The Sustainable Partnership
major incidents or repeated failures. Maintain and develop technical documentation, fault-finding guides, and repair procedures. Liaise with inverter and equipment manufacturers for escalated technical support cases, RMAs, and firmware updates. Collaborate with the field teams to identify common failure modes and propose mitigation strategies. Assist with commissioning and performance validation for new sites or retrofit works. Site attendance for More ❯
Server Platforms. Microsoft Exchange Online + Server experience. Office 365 experience (SharePoint, Teams, Onedrive etc). PC/Server Hardware experience - ability to diagnose and upgrade, both hardware and firmware on PC's - understanding of Raid configurations, iLO, on servers. AD + AAD - configure new users, new OU's, configure sites and services, resolve. DNS - running through the Active Directory More ❯
Central London / West End, London, United Kingdom Hybrid / WFH Options
The Sustainable Partnership
major incidents or repeated failures. Maintain and develop technical documentation, fault-finding guides, and repair procedures. Liaise with inverter and equipment manufacturers for escalated technical support cases, RMAs, and firmware updates. Collaborate with the field teams to identify common failure modes and propose mitigation strategies. Assist with commissioning and performance validation for new sites or retrofit works. Site attendance for More ❯
Ashton-Under-Lyne, Greater Manchester, United Kingdom Hybrid / WFH Options
The Sustainable Partnership
major incidents or repeated failures. Maintain and develop technical documentation, fault-finding guides, and repair procedures. Liaise with inverter and equipment manufacturers for escalated technical support cases, RMAs, and firmware updates. Collaborate with the field teams to identify common failure modes and propose mitigation strategies. Assist with commissioning and performance validation for new sites or retrofit works. Site attendance for More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
right designs. Generate manufacturing files (Gerbers/ODB , pick-and-place, BOMs) with clear build notes, and document design decisions, test results, and revision history. Collaborate closely with electronics, firmware, mechanical, and manufacturing teams to define requirements, review designs, and integrate PCBs into complete products. Bonus: Oversee fabrication and assembly vendors, develop test plans, bring up prototypes, and debug issues More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯