Commercial Analyst (Container shipping) – London - £40k - £44kWe have an exciting opportunity for a Commercial Analyst to join a global container shipping company based in LondonThe Commercial Analyst supports the commercial strategy of the business by maximizing revenue and profitability through effective yield analysis and data-driven decision-making. The position is centered around managing EUA surcharges and tariffs to ensure regulatory compliance, cost recovery, and alignment with global policies. The analyst works closely with multiple regional and global teams—including Trade, Sales, and Container Flow Management—to assess costs, manage inland haulage and third-party agent surcharges, and support the accurate evaluation of contribution margins. The role also contributes to the coordination of round voyage cargo movement and cargo portfolio strategies to improve yield performance.In addition to operational tasks, the analyst is responsible for developing, maintaining, and enhancing reporting tools—primarily using Tableau, Looker, and Eagle Plus—to provide actionable insights. They support regional performance measurement through KPIs and lead training efforts for business intelligence tools among end users. Strong analytical skills, business intelligence knowledge, and a deep understanding of the shipping industry are critical for success in this role. Located in the London RHQ, this role requires excellent communication and negotiation skills to bridge cross-functional and cross-regional discussions while ensuring the integration of data insights into strategic decision-making.To apply for this role or for more information please call Neil on +44 (0) 2392 314 686 or email neil@navis-consulting.com Navis Consulting; Keeping your career on course.
Navis is acting as an Employment Agency in relation to this vacancy.....Read more...
This organisation is building the future of company intelligence, delivering a next-generation AI software platform designed for instant, intuitive benchmarking and insights. They collaborate with leading experts across global consultancies, M&A advisory, and beyond, providing high-value competitor intelligence to support new business development and key client engagements. Their platform drives strategic benchmarking across critical areas like culture, leadership, technology, and customer operations. Job Overview The Company Intelligence Analyst role offers the chance to work at the intersection of software, AI, and company benchmarking. You’ll collaborate with intelligence analysts, data engineers, and technologists to deliver insightful benchmarking products and develop intelligence for a variety of industries. Here's What You'll Be Doing Producing high-quality company intelligence products tailored to diverse industries and use cases. Analysing commercial, technological, and operational benchmarks relevant to M&A, consultancy, and client sales. Handling confidential and sensitive client briefs, working independently and in a team. Processing data to uncover insights on companies’ people, activities, technologies, and investments. Writing succinct, technical commentary to interpret client deliverables. Using Python and advanced data tools to innovate intelligence concepts, including APIs, web scrapers, and robotic process automation. Here Are the Skills You'll Need Passion for data, statistics, company benchmarking, and AI. Strong interest in M&A, consultancy, and competitor intelligence. Excellent attention to detail and ability to learn quickly. Proficiency in Python, statistical analysis, and MS Excel. Degree-level qualification in finance, business, STEM, or related fields. Experience in areas like company benchmarking, data science, AI, or FP&A is advantageous. Knowledge of data pipelines and acquisition techniques, including APIs and automation, is a plus. Work Permissions You must have the right to work in the United Kingdom. Visa sponsorship is not available at this time. Here Are the Benefits of This Job Competitive salary starting at £35,000+ (depending on experience). Permanent full-time position with flexibility to work primarily from home. Pension scheme and annual leave allowance. Share options. Opportunity to work in a flat organisational structure alongside a passionate and diverse team, including direct collaboration with the founding team. Why This Role Is Exciting A career as a Company Intelligence Analyst opens doors to the innovative world of AI-driven benchmarking, where you can make a meaningful impact by transforming data into actionable insights. Whether you’re passionate about technology, M&A, or consultancy, this role offers a unique blend of challenge and opportunity in an inclusive, supportive, and startup-like atmosphere. Ready to step into the future of company intelligence? Apply today and be part of shaping what’s next.....Read more...
Cyber Security Analyst – Luton
Hybrid working available
£50,000 Salary
Cyber Security Analyst required for a leading client based in Luton. My client is currently seeking a Cyber Security Analyst to come on board to responsibility is to detect, investigate, and respond to cybersecurity events and incidents. Additional duties include managing business-as-usual security tasks, supporting cybersecurity projects, and assisting with regulatory compliance. This role involves working with a diverse range of security tools, providing the successful candidate with broad experience across all aspects of cybersecurity.
Key skills and responsibilities,
• Cyber Security Analyst experience • Strong knowledge and experience with Microsoft Windows operating systems.• Proficient in Active Directory, Group Policies, TCP/IP, DNS, DHCP, and Exchange Server.• Ability to effectively multitask, prioritize workload, and manage competing demands.• Experience in analyzing IT logs and event sources is preferred.• Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/ differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data storage systems, backup solutions, and restoration methods.• Understanding of security tools, their functions, and applications, including Anti-Malware, IPS, Web and Email Gateways, security analysis tools, web security tools, and next-generation firewalls/UTMs.• Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques.• Strong knowledge of cloud computing, network defence, identity management, incident management, and network security.• Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response.
Interested!?! Please send your up to date CV to Dean Sadler-Parkes at Crimson for immediate review
Not interested?! Do you know anyone that might be? Refer a friend for this role to earn £250 worth of vouchers. http://info.crimson.co.uk/referafriend
Crimson are acting as an employment business in regards to this vacancy.
Cyber Security Analyst – Luton
Hybrid working available
£50,000 Salary
Cyber Security Analyst required for a leading client based in Luton. My client is currently seeking a Cyber Security Analyst to come on board to responsibility is to detect, investigate, and respond to cybersecurity events and incidents. Additional duties include managing business-as-usual security tasks, supporting cybersecurity projects, and assisting with regulatory compliance. This role involves working with a diverse range of security tools, providing the successful candidate with broad experience across all aspects of cybersecurity.
Key skills and responsibilities,
• Cyber Security Analyst experience • Strong knowledge and experience with Microsoft Windows operating systems.• Proficient in Active Directory, Group Policies, TCP/IP, DNS, DHCP, and Exchange Server.• Ability to effectively multitask, prioritize workload, and manage competing demands.• Experience in analyzing IT logs and event sources is preferred.• Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/ differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data storage systems, backup solutions, and restoration methods.• Understanding of security tools, their functions, and applications, including Anti-Malware, IPS, Web and Email Gateways, security analysis tools, web security tools, and next-generation firewalls/UTMs.• Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques.• Strong knowledge of cloud computing, network defence, identity management, incident management, and network security.• Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response.
Interested!?! Please send your up to date CV to Dean Sadler-Parkes at Crimson for immediate review
Not interested?! Do you know anyone that might be? Refer a friend for this role to earn £250 worth of vouchers. http://info.crimson.co.uk/referafriend
Crimson are acting as an employment business in regards to this vacancy.....Read more...
Role Summary A unique internship opportunity for undergraduates with strong analytical abilities and interest in financial services, commencing June/July for 2-4 months. Company Profile The Opportunity Hub UK has partnered with an established financial services organisation based across Woking and London locations. Our client combines technological innovation with financial expertise to deliver market-leading solutions to their customers. Internship Overview This structured programme offers practical experience in business and financial analysis within a technology-driven environment. You'll work within cross-functional teams to analyse data, develop insights, and contribute to business decision-making processes. Main DutiesSupport the analysis of financial data using various analytical toolsAssist in creating reports and dashboards for business intelligenceHelp identify patterns and trends in complex datasetsCollaborate with technical and non-technical stakeholdersContribute to process improvement initiativesEssential RequirementsCurrent undergraduate in Finance, Business, Economics, Mathematics, Statistics, or related disciplinesStrong analytical capabilities and attention to detailProficiency in data analysis tools (SQL, Excel, Python beneficial but not required)Excellent numerical and statistical reasoningStrong communication skills to present findings to varied audiencesLegal Requirements All candidates must have the right to work in the UK. We cannot provide visa sponsorship for this position. Professional Development This position offers a competitive salary of £24,000-£25,000 (pro-rated). The intersection of business analysis and financial services represents one of the most dynamic and rewarding career paths available. This internship provides foundational experience for roles such as Financial Analyst, Business Intelligence Specialist, or Data Analyst within the financial services sector. The analytical skills developed are highly valued across industries.....Read more...
Key Responsibilities:
Support the day-to-day administration and maintenance of the Joblogic system
Maintain data accuracy and consistency within the system by regularly auditing records, identifying quality issues, and supporting data cleansing initiatives
Support the creation and distribution of operational and performance reports, working closely with various departments to gather and understand their data needs
Collaborate with operational teams to improve the quality and timeliness of data entry
Troubleshoot and escalate system issues with the relevant stakeholders or Joblogic support
Work with the data team to identify trends, inefficiencies, and opportunities for automation to improve efficiency
Assist in developing clear and accurate documentation, including user guides and best practices for Joblogic. Maintain records of procedures, findings, and data definitions to support system consistency and user understanding
Assist in gathering, organising, and analysing data from a variety of sources
Maintain and update dashboards and reports for internal teams
You will learn to use business intelligence tools and databases (e.g., Excel, Power BI, SQL).Training:QA's Data Analyst Level 4 apprenticeship develops the skills needed to collect, organise and study data to provide valuable business insight.
The principles of data analytics are being applied across just about every industry. Using past-event data, analysts are making important insight-based business decisions and driving customer value across every team and function, including operations, finance, sales and marketing.
At QA we have deep-rooted expertise in Data, Analytics and AI. Our solutions transform the way that individuals use data and enable organisations to make more data-driven business decisions.
QA's Data Analyst Level 4 apprenticeship programme enables your organisation to:
Build the skills and capabilities you need throughout your organisation to analyse, interrogate and present technical data, providing informed and valuable business insights to a range of stakeholders
Upskill or reskill your existing workforce with data skills and create analysts for the modern day workplace
Recruit and harness a new talent pathway: QA can help you cost-effectively recruit diverse, ambitious talent into your business and help you build a pipeline of data literacy talent
Delivered by industry experts with real-world experience, the programme’s content has been designed around real-life skills and includes the additional PL-300 Microsoft Power BI Data Analyst certification. The technical content aligns to and is relevant to employers and the market
Upon successful completion, learners will be awarded the Data Analyst Level 4 apprenticeship.Training Outcome:90% of QA apprentices secure permanent employment after completing their apprenticeship: this is 20% higher than the national average.
What we offer:
Full support towards your Data Analyst Level 3 or 4 apprenticeship
A collaborative, supportive team environment
Opportunity to gain hands-on experience with operational data systems
Long-term development opportunities within a growing business
Benefits:
Critical illness cover
Company sick pay and income protection
Company Health Insurance
Above statutory holidays allowance
Increased holiday allowance with service
Employee assistance programme
Work related training/memberships/subscriptions paid
Pay It Forward Monthly Bonus/Yearly review
Free parking
Pension
Death in Service
Employer Description:Commercial Maintenance Services UK Ltd (CMS) are a nationwide market leader in Facilities and Commercial Building Maintenance. Established in 2000, CMS have built a reputation for delivering trusted and specialist M&E Hard and Building Maintenance Services to clients across the UK.
With a team of over 190 employees operating 24/7, 365 days a year, CMS offers a range of integrated commercial maintenance services, including reactive and planned Gas, Heating, Plumbing, Air Conditioning, Electrical, Catering Equipment installation, repair and maintenance.Working Hours :All details will be confirmed at interview.Skills: Communication skills,Attention to detail,Organisation skills,Problem solving skills,Analytical skills,Team working,Non judgemental....Read more...
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles which provide a 24/7 shift pattern cover for their customers. A generous shift allowance is paid on top of the basic salary, making up a very good reward package and path to DV Cleared status where applicable.
You will be required to already possess live, current SC Clearance due to the timescale we are looking to hire within. Therefore, if you are not eligible for, or do not already hold SC Clearance, this will not be the opportunity for you at this time. If you do have SC Cleared status, or higher, i.e. DV Clearance, then please do appreciate the opportunity can turn into an interview and offer for you very quickly.
The Tier 2 Cyber Security Analyst role will involve you being responsible for advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. As a Tier 2 Analyst you will works closely with senior and junior analysts to ensure a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions.
Responsibilities:
• Conducting escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions.
• Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents.
• Identifying and escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs).
• Investigating potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity.
• Using OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats.
• Monitoring the threat landscape and documenting findings on evolving threat vectors, sharing relevant insights with internal Cyber teams to enhance overall situational awareness.
• Following established incident response playbooks, providing feedback for enhancements and suggesting updates to streamline internal Cyber processes and improving threat response times.
.• Coordinating with Tier 3 Analysts and management to refine detection and response workflows, contributing to continuous SOC maturity.
• Collaborating with Tier 3 Analysts on tuning SIEM and detection tools to reduce false positives and improve alert fidelity, submitting tuning requests and testing configurations when necessary.
• Identifying gaps in current detection content and working with Senior Analysts to develop and validate new detection rules and use cases tailored to the organization’s threat profile.
• Acting as a mentor to Tier 1 Analysts, offering guidance on triage and analysis techniques and facilitating on-the-job training to elevate their technical skills and operational efficiency
.• Assisting in training sessions and knowledge-sharing activities, providing feedback on areas for growth and contributing to a supportive learning environment within the SOC.
Knowledge and Skills required to be a Tier 2 Cyber Security Analyst:
• Understands advanced networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network.
• Advanced knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms.
• Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
• Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively.
• Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information.
• Able to communicate clearly and efficiently with team members and stakeholders, both internally and externally, under direction from senior analysts.
• Can communicate simple technical issues to non-technical individuals in a clear and understandable way.
• Able to create concise, structured reports that outline findings from preliminary investigations and daily monitoring.
• Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
• Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
• Shows initiative in learning new technologies and techniques.
• Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in IM.
Next Steps:
If you have SC Clearance, the associated skills for this role, and are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately. Interviews will be conducted ASAP with suitable candidates who meet all the criteria, with attractive packages offered to start ASAP.
We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process....Read more...
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles in Central Scotland providing a 24/7 shift pattern cover for their customers. A generous shift allowance is paid on top of the basic salary, making up a very good reward package and path to DV Cleared status where applicable. The roles require you to be on-site in Hampshire* on a 4 x 4 shift pattern, whereby you will work for four 12 hour shifts and then have four shifts off.
IMPORTANT: You will be required to have only British Citizenship (i.e. DUAL citizenship, or ILR status is not going to be eligible) AND already possess live, current SC or DV Clearance due to the timescale we are looking to hire within. Please only apply if you have SC or DV Cleared status.
The Tier 2 Cyber Security Analyst role will involve you advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. As a Tier 2 Analyst you will work to ensure a seamless SOC operation & act as a bridge between foundational & advanced threat detection & response functions.
Responsibilities:
• Conducting escalated triage & analysis on security events identified by Tier 1 Analysts, determining threat severity & advising on initial response actions.
• Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, & thorough documentation of security incidents.
• Identifying & escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response & adherence to service Tier objectives (SLOs).
• Investigating potential security incidents by conducting deeper analysis on correlated events & identifying patterns or anomalies that may indicate suspicious or malicious activity.
• Using OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats.
• Monitoring the threat landscape & documenting findings on evolving threat vectors, sharing relevant insights with internal Cyber teams to enhance overall situational awareness.
• Following established incident response playbooks, providing feedback for enhancements & suggesting updates to streamline internal Cyber processes & improving threat response times.
.• Coordinating with Tier 3 Analysts & management to refine detection & response workflows, contributing to continuous SOC maturity.
• Collaborating with Tier 3 Analysts on tuning SIEM & detection tools to reduce false positives & improve alert fidelity, submitting tuning requests & testing configurations.
• Identifying gaps in current detection content & working with Senior Analysts to develop & validate new detection rules & use cases tailored to the organization’s threat profile.
• Acting as a mentor to Tier 1 Analysts, offering guidance on triage & analysis techniques & facilitating on-the-job training.
.• Assisting in training sessions and knowledge-sharing activities, contributing to a supportive learning environment within the SOC.
Knowledge and Skills required to be a Tier 2 Cyber Security Analyst:
• Understands advanced networking concepts, including IP addressing, basic network protocols, & how traffic flows within a network.
• Advanced knowledge of Windows & Linux operating environments, including standard commands, file systems, & user authentication mechanisms.
• Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
• Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search & filter logs effectively.
• Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats & gathering information.
• Able to communicate clearly & efficiently with team members and stakeholders, both internally & externally, under senior analysts' direction.
• Can communicate simple technical issues to non-technical individuals in a clear & understandable way.
• Able to create concise, structured reports that outline findings from preliminary investigations & daily monitoring.
• Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
• Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
• Shows initiative in learning new technologies and techniques.
• Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in IM.
Next Steps:
If you have live SC or DV Clearance, along with the associated skills for this role & are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately. Interviews will be conducted promptly with suitable candidates who meet all the stipulated essential Citizenship & Clearance criteria.
We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process....Read more...
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles which provide a 24/7 shift pattern cover for their customers.
You will be required to already possess live, current SC Clearance due to the timescale we are looking to hire within. Therefore, if you are not eligible for, or do not already hold SC Clearance, this will not be the opportunity for you at this time. If you do have SC Cleared status, or higher, i.e. DV Clearance, then please do appreciate the opportunity can turn into an interview and offer for you very quickly.
The Tier 1 Cyber Security Analyst role will involve working under the guidance of more senior analysts, so your foundational knowledge of Security Information and Event Management (SIEM) solutions, to support the security operations team will be put to very good use. We are looking to assess your proficiency in utilizing Kusto Query Language (KQL), for log analysis and gain experience using multiple ticketing systems to manage incidents effectively ensuring that we adhere to our service level objectives.
Responsibilities of a Tier 1 Cyber Security Analyst:
• Monitoring and reviewing security events across various SIEM platforms 24/7/365 to detect, triage, and responding to security incidents.
• Acting as the first line of response for security incidents by identifying, validating, and classifying potential threats, escalating to higher tiers when necessary.
• Performing preliminary analysis on alerts to determine false positives and escalate confirmed incidents based on pre-defined criteria.
• Creating and managing incident tickets in the system to track incident status and facilitate accurate handovers between shifts.
• Conducting and documenting formal handover / takeover procedures at the beginning and end of each shift to ensure continuity of operations.
• Liaising with Tier 2 and Tier 3 Analysts for complex investigations, continuity briefs, and updates on service status issues.
• Following and providing feedback on existing processes; identifying and suggesting improvements to streamline workflow efficiency.
• Following procedures to communicate and report incidents to appropriate team members and documenting incidents as per internal guidelines.
• Working closely with other team members, contributing to a cooperative environment while assisting in the completion of assigned tasks.
• Developing a foundational understanding of security event analysis from network traffic, host logs, and other data sources to support incident identification and escalation.
• Completing assigned tasks accurately and in a timely manner as directed by senior analysts or management.
• Engaging with available knowledge and training tools to maintaining and improving technical skills, enhancing the ability to support cyber security operations effectively.
Tier 1 Analyst Roles and Responsiblilties
• Once comprehensive training has been completed, the L1 Analyst will assume shift lead duties in the absence of an L2 Analyst. You will be responsible for security monitoring, completion of all assigned tasks and ensuring a thorough handover at the end of the shift.
Knowledge and Skills
• Understands and can explain foundational networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network.
• Basic knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms.
• Competence in using SIEM for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
• Able to demonstrate basic knowledge using Kusto Query Language (KQL) to search and filter logs effectively.
• Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information.
• Able to communicate clearly and efficiently with team members and stakeholders, both internally and externally, under direction from senior analysts.
• Can communicate simple technical issues to non-technical individuals in a clear and understandable way.
• Able to create concise, structured reports that outline findings from preliminary investigations and daily monitoring activities.
• Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
• Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
• Shows initiative in learning new technologies and techniques, leveraging internal resources and training to grow professionally.
• Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in incident management.
Next Steps:
If you have SC Clearance, the associated skills for this role, and are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately. Interviews will be conducted ASAP with suitable candidates who meet all the criteria, with attractive packages offered to start ASAP.
We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process....Read more...
This role involves working closely with various stakeholders to understand business needs, collect, analyse data, and prepare reports that present progress and outcomes towards our organisational goals and strategic plans.
You will maintain data integrity, ensure regulatory compliance, and support the Trust’s commitment to providing high-quality education and support services.
By nature of the responsibility, the following list is not exhaustive but is a guideline as to the main requirements of the role. The Apprentice Data Officer must be willing, flexible and prepared to carry out reasonable tasks not necessarily covered within this job description.
General Duties
To assist in collecting, cleaning, and organising data from various sources, ensuring its accuracy and completeness.
To use statistical tools and software to analyse data and identify trends and patterns.
To support the development and maintenance of databases and data systems.
To conduct preliminary data analysis and generate reports.
To create visualisations such as dashboards and graphs to present data insights for multiple departments and stakeholders.
To collaborate with the AI, Business and Data Analyst, the wider Quality, Business Change and Innovation Team and the services leads to understand data needs and provide solutions.
Support the AI, Business and Data Analyst to collaborate with both internal and external professionals to gather insights and understand the objectives and scope of AI and data management.
To ensure data integrity and accuracy complies with the guidelines of General Data Protection (GDPR) and other legislative regulations and standards.
To assist in the implementation of data governance policies and procedures.
To stay up to date with industry trends and best practices in data management.
To utilise the advancements of Artificial Intelligence (AI) to underpin data collection, management and reporting.
Individual Learner Records (ILR) Data Management:
Support the AI, Business and Data Analyst and appropriate service leads to ensure the collection, maintenance, and analysis of ILR data throughout the academic year, ensuring accurate tracking of student progress and compliance with educational standards.
Management Information Systems (MIS):
Work collaboratively with the AI, Business Data Analyst and IT Technical team to utilise Trust wide MIS, identifying support and training needs, identifying and troubleshooting issues, and ensuring the effective use of the system to meet the Trusts data management needs.
Safeguarding
All staff have a responsibility and duty of care to safeguard and promote the welfare of pupils. Staff must be aware of the systems within the trust which support safeguarding and must act in accordance with the trusts safeguarding & child protection policy and code of conduct. All staff must complete mandatory safeguarding training.
Training
The Apprentice Data Officer may, from time to time, be required to undertake training relevant to the key objectives and responsibilities of the Trust. There are mandatory training requirements that must be completed via Educare.
Working Relationships
The Apprentice Data Officer has a day-to-day working relationship with all departments and is required to cooperate fully with all members of staff and senior managers. A strong customer service focus is essential.
The Apprentice Data Officer will be a creative and dynamic individual who is detail-orientated and a confident communicator. You will have a flair for creating solutions-based systems that enable data to be readily available, accurate and accessible. Training:Expected duration: 18 months .
Apprenticeship level: Level 3 (Advanced).
Programme: Data Technician.
During this apprenticeship, you will follow a fully supported training programme with LearnTech, delivered through combined weekly remote classroom-based training, workplace assessment/training and online learning working towards completing the L3 Data Technician standard.
The training covers the following core occupational duties: https://www.instituteforapprenticeships.org/apprenticeship-standards/data-technician-v1-0 Training Outcome:During this apprenticeship, you will follow a fully supported training programme with LearnTech, delivered through combined classroom-based training, workplace assessment/training and online learning, at the end of which you will have the ability to work as a qualified Data Technician.Employer Description:It's our mission to provide outstanding specialist education and care services for people who are deaf or have other communication difficulties and learning disabilities.Working Hours :The post is full-time.
Working hours are between 8.00am and 4.30pm, Monday to Friday, 37 hours in total.
Weekend work and work outside of normal hours would be by prior arrangement and will attract time off in lieu or overtime payment.Skills: Communication skills,IT skills,Attention to detail,Organisation skills,Team working,Creative,Basic understanding of data,Microsoft Excel,Familiarity with SQL,Willingness to learn,Familiarity with PowerBI,Familiarity with Databridge....Read more...