FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles which provide a 24/7 shift pattern cover for their customers. A generous shift allowance is paid on top of the basic salary, making up a very good reward package and path to DV Cleared status where applicable.
You will be required to already possess live, current SC Clearance due to the timescale we are looking to hire within. Therefore, if you are not eligible for, or do not already hold SC Clearance, this will not be the opportunity for you at this time. If you do have SC Cleared status, or higher, i.e. DV Clearance, then please do appreciate the opportunity can turn into an interview and offer for you very quickly.
The Tier 2 Cyber Security Analyst role will involve you being responsible for advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. As a Tier 2 Analyst you will works closely with senior and junior analysts to ensure a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions.
Responsibilities:
• Conducting escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions.
• Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents.
• Identifying and escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs).
• Investigating potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies that may indicate suspicious or malicious activity.
• Using OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats.
• Monitoring the threat landscape and documenting findings on evolving threat vectors, sharing relevant insights with internal Cyber teams to enhance overall situational awareness.
• Following established incident response playbooks, providing feedback for enhancements and suggesting updates to streamline internal Cyber processes and improving threat response times.
.• Coordinating with Tier 3 Analysts and management to refine detection and response workflows, contributing to continuous SOC maturity.
• Collaborating with Tier 3 Analysts on tuning SIEM and detection tools to reduce false positives and improve alert fidelity, submitting tuning requests and testing configurations when necessary.
• Identifying gaps in current detection content and working with Senior Analysts to develop and validate new detection rules and use cases tailored to the organization’s threat profile.
• Acting as a mentor to Tier 1 Analysts, offering guidance on triage and analysis techniques and facilitating on-the-job training to elevate their technical skills and operational efficiency
.• Assisting in training sessions and knowledge-sharing activities, providing feedback on areas for growth and contributing to a supportive learning environment within the SOC.
Knowledge and Skills required to be a Tier 2 Cyber Security Analyst:
• Understands advanced networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network.
• Advanced knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms.
• Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
• Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively.
• Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information.
• Able to communicate clearly and efficiently with team members and stakeholders, both internally and externally, under direction from senior analysts.
• Can communicate simple technical issues to non-technical individuals in a clear and understandable way.
• Able to create concise, structured reports that outline findings from preliminary investigations and daily monitoring.
• Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
• Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
• Shows initiative in learning new technologies and techniques.
• Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in IM.
Next Steps:
If you have SC Clearance, the associated skills for this role, and are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately. Interviews will be conducted ASAP with suitable candidates who meet all the criteria, with attractive packages offered to start ASAP.
We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process....Read more...
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles in Central Scotland providing a 24/7 shift pattern cover for their customers. A generous shift allowance is paid on top of the basic salary, making up a very good reward package and path to DV Cleared status where applicable. The roles require you to be on-site in Hampshire* on a 4 x 4 shift pattern, whereby you will work for four 12 hour shifts and then have four shifts off.
IMPORTANT: You will be required to have only British Citizenship (i.e. DUAL citizenship, or ILR status is not going to be eligible) AND already possess live, current SC or DV Clearance due to the timescale we are looking to hire within. Please only apply if you have SC or DV Cleared status.
The Tier 2 Cyber Security Analyst role will involve you advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. As a Tier 2 Analyst you will work to ensure a seamless SOC operation & act as a bridge between foundational & advanced threat detection & response functions.
Responsibilities:
• Conducting escalated triage & analysis on security events identified by Tier 1 Analysts, determining threat severity & advising on initial response actions.
• Applying expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, event correlation, & thorough documentation of security incidents.
• Identifying & escalating critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response & adherence to service Tier objectives (SLOs).
• Investigating potential security incidents by conducting deeper analysis on correlated events & identifying patterns or anomalies that may indicate suspicious or malicious activity.
• Using OSINT (Open-Source Intelligence) to enrich contextual data and enhance detection capabilities, contributing to a proactive stance on emerging threats.
• Monitoring the threat landscape & documenting findings on evolving threat vectors, sharing relevant insights with internal Cyber teams to enhance overall situational awareness.
• Following established incident response playbooks, providing feedback for enhancements & suggesting updates to streamline internal Cyber processes & improving threat response times.
.• Coordinating with Tier 3 Analysts & management to refine detection & response workflows, contributing to continuous SOC maturity.
• Collaborating with Tier 3 Analysts on tuning SIEM & detection tools to reduce false positives & improve alert fidelity, submitting tuning requests & testing configurations.
• Identifying gaps in current detection content & working with Senior Analysts to develop & validate new detection rules & use cases tailored to the organization’s threat profile.
• Acting as a mentor to Tier 1 Analysts, offering guidance on triage & analysis techniques & facilitating on-the-job training.
.• Assisting in training sessions and knowledge-sharing activities, contributing to a supportive learning environment within the SOC.
Knowledge and Skills required to be a Tier 2 Cyber Security Analyst:
• Understands advanced networking concepts, including IP addressing, basic network protocols, & how traffic flows within a network.
• Advanced knowledge of Windows & Linux operating environments, including standard commands, file systems, & user authentication mechanisms.
• Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
• Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search & filter logs effectively.
• Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats & gathering information.
• Able to communicate clearly & efficiently with team members and stakeholders, both internally & externally, under senior analysts' direction.
• Can communicate simple technical issues to non-technical individuals in a clear & understandable way.
• Able to create concise, structured reports that outline findings from preliminary investigations & daily monitoring.
• Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
• Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
• Shows initiative in learning new technologies and techniques.
• Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in IM.
Next Steps:
If you have live SC or DV Clearance, along with the associated skills for this role & are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately. Interviews will be conducted promptly with suitable candidates who meet all the stipulated essential Citizenship & Clearance criteria.
We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process....Read more...
CISSP Certified Cyber Security Consultant
A renowned Managed Security Service Provider (MSSP) committed to delivering top-tier cyber security solutions are looking for a CISSP certified security professional to join as a Cyber Security Consultant.
You’ll work collaboratively with their established 24/7 Security Operations team to develop and implement Cyber Security strategies for their broad range of clients in both Private and Public Sector markets.
Our team is composed of industry experts who are passionate about safeguarding digital assets and ensuring the highest levels of security for our clients.
As a CISSP Certified Cyber Security Consultant, you will play a crucial role in our organization. You will be responsible for:
Conducting comprehensive security assessments and audits.
Developing and implementing robust security strategies and policies.
Providing expert guidance on risk management and mitigation.
Collaborating with clients to understand their unique security needs and tailoring solutions accordingly.
Staying updated on the latest cyber threats and security technologies.
Requirements:
CISSP certification (mandatory).
Proven experience in either cyber security consulting, advising or engineering.
Strong knowledge of security frameworks, standards, and best practices.
Excellent problem-solving skills and the ability to think critically.
Effective communication and interpersonal skills.
Ability to work independently and as part of a team.
Why Apply?
This opportunity will provide a *significant* opportunity to progress your career. As well as involvement in the design and implementation of Cyber Security Strategy, you’ll gain considerable experience in Vulnerability Monitoring, Intrusion Detection, Incident Response (including assurance of Business Continuity), and Cyber Investigations. You’ll be learning from some of the best in the business and working with many household name brands in relation to all of the above.
Remote based.
Paying up to 60k + benefits
Must be eligible for SC Clearance. ....Read more...
Group Cyber Security Architect – City of LondonHybrid workingSalary £75,000 – 80,000 + Bonus Scheme A Cyber Security Architect is required for a leading client located in Central London. The client is seeking a professional to provide technical security advice and guidance with a comprehensive focus on the client's landscape. The successful candidate will be responsible for identifying digital threats through risk assessments and participating in hands-on evaluations of initiatives. Additionally, they will collaborate on various change projects and contribute to producing tailored security best practices for the broader business. The candidate will work closely with the business to provide security advice, requirements, and guidance during the delivery of new systems or updates to existing ones, ensuring that Security by Design is considered. They will participate in security-focused risk assessments to ensure compliance with acceptable risk tolerance levels. Furthermore, the role involves supporting the review of designs to ensure alignment with existing security principles, patterns, standards, and best practices. The candidate will assist in the documentation of core security patterns, standards, and guidelines and identify opportunities for improvement.Key skills and responsibilities,
Strong Cyber Security experience
Previous Azure knowledge
CISSP Certified
Knowledge of common frameworks such as NIST, CIS, ISO27k, and MITRE.
Experience with SABSA is beneficial.
Capability to review solution designs, identify security concerns, and recommend appropriate mitigations.
Identifying enhancements in security processes. Acting as the initial regional contact for security and escalating issues as necessary. Collaborating with the security architecture team to ensure a standardised approach is followed.
Supporting IT teams in implementing correct security controls and measures.
Ability to collaborate with vendors to understand security measures and make informed recommendations.
Experience in assisting the business with understanding the security implications of design decisions.
Experience in supporting the implementation of security requirements within the business.
Understanding of threat modelling frameworks, such as STRIDE
Interested? Submit your updated CV to Dean Sadler-Parkes at Crimson. Not interested? Refer a friend and earn £250 in vouchers! Crimson is acting as an employment agency for this vacancy.....Read more...
C Software Engineer – Defence Sector – Cambridge
A growing Defence and Security company, based in Cambridge, is currently seeking an experienced C Software Engineer to contribute to the development of breakthrough technologies that will enhance the UK’s security against external threats.
You will have the opportunity to work on cutting-edge systems architecture, ideally utilizing past firmware and embedded software tools. The projects you will be involved in will truly mind-blowing, challenging you on a daily basis.
It would also be ideally, though not essential, if you have previous knowledge and experience in Software-Defined Radio (SDR) and Real-Time Operating Systems (RTOS). There will also be a significant amount of algorithm development, so a strong mathematical background would be advantageous in this role.
The company has recently revamped cutting-edge labs, enabling development at the forefront of the sector. This means you will be working on brand-new developments using the latest technologies available.
Knowledge of other programming languages such as C++, MATLAB, or Python will also be required.
As this role involves working in the defence and security sectors, you will need to be able to obtain (or already hold) security clearance. If you have previous experience in the defence and security field and hold security clearance, this would be highly advantageous.
In addition to working within a growing company on some of the most fascinating projects, you will also be rewarded with an excellent starting salary (based on level of experience), bonuses, enhanced pensions, healthcare, gym membership, free lunches, and other excellent benefits you would expect from a larger organisation.
If you believe you are well-suited for this role, I suggest submitting an application now to avoid missing out on this career opportunity.
For more information, please feel free to call Andrew Welsh, Director of Medical Devices Recruitment and Scientific Recruitment Specialists Newton Colmore, on +44 121 268 2240, or submit an application, and one of our team members at Newton Colmore will contact you.
....Read more...
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for Cyber Security Analysts for roles which provide a 24/7 shift pattern cover for their customers.
You will be required to already possess live, current SC Clearance due to the timescale we are looking to hire within. Therefore, if you are not eligible for, or do not already hold SC Clearance, this will not be the opportunity for you at this time. If you do have SC Cleared status, or higher, i.e. DV Clearance, then please do appreciate the opportunity can turn into an interview and offer for you very quickly.
The Tier 1 Cyber Security Analyst role will involve working under the guidance of more senior analysts, so your foundational knowledge of Security Information and Event Management (SIEM) solutions, to support the security operations team will be put to very good use. We are looking to assess your proficiency in utilizing Kusto Query Language (KQL), for log analysis and gain experience using multiple ticketing systems to manage incidents effectively ensuring that we adhere to our service level objectives.
Responsibilities of a Tier 1 Cyber Security Analyst:
• Monitoring and reviewing security events across various SIEM platforms 24/7/365 to detect, triage, and responding to security incidents.
• Acting as the first line of response for security incidents by identifying, validating, and classifying potential threats, escalating to higher tiers when necessary.
• Performing preliminary analysis on alerts to determine false positives and escalate confirmed incidents based on pre-defined criteria.
• Creating and managing incident tickets in the system to track incident status and facilitate accurate handovers between shifts.
• Conducting and documenting formal handover / takeover procedures at the beginning and end of each shift to ensure continuity of operations.
• Liaising with Tier 2 and Tier 3 Analysts for complex investigations, continuity briefs, and updates on service status issues.
• Following and providing feedback on existing processes; identifying and suggesting improvements to streamline workflow efficiency.
• Following procedures to communicate and report incidents to appropriate team members and documenting incidents as per internal guidelines.
• Working closely with other team members, contributing to a cooperative environment while assisting in the completion of assigned tasks.
• Developing a foundational understanding of security event analysis from network traffic, host logs, and other data sources to support incident identification and escalation.
• Completing assigned tasks accurately and in a timely manner as directed by senior analysts or management.
• Engaging with available knowledge and training tools to maintaining and improving technical skills, enhancing the ability to support cyber security operations effectively.
Tier 1 Analyst Roles and Responsiblilties
• Once comprehensive training has been completed, the L1 Analyst will assume shift lead duties in the absence of an L2 Analyst. You will be responsible for security monitoring, completion of all assigned tasks and ensuring a thorough handover at the end of the shift.
Knowledge and Skills
• Understands and can explain foundational networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network.
• Basic knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms.
• Competence in using SIEM for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms.
• Able to demonstrate basic knowledge using Kusto Query Language (KQL) to search and filter logs effectively.
• Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information.
• Able to communicate clearly and efficiently with team members and stakeholders, both internally and externally, under direction from senior analysts.
• Can communicate simple technical issues to non-technical individuals in a clear and understandable way.
• Able to create concise, structured reports that outline findings from preliminary investigations and daily monitoring activities.
• Able to manage personal workload effectively to ensure timely completion of assigned tasks within the SOC.
• Willing to collaborate with team members, accepting guidance and learning from more experienced analysts.
• Shows initiative in learning new technologies and techniques, leveraging internal resources and training to grow professionally.
• Able to function efficiently during high-pressure situations, following procedures to ensure consistent performance in incident management.
Next Steps:
If you have SC Clearance, the associated skills for this role, and are committed to working on a rotating shift pattern (shift allowance is paid on top of the basic salary), then please apply immediately. Interviews will be conducted ASAP with suitable candidates who meet all the criteria, with attractive packages offered to start ASAP.
We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we can make to assist you in your application or with your recruitment process....Read more...
Microsoft System Engineer (M365 & Azure) - Lucerne, Switzerland
(Tech stack: Microsoft System Engineer, Windows Server, Active Directory, PowerShell, Group Policy, Microsoft Exchange, SQL Server, Azure (VMs, Blob Storage, Azure Functions, Azure SQL Database, Azure AD), M365 (SharePoint, Teams, OneDrive), Microsoft Intune, Endpoint Management, Power Platform (Power Apps, Power Automate), Windows Virtual Desktop, Networking (DNS, DHCP), Security (BitLocker, Azure Security Center), Backup Solutions (Veeam, Azure Site Recovery), Monitoring (Azure Monitor), Hybrid Cloud Architecture, Compliance Solutions, Microsoft System Engineer)
Join a forward-thinking Swiss engineering firm at the cutting edge of cybersecurity innovation. As a Microsoft System Engineer specializing in M365, Azure, and hybrid-cloud ecosystems, you’ll design and implement robust security solutions that safeguard critical infrastructures and data.
Work alongside a talented team, integrating advanced security protocols, threat detection, and response strategies to fortify systems against evolving cyber threats. Thrive in a culture of continuous learning and growth, while playing a key role in shaping the future of secure, digital infrastructure in Swiss engineering. Opportunities available for junior, intermediate, and senior professionals.
Our client is looking for passionate Microsoft System Engineer candidates with experience in some or all of the following (full training will be provided to fill any gaps in your skill set): (Tech stack: System Engineer, Windows Server, Active Directory, PowerShell, Group Policy, Microsoft Exchange, SQL Server, Azure (VMs, Blob Storage, Azure Functions, Azure SQL Database, Azure AD), M365 (SharePoint, Teams, OneDrive), Microsoft Intune, Power Platform (Power Apps, Power Automate), Windows Virtual Desktop, Networking (DNS, DHCP), Security (BitLocker, Azure Security Center), Backup Solutions (Veeam, Azure Site Recovery), Monitoring (Azure Monitor), Hybrid Cloud Architecture, Compliance Solutions, System Engineer).
All Microsoft System Engineer (M365 & Azure) Engineer positions come with the following benefits:
Shares in the company.
Pension scheme (8%).
3 hours ‘free time’ each week to investigate new technologies.
An annual training allowance of CHF 4,500.
27 days holiday (excluding Public Holidays) plus your birthday off.
Flexible working hours.
Location: Lucerne, Switzerland
Salary: CHF 80,000 - CHF 115,000 + Bonus + Pension + Benefits
To apply for this position please send your CV to Charlie Skipper at Noir.
Applicants must be based in Switzerland and have the right to work in Switzerland even though remote working is available.
NOIRSWITTZERLANDREC
NOIRSEUROPEREC
NOIREURNET
NC/CS/SYSTEM80115....Read more...
Manage & Enforce security policies for Windows & Mac using Microsoft Intune
1st line support for IT requests, troubleshooting issues across Windows & Mac environments
SharePoint sites, implementing scalable folder structures with permissions
Training:Why choose our Cyber Security Engineer Level 4 apprenticeship?
The Cyber Security Engineer apprentice can help to design, build and test secure networks, security products or systems to help protect your organisation against cyber threats. QA is a market leader in cyber security training, with a state-of-the-art immersive cyber gamified learning, giving apprentices a hands-on learning experience in simulating a real cyber threat.
QA's exclusive partnership with Circadence Corporation, the pioneer of the hands-on gamified learning platform Project Ares®, allows us to uniquely incorporate hands-on scenario training into our cybersecurity apprenticeships. The Project Ares platform offers a totally immersive experience, using automated features to support skills adoption with an in-game advisor, Athena, who advises our players through scenario-based challenges. The platform scenarios replicate the unpredictability and escalating levels of complexity that cyberattacks can present. It drives high levels of engagement through leaderboards and badges, elements used widely in the gaming world.
QA’s Cyber Security Engineer Level 4 apprenticeship programme enables the apprentice to:
Develop problem-solving and critical thinking skills in a safe, but realistic environment
Apply all of the acquired skills throughout the programme, with added scoring of players and opponent actions with replay for objective assessment
Take part in hands-on training and active-learning models that increase retention rates by 75% so that cyber apprentices can prepare for real-world challenges
Tools and technologies learned: Apprentices will learn to use Project Ares, Python, Microsoft Azure, Microsoft PowerShell, Linux and AWS.Training Outcome:A full-time role is guaranteed at the end of your apprenticeship with a full annual salary.Employer Description:At Believ, formerly known as Liberty Charge, we believe sustainable transport should be accessible to everyone. We’re a Charge Point Operator on a mission to create the UK’s most reliable electric vehicle charging network that doesn’t cost the earth and leaves no one behind.Working Hours :All details will be confirmed at interview.Skills: IT skills,Attention to detail,Organisation skills,Team working,Non judgemental....Read more...
The Cyber Security Technician (Apprentice) will support the information security department, focusing on safeguarding Miller’s computer networks and systems. They will be expected to learn and implement a variety of cyber defence strategies and digital security techniques. This entry-level role provides hands-on experience in cybersecurity operations, incident response, risk assessment, and compliance. The apprentice will develop technical skills and industry knowledge while contributing to the organisation’s security posture.
Your duties and responsibilities in this role will consist of:
Assisting in the installation and maintenance of cybersecurity software tools and solutions
Supporting the information security team in managing security vulnerabilities and threats
Assisting in the development and implementation of Miller's cybersecurity policies and procedures
Participating in the design of information and operational technology infrastructures
Working closely with the IT team to ensure the secure configuration and operation of computer systems
Participating in the response to cybersecurity incidents and helping implement corrective measures
Adhere to and meet fully the expectations of Miller, as set out in its policies and procedures, training material, and embedded in its systems and controls. Our policies and procedures are written to encapsulate the compliance, legal and financial crime related legislation and regulations which apply to Miller
Comply with any external rules and requirements imposed on individuals performing their role at Miller, such as Lloyd’s byelaws and FCA rules
Promote Miller brand and values to enhance Miller’s reputation in the market
Training Outcome:This role is a permanent role at Miller, and you will be supported throughout the apprenticeship and beyond.Employer Description:Miller is a leading specialist (re)insurance broking firm with a rich heritage of over 120 years. With our headquarters in London and a global reach spanning from Bermuda to Singapore, we are an international presence in the industry.
Our team of professionals harness their distinct expertise and knowledge to the benefit of our clients. It is our specialism, unparalleled service, and client-centric approach that sets us apart from the rest.
As a testament to our commitment to professional excellence and high ethical standards, Miller is proud to be a Chartered Insurance Broker, the industry's gold standard. This underscores our commitment to maintaining the highest professional standards in the industry.
For more information.Working Hours :Monday - Friday 9.30am - 5.30pm (with one hour for lunch).Skills: Communication skills,Organisation skills,Initiative,Written communication skills,Drive and enthusiasm,Willingness to learn,To go the extra mile,Team player,Hard working....Read more...
Providing first-line technical support to clients via phone, email, and on-site visits.
Assisting in maintaining, monitoring, and updating IT systems to ensure smooth and secure operations.
Helping with the installation and configuration of IT equipment and software.
Diagnosing and fixing technical problems, escalating complex issues when needed.
Maintaining accurate records of support requests and solutions in our ticketing system.
Ensuring every client interaction is positive and professional.
Taking part in training sessions and workshops to boost technical skills and knowledge.
Travelling to client sites across Merseyside to provide on-site support.
Training Outcome:Possible full-time position within the business and progression onto Level 4. Employer Description:PT Cyber Security Solutions is a Liverpool-based company dedicated to providing top-tier IT and cybersecurity services to businesses across Merseyside. They specialise in protecting companies from cyber threats while ensuring their IT systems run smoothly. If you're passionate about technology and want to be part of a team that values growth, innovation, and excellent customer service, this is the perfect opportunity for you.Working Hours :Monday to Friday, 37.5 hours per week. Times to be confirmed.Skills: Communication skills,IT skills,Attention to detail,Organisation skills,Customer care skills,Problem solving skills,Analytical skills,Logical,Team working....Read more...