Data Administrator

Preston
4 days ago
Create job alert

Your New Company:You will be working for a British multinational company specialising in aerospace, defence, and information security.

Your New Role:
As the Customer Liaison Representative, you will be the face of the Link Facility, ensuring that you provide outstanding service to all customers. Your responsibilities will include reviewing bookings via the Kiosk booking system, providing general knowledge of the services available, and offering feedback to the Team Leader. You will also support supervisors and play a key role in delivering high-quality customer service by meeting with customers, gaining feedback, and engaging in proactive dialogue. The role involves facilitating building visitors, managing seating plans, identifying defects, coordinating corrective actions, and maintaining high standards within the building.

Key Activities Include but Are Not Limited to:

Meet and greet customers.
User registration.
Manage the Booking System:
Source availability of rooms/desks for customers/groups.
Book desks/rooms for customers/groups.
Respond to the Link shared email inbox.
Send out confirmation emails for all bookings.
Request attendees for bookings when not added.
Manage no-show information on a daily basis.
Assist Link users with the Kiosk booking system (how to book).
What you'll need to succeed

To succeed, you will be an outgoing individual, with a plethora of customer service experience.
You will demonstrate the ability to contribute as a team member to achieve positive outcomes and provide quality service to customers.
Also, you'll inhabit organisational and time management skills, with the ability to manage competing priorities and meet tight deadlines.

PLEASE NOTE - You will be required to go through a BPSS clearance process, which includes completing a DBS. This can take a couple of weeks.

What you'll get in return

In return, you'll be working on a 6-month temporary contract with a very reputable organisation. You will be working 42 hours per week, on two rolling shift patterns:
Week 1: Monday - Thursday - 07:00 - 16:30, 30 minutes unpaid lunch and 2x 15 minutes paid breaks, Friday - 07:00 - 13:00, 15 minutes paid break
Week 2: Monday - Thursday - 07:30 - 17:30, 30 minutes unpaid lunch and 2x 15 minutes paid breaks, Friday - 07:30 - 11:30, 15 minutes paid break
There is an opportunity for this role to be extended past the 6-month contract, depending on the business needs and your performance.

What you need to do now

If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us now.
If this job isn't quite right for you, but you are looking for a new position, please contact us for a confidential discussion about your career.

Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)

Related Jobs

View all jobs

Data Subject Request Administrator

Recruitment Administrator

IT Security Administrator

Legal PA - Glasgow and Edinburgh

Senior Cyber Security Analyst

Strategic Executive Coordinator

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.