Global IT End-User Support Specialist

Sowerby Bridge
1 month ago
Applications closed

Related Jobs

View all jobs

Siemens NX Architect

AOCS/GNC Engineer

Senior Software Developer - 5G Core

Senior Network & Security Engineer

Senior Network & Security Engineer

Senior Network & Security Engineer

Internal Job Title: Global IT End-User Support Specialist

Business: Lucy Zodion Ltd

Location: Sowerby Bridge

Job Reference No: 3932

Job Purpose: 

The IT End-User Support Specialist is responsible for the day-to-day operational delivery of on-site IT End-User Services across all Lucy companies. The role will prioritize the delivery of End User Computing (EUC) services that deliver business value and enable users to exploit and benefit from the full range of services available to them (e.g., User hardware, Operating Systems, Applications, End-User Devices). The success and value of this role is driven (and measured) by the need to continually deliver a positive End-User Experience. 

Business Overview: 

Lucy Zodion is an industry leader in advanced street lighting controls, power distribution and electric vehicle (EV) supply solutions. Our products assist customers with energising urban and highways infrastructure from the ground up. Our range includes photocells, power distribution enclosures, EV connection feeder pillars, isolators, cut outs and switchgear. 

Key Accountabilities: 

Responsibilities: 

    Delivery of assigned IT End-User Support activities and priorities within agreed service levels (e.g. Incidents, Changes, Service Requests, Service Improvements, projects)

    Provide enhanced and expedited support to VIP and critical business users

    Work with other team members to continually improve all aspects of IT services that deliver value and enhanced the end-user experience.

    Work closely with global business users and teams to exploit existing and new technology. Identify and exploit opportunities for automation and digitization of key processes and activities.

    Handover of new and replacement hardware, ensuring the end user has a good understanding how to use it and how to seek support.

    Keep up to date with the release cycle for key applications and ensure compatibility with the existing environment

    Troubleshoot hardware issues and perform upgrades based on performance monitoring

    Proactively seek out opportunities for continual improvement. Own and progress these opportunities ensuring maximum value is achieved. 

    Continue to challenge yourself and improve in all applicable technology areas to ensure you have appropriate knowledge and skills necessary to complete all assigned tasks and support the broader team.

    Adhering to service management processes and standards. Ensuring excellent incident management to minimize business impact 

    Build and maintain effective and trusted relationships with colleagues, to aide IT support and the delivery of high standards of service

    Create and update Knowledge Items and other relevant documentation

Qualifications: 

Minimum Qualifications, Knowledge, and Experience 

Essential:

    2+ years’ experience in an IT End-User Service or Desktop Services role

    ITIL3/ITIL4 Certification, or 1+ years’ equivalent experience in an IT Service Management

    Excellent knowledge of Office 365 and MS Operating Systems

    Use of and understanding of IT Tools, Active Directory, Azure AD and Exchange

    Breadth of IT Support knowledge and demonstrable experience in support of PCs, Mobile Phones, or other User Technologies

    Experience using ITSM tools such as ServiceNow 

    Proven ability to troubleshoot and resolve both hardware and software technical issues

    An enthusiastic commitment to delivering and maintaining a positive End-User Experience.

    An entrepreneurial spirit who can solve challenging problems, make a real impact in technology, and want to build something big

    Excellent customer relations skills

    Excellent communication skills, both written and verbal, together with polite telephone manner

    Friendly and approachable with good customer service skills and able to communicate with colleagues who have varying IT knowledge 

    Well organised and able to prioritise workload

    Collaborative and community focused

    Friendly and positive attitude

Desirable:

    Experience of Microsoft 365 Deployment and Operations

    An understanding of Microsoft Azure Cloud Eco Systems and Services

    BYOD/MDM Deployment and Support 

    An understanding of Information Security and Cyber Security fundamentals

Does this sound interesting? We would love to hear from you. Our application process is quick and easy. Apply today! 

#LI-ONSITE

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.