ICT Support Technician

Chester-le-Street
2 weeks ago
Create job alert

This ICT Support Technician opportunity offers a from private pension scheme, non-contractual Business Performance Related Bonus, 24 days annual leave (rising with service) plus Bank Holidays, a working week over 5 days with an early Friday finish, offering excellent work / life balance.

You will be joining the team of a global specialist in the design and manufacture of high-temperature metal seals for aerospace, automotive and power generation sectors located in Stanley.

As ICT Support Technician your role will include:

Responding to requests, logging issues, reviewing requirements against internal policies and processes, prioritising responses, delivering technical support and hands-on issue resolution to standard operating procedures
Maintaining and supporting company systems, such as Windows clients, servers and networks
Maintaining cyber security protection and resilience regimes (firewalls, backups, antivirus)
Maintaining and supporting network devices such as PCs, phones, mobiles, printers, switches
Maintaining information security and cyber security records to support audit and compliance

To be a successful in this ICT Support Technician role you will have proven skills and experience in the following:

Delivered excellent, responsive customer-focused service ideally from within an ICT role.
Supported the full life cycle for both users and assets (onboarding to offboarding)
Managing and maintaining Windows Domain, PCs, Microsoft Exchange, Microsoft Office
Securing Windows clients, servers, and networks
Have worked in fast-moving small business environments
Have experience of ISO27001 or other information security frameworks
Have experience of Cyber Essentials or other cyber security frameworks
Have supported disaster recovery activities
Have relevant professional qualifications, certifications, or equivalent

To apply for this ICT Support Technician role, please click ‘apply online’ and complete the full application process.

We welcome all applications however, you must be eligible to work in the UK, and pass a Baseline Personal Security Standard (BPSS), and a Disclosure and Barring Service (DBS) check.

Candidate Source Ltd is an advertising agency. Once you have submitted your application it will be passed to the third party Recruiter who is responsible for processing your application. This will include holding and sharing your personal data, our legal basis for this is legitimate interest subject to your declared interest in a job. Our privacy policy can be found on our website and we can be contacted to confirm who your application has been forwarded to

Related Jobs

View all jobs

2nd Line Support Technician

ICT Engineering Apprentice

IT Support Apprenticeship

Project Manager (Capability Development Support) - NATO

ICT Network Manager

ICT/Computing Teacher

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.