IT Coordinator

London
3 months ago
Applications closed

Related Jobs

View all jobs

Security Assurance Coordinator (Cyber Security DTSL)

Customer Service Co-Ordinator

Vetting & Security Administrator

Vetting & Security Administrator

BIM Manager

Vetting & Security Administrator

Job Title: IT Coordinator

Reports to: Head of Data Systems

Salary:

Location: Embankment (1-2 days in office, Wednesdays required)

Salary: 34-42k

Key areas of influence: Supporting IT infrastructure, IT asset management, IT training, supporting all staff

Purpose of the role
The IT Coordinator will support the organisation's IT infrastructure and non-D365 related systems, including O365, SharePoint, Asset Management, and Staff Training. They will ensure robust IT and data security, compliance, and governance across all systems, including assisting with writing and compliance of IT policies and procedures, providing training to staff, and managing the purchase of IT equipment.

Operating within the Finance, IT & Facilities team, the IT Coordinator will liaise closely with the D365 team and all departments to ensure a secure and smoothly operating IT environment for staff, volunteers, and partners. They will also support and participate in technology-related working groups to ensure IT has a voice and contributes to successful outcomes across the organisation.

Main Responsibilities

IT Projects

Liaise with external suppliers and internal teams on all aspects of IT projects to contribute to successful delivery.

IT Training & Guidance

Deliver IT training sessions and create training materials, both internally and with external partners.

IT Administration and Vendor Liaison

Liaise with outsourced IT support providers.
Review outstanding support tickets and escalate as required.
Maintain the IT Asset Register and equipment.
Assist with the Starter and Leaver process.

Policies, Procedures & Advice

Maintain and contribute to IT policies and procedures to ensure security and minimize risk.
Support IT infrastructure, including O365, SharePoint, Asset Management, and Staff Training.

Other Duties

Carry out any other reasonable duties as directed, within capabilities.
Ensure health and safety obligations are followed, reporting defects, risks, or potential hazards promptly.Person Specification

Experience

Essential Criteria

Strong experience with Microsoft 365 and SharePoint
Experience managing external IT providers
Recent experience in IT support, SharePoint administration, and Asset Management
Ability to build effective relationships and work collaboratively across teams
Experience training staff in standard softwareDesirable Criteria

Experience in an ITIL environment
Customisation and configuration in MS Office 365 and SharePoint

Knowledge

Essential Criteria

Microsoft Office 365 & SharePoint
Basic technical knowledge of O365 system structures
GDPR & Data Legislation
Knowledge and understanding of MS Office and other widespread software packages
Understanding of Information Security & Governance principlesDesirable Criteria

Microsoft Forms
Power Automate
Power BI and ability to assist others
Cyber Essentials and cybersecurity knowledge

Qualifications

Essential Criteria

Degree level qualification or equivalent experienceDesirable Criteria

MS Certifications: Azure Fundamentals, 365 Fundamentals, MS Teams FundamentalsSkills

Essential Criteria

Strong computer literacy
Negotiation and influencing skills
Ability to foster effective relationships with non-technical stakeholders
Attention to detail
Presentation and reporting skills
Flexible and adaptable approach to work
Excellent organisation and time management skills
Commitment to self-development and learning
Ability to construct and edit complex documentsAdditional Information

Typical working hours are 9am to 5pm (7 hours excluding lunch), five days a week. Flexible start and end times are available within an 8am-6pm window.
Hybrid working is supported, with 20-40% on-site time expected, including one required day per week.

Equal Opportunities and Inclusion
The organisation is committed to providing equal opportunities in employment and avoiding unlawful discrimination. We value the diversity that a varied workforce brings to the organisation.

Adecco acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers. The Adecco Group UK & Ireland is an Equal Opportunities Employer.

By applying for this role your details will be submitted to Adecco. Our Candidate Privacy Information Statement explaining how we will use your information is available on our website

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.