IT Service Desk Analyst (m/w/d)

Kuehne+Nagel
Milton Keynes
1 year ago
Applications closed

Related Jobs

View all jobs

Service Desk Analyst

1st Line IT Support Analyst

Apprentice IT Technician

Head of IT - Southampton

Global IT End-User Support Specialist

Trainee Cyber Security Assistant - Training Course

IT Service Desk Analyst (m/w/d)

Milton Keynes, Buckinghamshire, United Kingdom | Digitales und Technologie | Vollzeit | JR2410_0141

Join us as our new IT Service Desk Analyst in our KN UK IT Team!

Your Role The IT Service Desk Analyst plays a crucial role as the central point of contact for all IT-related issues and requests. This is a 1st / 2nd line hybrid role. The primary objective is to deliver an efficient and professional service that meets customer demands within the agreed service levels and business priorities. The role involves coordinating appropriate responses, including resolving issues and change requests at the first point of contact (telephone/email/face-to-face), redirecting requests to the appropriate resolver groups for resolution, monitoring progress, and ensuring timely updates to users regarding the status of their requests. Handling of escalations is also required. Your Responsibilities

  • Single Point of Contact: Serve as the primary point of contact for all IT-related issues and requests, ensuring prompt and effective resolution or escalation to the appropriate support teams. Provide exceptional customer service by addressing user inquiries, troubleshooting technical problems, and offering guidance in a professional and courteous manner.
  • Incident and Request Management: Manage and prioritise incoming incidents and service requests, ensuring accurate logging, tracking, and resolution within defined service level agreements (SLAs). Apply appropriate troubleshooting techniques and resources to resolve issues at the first point of contact. Escalate incidents and requests to higher-level support groups as necessary, while maintaining ownership and keeping users informed of progress. To follow agreed procedures and processes.

  • Communication and User Support: Communicate effectively with users to gather relevant information, clarify issues, and provide updates on incident and request status. Document all interactions, actions taken, and resolutions provided. Demonstrate a customer-centric approach by actively listening, empathising, and delivering solutions that meet user expectations.
  • Collaboration and Knowledge Sharing: Collaborate with cross-functional teams, including 2nd and 3rd line support groups, to facilitate the resolution of complex incidents and requests. Provide detailed and accurate information to support teams, ensuring smooth handovers and effective problem-solving. Contribute to the knowledge base by documenting solutions, known errors, and workarounds to enhance the organisation's knowledge sharing culture.
  • Continuous Improvement: Identify opportunities for process improvement and efficiency enhancement within the IT service desk operations. Proactively suggest ideas for automating repetitive tasks, streamlining workflows, or enhancing the user experience. Stay updated with the latest industry trends, technologies, and best practices related to IT service management and support.
  • Other: To assist the Major Incident managers with complex faults. To be first point of contact for escalations within the organisation.


Your Skills and Experiences

  • Previous experience in a service desk or IT support role, preferably in a 1st and 2nd line support capacity.
  • Strong knowledge of ITIL processes, particularly incident, change and problem management.
  • Excellent problem-solving and analytical skills to assess and resolve complex incidents and changes.
  • Effective communication and customer service skills to interact with stakeholders at various levels of the organisation and external parties.
  • Proficient in utilising service desk ticketing systems to log, track, and resolve incidents and requests.
  • Familiarity with a wide range of hardware, software, and network technologies commonly used in business environments, including but not limited to:

    o Active Directory
    o Microsoft Exchange
    o M365
    o Intune
    o Active Roles
    o MDM Management
    o Remote Support Tools

  • Ability to work under pressure, prioritise tasks, and manage time effectively to meet SLAs and business priorities.
  • Detail-oriented with a focus on accuracy and documentation. Experience of designing and documenting processes and procedures.

Good Reasons to Join If you would like to become a valued member of our team, we will make sure that you’re rewarded for your commitment and expertise. You can join the contributory Kuehne+Nagel pension plan and enjoy our Route 2 Rewards scheme which offers everything from discounts, benefits information, recognition and its wellbeing centre. We care for our colleagues (and their immediate family) with our employee assistance programme providing access to 24/7 GP, legal and financial advice along with mental health counselling. All of this is to help you live a happier and healthier life. As proud holders of the Gold Covenant, we are a forces-friendly employer that recognises the skills, expertise and value service leavers bring to our organisation.

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.