IT & Telecommunications Engineer

Hellesdon
1 month ago
Applications closed

Related Jobs

View all jobs

Telecoms Helpdesk Engineer

Senior Field Based Communications Engineer

IT Infrastructure Engineer

IT Manager

IT M&A Project Manager

IT Procurement & Supply Chain Specialist

Company Overview:

Our vision is to create a client-focused business that delivers customised networking and technology solutions that ensure seamless connectivity and robust infrastructure for businesses of all sizes.

Our commitment to exceptional service, continuous professional development, and technological advancement creates lasting value for our clients. We prioritise collaboration with our customers, working closely to understand their unique needs and deliver tailored solutions that exceed expectations.

Working with a range of customers, we have detailed experience of the specific challenges faced by education, healthcare and public sector organisations.

We are dedicated to delivering innovative technology services, including Managed Data Networks, Internet Connectivity, Cybersecurity Solutions, Communications, CCTV, Door Access Control, and Cloud Services.

Position Overview:

As an IT & Telecommunications Engineer, you will play a vital role in installing and maintaining the operational excellence of our diverse IT services. Your responsibilities will encompass installations, user support, hardware and software maintenance, network management, and security systems. This position offers flexible hybrid working, allowing you to work from home when not completing installations or call-out work at customer sites.

What we are looking for:

We are searching for an enthusiastic individual with a can-do attitude to support our clients, ensuring we exceed their expectations every time. We work closely with our clients to become their IT department.

A strong technical expertise is essential, including knowledge of operating systems (Windows, macOS, Linux), software applications, and hardware components. Familiarity with network configuration, troubleshooting, and security protocols is also important. Excellent problem-solving skills are crucial, as the ability to diagnose and resolve technical issues efficiently is a must.

Clear and effective communication is vital. IT support engineers must be able to explain complex technical information in a way that non-technical users can understand, both verbally and in writing. A customer service orientation with empathy, patience, and a positive attitude is key to understanding user frustrations and addressing their concerns effectively.

Good time management skills are necessary to handle multiple tasks and prioritise issues effectively. A commitment to continuous learning and staying updated with the latest trends and advancements in technology is important. Strong interpersonal skills are needed to work well with others, both within the IT team and with other departments, ensuring collaboration and effective problem resolution.

Attention to detail is crucial for precision in diagnosing issues and implementing solutions, ensuring that problems are fully resolved and do not recur. These attributes ensure effective support and a positive user

Key Responsibilities:

Provide exceptional user support, addressing hardware and software issues promptly.
Install, configure, and maintain hardware devices, including networking equipment and advanced threat protection firewalls.
Implement and manage Structured Network Cabling solutions, including Cat6a and Fibre Optics.
Oversee Managed Network Switching and Wi-Fi, ensuring optimal connectivity and performance.
Contribute to the deployment and maintenance of Cybersecurity Solutions to safeguard our clients' data and systems.
Manage and configure VoIP Phone Systems, ensuring seamless communication for our customers.
Install and maintain CCTV systems for video surveillance purposes.
Configure and manage Door Access Control systems for secure facility access.
Play a role in the implementation and maintenance of IT Cloud services.
Proactively manage software updates using Remote Monitoring and Management (RMM) tools.
Keep CRM database and other internal systems up to date.
Answer incoming calls, web chats and other contact channels.
Proactively contact clients to keep them informed about maintenance work completed in the background and discuss the benefits of additional services.
Benefits:

Standard office working hours Monday to Friday, 8:30am to 5:00pm
20 days of annual leave plus bank holidays.
Pension scheme.
Company-provided mobile phone.
Company-issued laptop.
Business mileage paid on personal car.
Health and safety training, including ladder training and working at heights.
Vendor-specific training for professional development.
Location: Home-based (initially), with regular meetings at suitable locations, including director's houses and call outs to customers as required. Long term plan this role will be office based with possibility of hybrid working

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.