JOB TODAY logo

Call centre jobs in LondonCreate job alerts

Are you a business? Hire call centre candidates in London

  • Sales Consultant
    Sales Consultant
    23 days ago
    £1500 monthly
    Part-time
    London

    Part-Time Call Setter – Property Management Agency (Canary Wharf, London) Are you confident on the phone, organised, and motivated by results? We’re looking for two enthusiastic part-time Call Setters to join our friendly team at our office in Canary Wharf. What you’ll be doing: • Making a high volume of daily calls to potential landlords from our existing database and online platforms (property websites, adverts, etc.), • Introducing our Guaranteed Rent & HMO Management Service, • Setting appointments for our senior team to speak with interested landlords, • Recording all conversations and outcomes in our system, • Working closely with our management team to hit weekly targets What we offer: • £1,500 fixed salary (part-time), • Flexible hours – perfect if you want a stable income but also time for family or personal commitments, • Training provided – no property experience needed, just confidence and communication skills, • Modern office in Canary Wharf with a supportive team environment, • Growth opportunities for those who want to progress into sales or business development Who we’re looking for: • Confident, polite, and professional phone manner, • Comfortable making a lot of phone calls per day, • Organised and reliable with good attention to detail, • A positive attitude and willingness to learn, • Previous telesales, customer service, or call-centre experience is a bonus but not essential ✨ This role is ideal for anyone who enjoys talking to people, building connections, and wants a secure, part-time office job with a guaranteed salary.

    No experience
    Easy apply
  • Security Operations Analyst
    Security Operations Analyst
    1 month ago
    £36000–£49000 yearly
    Full-time
    London

    As a Security Operations Analyst. You’ll monitor, triage, and respond to threats across our global estate, using modern SIEM/EDR and automation to keep [Company/clients] safe. Hybrid working, strong learning culture, and clear progression. The role • You’ll be part of our Security Operations Centre, detecting and responding to cyber threats, improving our controls, and guiding the business through security incidents. This role suits someone hands-on with SOC tooling, calm under pressure, and eager to automate the boring stuff. What you’ll do • Monitor and triage security alerts across SIEM (e.g., Microsoft Sentinel/Splunk), EDR (e.g., Defender for Endpoint/CrowdStrike), email security, and cloud platforms., • Investigate incidents end-to-end: scoping, containment, eradication, and recovery; maintain clear incident records and timelines., • Execute and improve playbooks/runbooks; contribute to SOAR automation for repetitive tasks., • Perform threat hunting using hypotheses mapped to MITRE ATT&CK; enrich findings with threat intelligence (internal and external)., • Lead/assist on phishing investigations, malware analysis at triage level, and suspicious user activity reviews., • Collaborate with IT/Cloud/Network teams on log onboarding, tuning, and control gaps; reduce false positives., • Track and meet SLAs/KPIs (MTTD/MTTR); deliver concise, executive-ready post-incident reports and lessons learned., • Support vulnerability management by contextualising exposures and recommending remediation priorities., • Participate in shift handovers and, if applicable, an out-of-hours/on-call rota., • Contribute to security awareness and purple-team exercises/attack simulations. What you’ll bring • Experience in a SOC/IR role (typically 2–5 years for this level) with demonstrable incident handling., • Working knowledge of: SIEM, EDR, email security, network security (IDS/IPS, firewalls), and cloud security (Azure/AWS)., • Ability to query and analyse data (KQL/Splunk SPL/SQL); basic scripting (PowerShell or Python) for enrichment and automation., • Familiarity with frameworks and standards: MITRE ATT&CK, NIST CSF, ISO/IEC 27001, and Cyber Essentials/Plus., • Strong written and verbal communication; comfortable translating technical risk for non-technical audiences., • A proactive mindset: curiosity, ownership, and continuous improvement., • Nice to have (advantageous, not essential), • Certifications such as Security+, CySA+, SC-200, AZ-500, GCIH/GCIA/GCTI, SSCP, GCED, or equivalent., • Experience with SOAR tooling, sandboxing, DFIR basics, or purple-team methodology., • Exposure to identity security (Entra ID, Okta), SaaS security, or container/Kubernetes security., • Experience in regulated environments (financial services, public sector) and/or UK SC/BPSS clearance eligibility. What we offer • Leave: 20 days’ annual leave, • Pension & protection: Employer pension contribution, life assurance, and income protection., • Learning & growth: Budget for certifications, paid exam days, access to labs and training platforms; clear progression to Senior Analyst/Incident Responder/Threat Hunter.

    Easy apply