JOB TODAY logo

Call support jobs in Royaume-Uni - Page 2

Are you a business? Hire call support candidates in Royaume-Uni

  • Commission-Only Sales Agent – Tableware for the Hospitality Industry
    Commission-Only Sales Agent – Tableware for the Hospitality Industry
    il y a 2 mois
    $12000–$100000 par an
    Temps plein
    London

    Are you a motivated sales professional with a passion for the hospitality industry? We are seeking a Commission-Only Sales Agent to represent our unique range of premium tableware products tailored for restaurants, hotels, and catering businesses in the North West and North East of England. About the Role As our Sales Agent, you will: • Identify and target high-potential clients across the North West of England., • Focus on small to medium-sized businesses in the hospitality sector., • Proactively generate leads, build your own pipeline, and manage customer relationships., • Conduct cold calls, client visits, and face-to-face meetings to showcase our collection., • Represent a distinctive and growing brand offering quality and innovation in tableware. What We Offer • Uncapped commissions – your earnings are based on performance, with no limits., • Exclusive, high-quality products that stand out in the market., • Full marketing and product support to help you succeed., • Flexible working – manage your own schedule as a self-employed professional. About You • Proven experience in B2B or field sales, ideally within hospitality or related industries., • Confident in prospecting, networking, and closing sales., • Self-motivated, professional, and results-driven., • Access to your own vehicle for client visits. If you’re an ambitious self-starter who enjoys building relationships and wants to grow with a brand that values initiative and results – we’d love to hear from you. Apply now with a short introduction outlining your experience.

    Inscription facile
  • Security Operations Analyst
    Security Operations Analyst
    il y a 2 mois
    £36000–£49000 par an
    Temps plein
    London

    As a Security Operations Analyst. You’ll monitor, triage, and respond to threats across our global estate, using modern SIEM/EDR and automation to keep [Company/clients] safe. Hybrid working, strong learning culture, and clear progression. The role • You’ll be part of our Security Operations Centre, detecting and responding to cyber threats, improving our controls, and guiding the business through security incidents. This role suits someone hands-on with SOC tooling, calm under pressure, and eager to automate the boring stuff. What you’ll do • Monitor and triage security alerts across SIEM (e.g., Microsoft Sentinel/Splunk), EDR (e.g., Defender for Endpoint/CrowdStrike), email security, and cloud platforms., • Investigate incidents end-to-end: scoping, containment, eradication, and recovery; maintain clear incident records and timelines., • Execute and improve playbooks/runbooks; contribute to SOAR automation for repetitive tasks., • Perform threat hunting using hypotheses mapped to MITRE ATT&CK; enrich findings with threat intelligence (internal and external)., • Lead/assist on phishing investigations, malware analysis at triage level, and suspicious user activity reviews., • Collaborate with IT/Cloud/Network teams on log onboarding, tuning, and control gaps; reduce false positives., • Track and meet SLAs/KPIs (MTTD/MTTR); deliver concise, executive-ready post-incident reports and lessons learned., • Support vulnerability management by contextualising exposures and recommending remediation priorities., • Participate in shift handovers and, if applicable, an out-of-hours/on-call rota., • Contribute to security awareness and purple-team exercises/attack simulations. What you’ll bring • Experience in a SOC/IR role (typically 2–5 years for this level) with demonstrable incident handling., • Working knowledge of: SIEM, EDR, email security, network security (IDS/IPS, firewalls), and cloud security (Azure/AWS)., • Ability to query and analyse data (KQL/Splunk SPL/SQL); basic scripting (PowerShell or Python) for enrichment and automation., • Familiarity with frameworks and standards: MITRE ATT&CK, NIST CSF, ISO/IEC 27001, and Cyber Essentials/Plus., • Strong written and verbal communication; comfortable translating technical risk for non-technical audiences., • A proactive mindset: curiosity, ownership, and continuous improvement., • Nice to have (advantageous, not essential), • Certifications such as Security+, CySA+, SC-200, AZ-500, GCIH/GCIA/GCTI, SSCP, GCED, or equivalent., • Experience with SOAR tooling, sandboxing, DFIR basics, or purple-team methodology., • Exposure to identity security (Entra ID, Okta), SaaS security, or container/Kubernetes security., • Experience in regulated environments (financial services, public sector) and/or UK SC/BPSS clearance eligibility. What we offer • Leave: 20 days’ annual leave, • Pension & protection: Employer pension contribution, life assurance, and income protection., • Learning & growth: Budget for certifications, paid exam days, access to labs and training platforms; clear progression to Senior Analyst/Incident Responder/Threat Hunter.

    Inscription facile
left arrow iconPage 2right arrow icon