operation and troubleshooting on surveillance security products, software and mobile applications.
-Must Matric, 2- 5 years' working experience in a security service company / or installed CCTV products and
you an experienced professional from a top-tier security service company looking for your next exciting
- 2 to 5 years of working experience in a security service company.
- Knowledge of IPV address
/>5) Taking account of the needs for quality, security, availability and safety,
utilizing, as
Position: Operations Engineer Feature Owner Security Tools (Senior)
Location:
growth? Are you passionate about revolutionizing security practices and safeguarding digital landscapes
Windows Systems operation
Electronic Security Systems, such as CCTV, Access Control, Perimeter and Intruder detection and security software
cloud or cyber security business environment. In-depth knowledge of Google Cloud Security Base skills in – foundational and associate at minimum incl. Security certifications
designing and enhancing armored vehicles or cash-in-transit vehicles? Do you thrive in leading teams and design and development of armored vehicles or cash-in-transit vehicles, ensuring compliance with industry regulatory changes relevant to armored vehicle or cash-in-transit vehicle design. Requirements: Bachelor's or preferably with a focus on armored vehicles or cash-in-transit vehicles. Proficiency in CAD software (e.g requirements applicable to armored vehicles or cash-in-transit vehicles. Excellent project management skills
design and development of armored vehicles or cash-in-transit vehicles, ensuring compliance with industry
regulatory changes relevant to armored vehicle or cash-in-transit vehicle design.
Req
preferably with a focus on armored vehicles or cash-in-transit vehicles.
is looking for a Cyber Security Analyst who has experience within a security consulting practice, having having developed and deployed security solutions to various organizations on a client basis. Duties will maintaining, and updating IT Security strategies and controls. Maintaining security policies and standard operating Identifying, introducing, and implementing appropriate security controls and testing those controls on a regular business areas and infrastructure comply with security control requirements. Ensuring that disaster recovery
networks and applications to identify and resolve security flaws. Occasional experiments with various methods methods attackers could use to exploit information security vulnerabilities. Complete threat assessment reports presents findings to clients. Conduct physical security assessments of servers, systems and network devices information security policies and procedures. Must have Relevant tertiary qualification Security related commercial and open source security tools and scripting languages Exposure to security testing scenarios e.g