regular system backups, maintenance runs, and security updates, fortifying our cyber barriers. • Command device configuration, performance optimisation, security enforcement, and management of cabling systems being an added advantage. • History of managing security solutions like firewalls, antivirus, and intrusion