I am looking for Afrikaans Speaking Control Room Operators/Controllers for one of my clients in Weltevredenpark/Fairland area. It is for a Security Company, Armed Response & Guarding. This position is for the Armed Response side. Male or Females, 2-3 years of experience in the Control Room at a
cyber threats by implementing and maintaining security controls Monitoring systems for suspicious activity measures. : Implement and manage security technologies and controls, including firewalls, intrusion solutions. Design, implement, and maintain security controls and configurations within AWS environments Identity and Access Management (IAM), Security Groups, Network Access Control Lists (NACLs), Key Management Service Hub, AWS Config, and AWS CloudTrail); cloud security controls and compliance frameworks, such as AWS Well-Architected
Manage security technologies and controls, firewalls, intrusion detection / prevention systems (IDS / ensure timely resolution Design and implement security controls, configurations, and solutions to mitigate remediation actions Design and implement security controls and configurations within AWS environments Identity and Access Management (IAM), Security Groups, Network Access Control Lists (NACLs), Key Management Service investigations in AWS environments Integrate security controls and practices into the software development
•Upgrade systems by implementing and maintaining security controls. •Protect the system by defining access privileges
•Upgrade systems by implementing and maintaining security controls. •Protect the system by defining access privileges
practices and standards, security risks and controls in security and IT, and IT control frameworks IT audit
cameras and to always comply with the security and operational control room procedures. Monitor view-screens any other media as required. Ensure the security of the control room and all equipment is always well maintained
technologies, practices and standards, security risks and controls in the areas of security and IT Good
Upgrade systems by implementing and maintaining security controls Protect the system by defining access privileges
Upgrade systems by implementing and maintaining security controls Protect the system by defining access privileges