Duties: Install and configure software Install intercoms Travelling to site Technical understanding of products Requirements: Minimum 3-5 years CCTV/Access Control Experience Drivers License Ability to communicate technical information to clients
the bodybuilder design and manufacturing industry (CIT, Military vehicles, Body Builders).
Liaising with dispatching team in arranging for CIT crew site meetings Maintain tools of trade · Ensure rural and remote areas as well as work with an armed CIT guard at all times · Able to work extended hours
the bodybuilder design and manufacturing industry (CIT, Military vehicles, Body Builders). Ability to create
Technical Systems
Perform regular maintenance and inspections of security systems to ensure optimal performance and detect their requirements and provide recommendations on security system upgrades or enhancements. Requirements: wide range of hand and power tools related to security system installation and maintenance. Excellent
supplies very sophisticated and reliable Perimeter Security Sensor and Surveillance Systems. We are currently companies allowed to supply the IMPI Perimeter Security Intrusion Detection / Monitoring System, which integrator of locally available high end Electronic Security Solutions and had very good results for a small company, but on seeing a niche market for higher end security systems we changed strategy and started importing only, with the intention of empowering smaller security companies to become independent commercially viable
Trusted Advisor (use of machines, spillages, noise, security)
marketing and securing projects,
environment. To ensure effective coordination of the security service provided to company on a continuous basis Manage stock control, all keys and ensure that all security related systems & infrastructure is monitored Responsibilities: 1. Coordinate & monitor security service provider contract. 2. Ensure monthly minutes companies Policies & Procedures. 4. Ensure all security are aware and alert. 5. Ensure proper access control as any other security infrastructure. 10. Compile a monthly report on all and any security issues including