service offering perspective, assist the company to secure new business contracts.
Network Technology VLAN, VPNs, Firewalls, Cyber Security, and IP routing protocols.
meetings. Coordinate external contractors. Manage security vulnerabilities. NB: By applying for this role
transformations. • Designing and implementing security measures to protect data from unauthorized access
teams to set standards for software, hardware, and security
efficiency during peak periods of usage; consider security at its highest level (third party attacks; data
Structured Cabling and Fibre Solutions, Integrated Security Solutions, Fire Systems and Solutions are some
has an understanding of all relevant backup and security procedures. Undertakes routine analysis and works
has an understanding of all relevant backup and security procedures. Undertakes routine analysis and works