and expertise. • Travel as the IT fleet's advance guard to various sites, fortifying our technological frontlines regular system backups, maintenance runs, and security updates, fortifying our cyber barriers. • Command device configuration, performance optimisation, security enforcement, and management of cabling systems being an added advantage. • History of managing security solutions like firewalls, antivirus, and intrusion