We are looking for a competent Security Supervisor to undertake the surveillance of our premises and
vandalism, thefts, or other criminal behavior.
A security officer must be well-trained in surveillance and
from the area.
Secure all exits, doors, and windows after end of operations.
Check surveillance
experience as security officer or guard
Knowledge of legal guidelines for area security and public
/>Trained in self-defense.
Registered as a security officer.
If you feel you have what it takes
Manager: Security Operations, the successful incumbent is accountable to provide physical security services Loss Prevention Supervise control room operations. Monitor CCTV, fire detection, panic alarms, radio and Control all security registers. Investigate security breaches and compile reports. Undertake security threat measures. Develop post orders for security personnel. Monitor a security-guarding contract. Reporting Contribute and/or inform management decisions. Event Security Coordinate security services during Board/ ministerial meetings
at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable our clients turn data into insights, streamline operations, improve customer experience, and transform their at various levels and data security practices Deep knowledge of data security SOX processes ITSM ticket Infrastructure background Security understanding. Focused on Data security ABOUT US EXL is the indispensable
similar role, with a proven track record in cloud security In-depth knowledge of AWS and Google Cloud services including Identity and Access Management (IAM), VPC, security groups, and other relevant services Relevant certifications such as AWS Certified Security – Specialty, Google Professional Cloud Security Engineer, CISSP, or equivalent recovery (ICER) processes Proficiency in using security tools and technologies, such as intrusion detection complex security issues to technical and non-technical stakeholders Responsibilities Cloud Security: Develop
similar role, with a proven track record in cloud security
Sourcing Security and Safety Supervisor to ensure the security and safety of our sourcing operations in the region. The ideal candidate will have experience in security management and knowledge of safety protocols and Develop and implement security and safety protocols to protect sourcing operations in the Western Cape Cape region - Conduct regular security assessments to identify potential risks and vulnerabilities - Monitor Monitor and analyze security trends and incidents to identify areas for improvement - Coordinate with local
Manager with expertise in Cyber Security to join our team. The successful candidate driving sales, and promoting our Cyber Security solutions.
What you’ll do: do:
The Cyber Security Account Manager plays a pivotal role in fostering strong, long-lasting Vendors, such as Mimecast's email and data security services.
This position focuses on understanding relationships with a portfolio of Mimecast and Cyber Security Clients.
Sourcing Security and Safety Supervisor to ensure the security and safety of our sourcing operations in the region. The ideal candidate will have experience in security management and knowledge of safety protocols and Develop and implement security and safety protocols to protect sourcing operations in the Western Cape Cape region - Conduct regular security assessments to identify potential risks and vulnerabilities - Monitor Monitor and analyze security trends and incidents to identify areas for improvement - Coordinate with local
doing: Design, implement, and manage innovative security solutions within AWS environments. Ensure compliance DSS 4.0 standards, safeguarding cloud operations. Conduct security assessments, including vulnerability to maintain a robust security posture. Monitor and respond proactively to security incidents and alerts resolution. Develop and enforce comprehensive security policies, procedures, and guidelines. Collaborate Collaborate with cross-functional teams to integrate security best practices into development and deployment