to all institutes. Ensure that all systems are secured and protected to all threats i.e. effective deployment monitoring of Antivirus in the ICT environment. Review security and backup procedures and processes for improvement endpoint security, management i.e. AV and patch deployment. Ensure diagnosis and resolution of security incidents and functionality. Operational Write reports on security incidents. Participate in change control implementation qualification in an IT field. Formal Microsoft Security Certifications; MCSE. Min 5 years Systems Engineering
supplies very sophisticated and reliable Perimeter Security Sensor and Surveillance Systems. We are currently companies allowed to supply the IMPI Perimeter Security Intrusion Detection / Monitoring System, which integrator of locally available high end Electronic Security Solutions and had very good results for a small company, but on seeing a niche market for higher end security systems we changed strategy and started importing only, with the intention of empowering smaller security companies to become independent commercially viable
supplies very sophisticated and reliable Perimeter Security Sensor and Surveillance Systems. We are currently companies allowed to supply the IMPI Perimeter Security Intrusion Detection / Monitoring System, which integrator of locally available high end Electronic Security Solutions and had very good results for a small company, but on seeing a niche market for higher end security systems we changed strategy and started importing only, with the intention of empowering smaller security companies to become independent commercially viable
completed and ensure all documentation is stored in a secure and confidential manner When needed, revisit source
completed and ensure all documentation is stored in a secure and confidential manner When needed, revisit source
completed and ensure all documentation is stored in a secure and confidential manner When needed, revisit source
completed and ensure all documentation is stored in a secure and confidential manner When needed, revisit source
completed and ensure all documentation is stored in a secure and confidential manner When needed, revisit source
completed and ensure all documentation is stored in a secure and confidential manner When needed, revisit source
completed and ensure all documentation is stored in a secure and confidential manner When needed, revisit source