take preparations are done and manage process. Security Open and close shop Complete daily managers check sheet. Ensure that the alarms, cameras, and all security systems are in working order, maintained, and outsourced security guards to ensure adherence to all Company policies and procedures. General security awareness
management measures as well as the identified security measures for the assigned applications. Controls for scalable, distributed systems. Security of AWS services, securing design of VPC architectures RESTful
management measures as well as the identified security measures for the assigned applications. Controls for scalable, distributed systems Security of AWS services, securing design of VPC architectures RESTful
the Branch and ensuring that all site-specific security requirements are adhered to and that the client's Service- Cost Control/CPS. Management of various security features i.e. Branch/Vaults and vehicles Ensure
surveillance to ensure fiber infrastructure is secure and no developments are exposing fiber to damage and regularly carry out route patrols to ensure security of infra Carry out health status of fiber cores
surveillance to ensure fiber infrastructure is secure and no developments are exposing fiber to damage and regularly carry out route patrols to ensure security of infra.
Carry out health status of fiber
surveillance to ensure fiber infrastructure is secure and no developments are exposing fiber to damage and regularly carry out route patrols to ensure security of infra • Carry out health status of fiber cores
allocated audits are conducted. Recruitment of New Security Officers / Risk Administrators – Interviews to (Travelling will be required) FF, FA, SHEQ etc. Conduct Security Training Schedule candidates / employees into
offshore DevOps Provider to deliver a stable and secure solution. Working in big company environments with & Azure cloud area Further development of security and compliance documentation of the endpoint cloud Group Infrastructure Architecture, Cyber Security, Endpoint Security and other IT stakeholder to assess requirements
surveillance to ensure fiber infrastructure is secure and no developments are exposing fiber to damage and regularly carry out route patrols to ensure security of infra Carry out health status of fiber cores