and expertise. • Travel as the IT fleet's advance guard to various sites, fortifying our technological frontlines regular system backups, maintenance runs, and security updates, fortifying our cyber barriers. • Command device configuration, performance optimisation, security enforcement, and management of cabling systems being an added advantage. • History of managing security solutions like firewalls, antivirus, and intrusion
as network administration, system maintenance, security management, and user support. Requirements: CompTIA
and performant applications Implementation of security and data protection Reference Number for this
and performant applications Implementation of security and data protection Reference Number for this