Configure and administer cisco sourcefire and firesight management center virtual appliance. Configure and administer Cisco Secure Access Control System.
Event Security Officials required for various events throughout the year. Responsible for crime identification
Govern the development and ongoing review and update of the organisation's Enterprise Security Principles. Develop and regularly review and where necessary recommend updates to the organisation's Enterprise Security standards.
and Headquarters (HQ). Job holders report to the Security Officer.
Job holders at this level demonstrate manage resources and coach and coordinate a team of security support staff. These jobs may require to report related to the implementation and assessment of security measures and maintenance of equipment with a view recommendations to facilitate informed decision-making and secure WFP staff, facilities and operations.
1. Review security threats and risks in detail and compile accurate
now recruiting for the position of Guesthouse Security Officer
NQF 3 or
Ability to think on feet
Passionate about security
A courteous and friendly native
SAS Security provides premium quality security services, and uniformed guards, to the retail and construction industries. On-going commission for the entire duration of the contract (average of 24 months).
Coordinating office activities and operations to secure efficiency and compliance to company policies.
We require a beautician with experience in IPL laser treatments to tend to our executive clients who cannot make it for their treatments in normal working hours.
• If an instruction requires funds to be secured from the account:
o Ensures account has enough adherence to instructions (user friendly)
Securing of funds from customer accounts and making payments third parties
• Receives an instruction to secure funds from customer account - make sure that customer business accounts
• Follows correct process for securing funds:
o Make entries on the debit/credit Make entries on BDS – ensuring that funds are secured from a correct account always
o Requests for
and development of front-end.Implementation of security and data protection.Integration of data storage architecture.Understanding of accessibility and security compliance.Knowledge of user authentication and