Try removing some of the filters to get more results
Threat Assessment: Collaborate with senior consultants to identify and evaluate security threats, considering various factors such as location, type of property, and potential risks. Assist in conducting comprehensive threat assessments that cover a range of scenarios, from petty crim More...
Responsibilities: Performs user and access administration on designated systems and applications, in accordance with the defined policies, standards and procedures of the organization Performs system security administration on designated technology platforms, including ope More...
Protect company's property and staff by maintaining a safe and secure environment Observe for signs of crime or disorder and investigate disturbances Act lawfully in direct defence of life or property Apprehend criminals and evict violators Take accurate notes of unusual occu More...
Install, configure and maintain computer hardware, software, systems, networks, printers, scanners, CCTV, Access control, PBX and Bio metric Devices Design and deploy networks and ensure network connectivity throughout a company's LAN/WAN infrastructure is on par with technical More...