- Knowledgeable in maintaining, troubleshooting, and repairing assigned Surveillance products(CCTV,DVR,VDP etc..). - Applies advanced technical knowledge to solve unusual complex issues solely. - Must have functional knowledge of assigned CCTV cameras and associated components. - Evaluate, configure and test products and give apt solutions - Knowledge of testing life cycles, testing strategies, testing tools. - May ...
functional Area Defence Forces, Security Services Job Role Security Manager Keyword Field Officers Security Services Security Guards Security Contracts Ex - servicemen Supervisors Security Supervisors Security Compliances Security Manager Job Type Permanent
A leading company in the field of Electronic Security wants to expand their business in entire MP for which we require sales executives asst. Managers in different location. Have to make the dealers & have to ensure the business in their territory. A hardcore sales must ensure the achievement Candidate must have good communication,Presentation& Negotiation Skill.Good command over local language ...
To execute various functions of Physical Security/support Operations viz. Manpower deployment supervision, report writing, CCTV, FAS, Access control , complaint management etc. on 24/7 basis. Supervise operational services viz. Physical security/support , night transport safety, logistical
- Enquiry generation and maintaining existing clients - Cold Calling - Generation of new system integrators - Showroom sales management (Hardware Shops) - Products :Samsung Digital Door Locks, video door phone and Home Automation Industry Consumer Electronics / Appliances / Durables
Install and use software, such as firewalls and data encryption programs, to protect sensitive information. Research the latest information technology (IT) security trends.Help plan and carry out an organization's way of handling security
- Support Client engagements in International region. - Provide clients with deep subject matter expertise on IT security frameworks and related data protection and data governance standards, including, but not limited to :ISO, PCI, CERT, NARA, NIST, FIPS, - Conduct business assessment drawing Required Qualifications: - Prior leadership experience in a Global Professional Services Firm - Experience with data ...
and help meet our revenue goals - Work with the team to convert client engagement objectives into actionable project plans and budgets while demonstrating excellent project management skills About this Practice : Ensuring security has to become an orthogonal process to the roll out of applications
approaches to monitor, catch, prevent, intervene and remediate threats before they materialize. Trianz Information Security team provides today's CIO's with : - Information Security Policy & Audits - Application Security & Testing - Infrastructure Security & Testing - Data Management & Statutory
Should have good knowledge of embedded system development, IDA pro and/or protocol fuzzing tools is highly recommended. This position is responsible for assessing security vulnerabilities associated with a wide variety of wireless systems. Industry Semiconductors / Electronics functional
and organizational level towards in-house management and our customers Select suitable security base technologies, security components, security products, and cryptography Develop and present feasibility studies, decision papers and ideas for new automotive security solutions Work closely with our local and remote
of Information Security including malware, emerging threats, attacks, and vulnerability management. Experience with reviewing raw log files, data correlation, and analysis (i.e. firewall, network flow, IDS, system logs).Certified Forensic Examiner (GCFA-GIAC, CCFP, etc.), CISSP or equivalent certification
in Operational Risk Management, Business, IT and other control functions, the Low Touch Electronic Trading Analyst is expected to contribute to: Administration of the Governance Framework for Low Touch Electronic Trading across the Firm Oversight and challenge of risk management in the first line business
with software developers to develop strategies and plans for improving both Architecture and application security. In this role it is necessary to insure the technology is in compliance with Information security standards. Responsibilities include: Interprets and translates the information security
investigations into security breaches using all available tools within Customer environment, Cisco, and online: • Review device logs, full packet capture, and all forms of telemetry to meaningfully interpret data • Conduct online forensic investigations of devices (UNIX, Linux, Windows hosts and mobile