Get new jobs by email
- ...JOB MANDATE This position helps in achieving operational efficiency and consistent security services through: Supervising the CCTV System Officer inoptimizing all software, hardware, data, procedures, and personnel of their respective PSCOC's in accomplishing their...
- ...incidents. Defuse guest/employee disturbances. Call for outside assistance if necessary. Complete incident reports to document all Security/Loss Prevention related incidents. Resolve safety hazard situations. Escort unwelcome persons from the property. Report to scenes...
- ...Join us now and enjoy the Hilton experience for yourself. A CCTV Operator keeps constant vigilance of activity on and around the... ...What will I be doing? As a CCTV Operator, you will assist the Security team to ensure safety and security of all Guests, Team Members and...
- ...Job Description: The CCTV Tech is primarily responsible for the remote configuration, testing, and maintenance of CCTV systems and... ...and data retention. The role also involves coordinating with IT, security, and vendor teams for system upgrades, network integrations, and...
- ...Job Description: The CCTV Operations Officer implements the day-to-day CCTV surveillance operations and other CCTV functions. This... ...request. Maintain close collaboration with other members of SPX Security, Hub Leads, Area Leads and of other SPX teams. Ensure...
- ...About The Job The primary role of Security Operations Officer is to ensure strong physical security posture in NCR office sites to protect... ...Undertake operation of all security systems equipment such as CCTV, DACS, Fire Detection and Alarm System (FDAS), Public Address...
- ...Job Description: Responsible for security management in Shopee warehouse, ensuring the safety of company assets and personnel. . Develop... .... . Managing facility and infrastructure support in build up cctv coverage in place ensuring it has managed function as intended...
- ...Responsibilities: Oversees security operations within assigned areas of responsibility. Responds to incidents, implements emergency programs, and supports safety drills. Monitors CCTV systems, identifies potential risks, and recommends smart solutions. Leads...
- ...Good Security Management skills Experience in managing safety and security of work place Experience in monitoring and maintaining security systems such as CCTV fire alarms and access control systems. Ensure compliance with all local security privacy and safety...
- ...communities we serve. The Opportunity The Section Manager, Security, is a key leadership role responsible for developing,... ...maintenance, and upgrading of all physical security systems, including CCTV surveillance, access control systems, intrusion detection alarms...
- ...experience for yourself. What will I be doing? As the Security Supervisor, you will be responsible for performing the following... .... When suspicious people enter the elevator, promptly inform CCTV and relevant departments to pay attention, preventing unauthorized...
- ...Purpose Responsible for overseeing and strengthening physical security operations to safeguard employees, visitors, contractors, and... ...emergency systems, including: Door access control systems CCTV and surveillance systems Emergency lighting o Fire extinguishers...
- ...Maintain a safe and secured environment for employees, clients and visitors by enforcing security policies and procedures. Provides... ...issues and risks. Implement the physical access control and CCTV monitoring and provide recommendations for improvement. Identify...
- ...As a Security Operations Analyst, you will support governance, compliance, and security-related initiatives within the IT department. Serve as escalation point for alerts and vulnerabilities. Coordinate incident triage, vulnerability scanning, and remediation tracking...
- ...name and description Senior Associate – Facilities, Safety and Security Rank 65 / Grade 3 Under the guidance of the WES Leader –... ...the security service provider. • Manage access control systems, CCTV monitoring, and incident logs. • Implement and enforce...
- ...safe in the world of Cyber. With a key focus on engineering and automation, this role focuses on implementing strategic solutions to security problems, providing a secure environment for our customers and colleagues to operation in, without large operational overheads....
- ...difference, we are confident that we can achieve this goal. Job Description Leads the design, implementation, and optimization of security capabilities. Builds reusable modules and self-service tooling to make it easier for developers and project teams to integrate and...
- ...Europe #1 bug bounty platform, with offices in Paris, Singapore, Switzerland, Germany. We provide a disruptive approach to Cyber Security through Bug Bounty programs, by connecting more than 100,000+ Ethical Hackers worldwide with organisations to secure their exposed...
- ...Zone IT Solutions is seeking an experienced Security Consultant. In this role, you will provide expert advice and guidance on a range of security issues, helping to improve our clients' security posture and compliance. Requirements Responsibilities: Assess clients...
- ...vulnerability management lifecycle from identification, remediation to reporting Active monitoring and detection of operational security risks in the organization Conduct technical investigations on security incidents and tools Liaise directly with users on...
- ...compliance with safety signage, traffic flow, and pedestrian lxanes inside the warehouse. Security & Loss Prevention Work with Security personnel to monitor access controls, CCTV, and alarm systems. . Prevent unauthorized access, theft, and pilferage of inventory....
- ...Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...analysis to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation, and dissemination of intelligence. Collaborate with the Head...
- ...manipulation, and analysis. Compile and analyze data from multiple sources to identify trends and insights. Monitor and review CCTV footage to gather evidence and conduct investigations. Connect findings from data analysis and CCTV footage to establish the...
- ...About the Role: Design, scope, and perform offensive security engagements from planning through execution and reporting Perform application penetration testing against mobile, Web, API, and on premise applications to identify security vulnerabilities Conduct...
- ...to continuously enhance the vulnerability management program Requirements Bachelor's degree in information technology, cyber security, or a related field. Prior experience in vulnerability management, programming, or a related technical role is highly desirable...
- The Opportunity The Security Engineer is pivotal in delivering, managing, and supporting security solutions that ensure our customers' environments are secure, efficient, and resilient. This role combines hands-on implementation, customer enablement, project leadership...
- ...At JSC, we are scaling our technology capabilities across a broad array of leading platforms. Our team is responsible for both security operations and strategic improvements, delivering the technology and business solutions that will revolutionize how our various business...
- ...The Security Consultant role at NCC Group is focused on offensive security , identifying and demonstrating vulnerabilities in client systems before they can be exploited by malicious actors. By providing an attacker's perspective, the consultant helps clients proactively...
- Design, develop, and implement security solutions to safeguard digital assets and business operations. Integrate security controls into enterprise systems, applications, and processes to protect against cyber threats, unauthorized access, and data breaches. Project...