System Management: Oversee, operate, and monitor security systems, addressing and troubleshooting complex issues.
Access Policy Configuration: Implement and configure access policies and deploy approved security regulations and policies on security devices.
System Deployment: Plan and execute the deployment of new or upgraded security systems.
Security Planning and Design: Contribute to the planning, architectural design, and implementation of security systems. Prevent and mitigate threats such as viruses and malware to ensure system safety and security.
Research and Updates: Regularly research and stay updated on new security solutions, technologies, and trends. Analyze and recommend timely prevention, containment, or warning measures.
Vulnerability Management: Scan for vulnerabilities, identify, evaluate, and patch security system weaknesses.
Reporting: Report on system status, security incidents, and vulnerabilities. Propose and implement immediate corrective actions to leadership.
Maintenance and Support: Perform maintenance tasks, manage software licenses, and handle warranty services for security devices.
Documentation: Compile and manage technical documents, operational processes, and regulations related to security systems. Maintain updated work logs, incident logs, and technical records daily.