Local ITE or higher in education. 1 to 2 year Experienced in installation, diagnose, trouble shooting & resolve any technical related issuesInterested…
Record and update all registers and occurrence books at the security post. Issue relevant security passes to the different categories of personnel (e.g. sub…
Communicate with Splunk customers to understand security architecture, infrastructure, and cyber security objectives in order to map a customer’s security…
Ethical Hacking - this discipline covers vulnerability assessment, application and network penetration testing, wireless security, mobile security, and system…