Security Operator I, Cloud Computing Technologies Small Business Labor Rate, under adequate supervision, protects organizational data and systems against theft, vandalism, social media threat, intranet and internet attack, ransom, and other security threats. Ensure the maintenance and enforcement of security polices within the internal and external environments of the organization. This may involve maintaining reports, checking security systems status, and maintaining the security software. Troubleshoots and resolves access issues related to door hardware, name changes, systems controls, access level changes, visitor registration, parking access, contractor badge access, and/or badge malfunctions. May have 2-5 years of experience in this field, with at least one year of satisfactory full-time professional experience in a command department or intelligence environment in one or a combination of the following: Department of Homeland Security, emergency management, fire or police services, public safety services, public health services, public administration, urban planning, engineering, military service or any other specialized area that relates to public or private command center operations. Proficient in relevant Computer operating Systems such as Windows, Linux, and Unix; computer programming languages and database languages such as Python, Java, C++, SQL, and MySQL; Cloud Computing Technologies; Surveillance Systems and Software; Cyber Security Technologies; and Ethical hacking. Possesses the ability to think quickly and multitask during emergencies. Have excellent organizational skills and able to prioritize responsibilities according to importance. Have experience working with modern day video monitoring tools and equipment. Offer support for client’s facilities, security systems, employee relations investigations, crisis management team, and law enforcement relations. Collect and analyze operational data and take appropriate corrective actions. Assist with creating security mechanisms to safeguard organizational facilities, property, clients, and staff. Implement secured surveillance policies to mitigate threats against the organizational operations and business processes. Adopt intelligence gathering mechanisms in collecting and following both local and global intelligence reports and determine the appropriate dissemination and handling of such information in conjunction with senior level Security Operators. Works under the guidance of the Senior Security Operator.
Further rates within this Security Operator I category.
Purchasing Coordinator (verified owner) –
We appreciate CCT’s efforts in providing us a team of highly-skilled Security Operators. The overall security of our platform is in great order. Job Well Done!