Security Job in Iritty

Iritty, Kerala Full Time Date: 19 June 2024

Job description

Access Control: Managing and controlling access to facilities, buildings, and sensitive areas through measures such as security guards, access badges, electronic locks, and biometric systems. Perimeter Security: Securing the physical boundaries of premises with fencing, gates, barriers, and surveillance to prevent unauthorized entry. Surveillance: Monitoring and recording activities using CCTV cameras and surveillance systems to deter crime, monitor premises, and investigate incidents. Personnel Security: Security Guards: Employing trained security personnel to patrol premises, monitor activities, and respond to security incidents. Visitor Management: Implementing procedures for verifying and managing visitors' access, issuing visitor badges, and recording visitor information. Information Security: Cybersecurity: Protecting digital assets, networks, and information systems from cyber threats such as hacking, malware, phishing, and data breaches. Data Protection: Safeguarding sensitive and confidential information through encryption, access controls, data backups, and secure disposal practices. Emergency Preparedness: Emergency Response: Developing and implementing procedures for responding to emergencies such as fires, medical emergencies, natural disasters, and security incidents. Evacuation Plans: Establishing evacuation routes, assembly points, and conducting drills to prepare occupants for emergencies. Risk Assessment and Management: Threat Assessment: Identifying potential threats, vulnerabilities, and risks to security through risk assessments and security audits. Risk Mitigation: Implementing strategies and controls to mitigate identified risks, enhance resilience, and improve security posture. Security Policies and Procedures: Policy Development: Establishing security policies, guidelines, and procedures to define roles, responsibilities, and expectations for security practices. Compliance: Ensuring compliance with legal and regulatory requirements related to security, privacy, and data protection. Training and Awareness: Security Awareness: Educating employees, contractors, and stakeholders about security threats, best practices, and their role in maintaining security. Training Programs: Providing training programs for security personnel and employees on security protocols, emergency response, and incident management. Incident Management: Incident Response: Developing protocols and procedures for detecting, reporting, assessing, and responding to security incidents promptly and effectively. Investigation: Conducting investigations into security breaches, incidents, or violations to determine root causes, identify perpetrators, and implement corrective actions. Physical and Environmental Safety: Health and Safety: Ensuring workplace safety through measures such as fire safety, hazard assessments, ergonomic practices, and compliance with occupational health and safety regulations. Integration and Collaboration: Coordination: Collaborating with internal departments (e.g., IT, facilities management) and external stakeholders (e.g., law enforcement, emergency services) to enhance security measures, share information, and respond to security challenges effectively.