MAINTENANCE
- Installation, configuration and maintenance of hardware and software systems.
- Troubleshooting and repair computer.
- Setting up and maintaining server rooms, data centers, and network infrastructures.
- Implementing security measures to protect against cyber threats.
- Managing backups and data recovery solutions.
- Providing helpdesk services and end-user support.
- Collaborating with other departments to develop and implement technology solutions that improve company operations.








IT SERVICES
- Installing, configuring, and maintaining network security devices and applications (Security system, IDS, IPS, etc.)
- Import POS system for (markets, stores...)
- Maintenance of security system, POS system
- Developing and enforcing IT security policies, standards, and procedures.
- Monitoring network traffic and endpoint devices for security threats and other malicious activities.
- Conducting security incident response and forensics investigations.
- Providing employee security awareness training.