PEM SECURITY GUARD NETWORK
1. Souting for new business relationship 2. Recruit of guards 3. Vetting and background checks of potential guards. 4. Training of guards. 5. Deployment of guards 6. Supervision of guards. 7. Sourcing for potentials guards
•
1 . Managing computer hardware 2. Working with operating systems 3. Network administration 4. Troubleshooting 5. Software development 6. Database administration 7. Project management 8. Information security 9. Collaboration with systems administrators and system analysis