Discount Offers

SIA Security Notebook SIA Approved Licensed Security

£5.75
End Date: Wednesday Apr-19-2017 12:03:34 BST
Buy It Now for only: £5.75
Buy It Now | Add to watch list

Tactical ID Arm Band Security ID Badge Card Holder Doorman Armband SIA New

£2.49
End Date: Saturday Apr-1-2017 11:47:24 BST
Buy It Now for only: £2.49
Buy It Now | Add to watch list

Tactical ID Arm Band Security ID Badge Card Holder Doorman Armband SIA New

£2.49
End Date: Saturday Apr-1-2017 11:47:24 BST
Buy It Now for only: £2.49
Buy It Now | Add to watch list

Farb Gel UK Legal Self Defence Spray Personal Security Protection, Legal CS alt

£8.99
End Date: Thursday Apr-27-2017 12:07:14 BST
Buy It Now for only: £8.99
Buy It Now | Add to watch list
0024177
Visit Today : 1
Visit Yesterday : 1
This Month : 29
This Year : 88
Total Visit : 24177
Hits Today : 329
Total Hits : 1276610
Who's Online : 1

microsoft

Security Officer – Barlborough

Security Officer - BarlboroughBASE/ LOCATION:
Barlborough

JOB PROFILE NAME:
Security Officer LINE MANAGED BY:
Facilities Service Manager PROFESSIONALLY REPORTS TO:
Facilities Service Manager

ROLE OVERVIEW Reporting to the Facilities Service Manager, the role of Security Officer involves working with a team of security guards to provide an efficient and professional security service to everybody on site. This is a permanent opportunity working various shifts. PURPOSE OF THE JOB The Security Guard is responsible for ensuring that all staff and visitors are in a safe and secure environment. KEY OBJECTIVES OF THE JOB

  • Provide a professional, efficient, and approachable security service whilst maintaining a high level of customer service to staff and visitors at all times.
  • Carry out internal and external patrols, day and night to ensure a safe and secure environment, recording maintenance issues, potential breaches of security or unusual occurrences in the Daily occurrence book .
  • To provide visitors to BT, with helpful advice, guidance and information and if not able to do so, direct to other members of staff who can assist.
  • Ensure that those who should not be granted access to the building are professionally and politely prevented from gaining access or escorted from the building.
  • Provide support in an emergency or evacuation situation, in a calm and professional manner. Actively provide information to any emergency services when requested to do so.
  • As part of the team undertake regular testing of fire alarms and other security equipment, completing the appropriate logs, and notifying the Facilities Service Manager of any issues of malfunctioning equipment.
  • Ensure and regularly check that all fire exit doors are maintained free of obstructions, reporting any defects or maintenance issues as appropriate.
  • Monitor and respond immediately to alarm system activations to check designated areas of concern. Effectively use the PA system to notify BT staff and patrons of situations or actions required of them.
  • Ensure that BT s CCTV system is professionally, effectively and sensitively monitored in compliance with BT s agreed standards.
  • Conduct individual bag or property searches, if directed to do so by the Security Manager or other senior manager.
  • Ensure the effective control and maintenance of keys and security equipment including any equipment e.g. radios.
  • Conduct routine security administration including the issue of staff and visitor passes.

    Ensure that any lost property left is securely stored, recorded and retrieved for the owner where appropriate.

  • Maintain all security related equipment and working areas to a high standard of cleanliness and safety and ensure all defects are reported.
  • Complete relevant records and log books, in a professional manner providing sufficient detail.
  • Where necessary assist in the removal or escort of members of the public from the building where their behaviour is disruptive or presents a risk to others.
  • Support and comply with the Fire, Health and Safety, and Security policies and procedures.
  • Undertake first aid training and provide first aid services to staff, visitors or patrons as requested.
  • Working with a Building Service Technician or Fire Officer, carry out the evacuation of people from lifts, to minimise panic and ensure the safety of all concerned.
  • Assist in the induction and training of new members of the team.
  • Deal with any suspicious packages, maintaining own and others safety and dealing with these in accordance with BT procedures.
  • Actively maintain the confidentiality of information to which Officers will be privy, be this around individuals or security sensitive information in relation to the Building, and using appropriate language, particularly within the public door working environment.
  • Undertake any other duties as may reasonably be required by the Security Manager, Facilities Manager and/or BT management.
  • Adhere to company policies, including PPE Procedures
  • May be required from time to time to support the FM team
  • The colleague must understand their environmental responsibilities and follow the BTFS environmental policy.

    They must follow BTFS procedures and routines correctly to make sure that their work is in line with the environmental policy and support the business in achieving its environmental objectives.

OPERATIONAL ACCOUNTABILITIES

Typically:

  • Responsible for the completion of a variety of straightforward, stand-alone tasks or high-volume transactions within set rules and instructions
  • Takes instruction and will be subject to regular local supervision of progress against results and escalates issues when required
  • Likely to be a member of a team that focuses on day-to-day routine tasks
  • Responsible for the delivery of their own defined set of work including planning and decision-making
  • Interacts with stakeholders around specific work efforts and deliverables
  • Supports delivery of Health and Safety policy and standards
  • Plays a role in a One Team approach, assisting other departments when possible

FINANCIAL ACCOUNTABILITIES

Typically:

  • Has awareness of cost/benefit as applicable to tasks performed

PEOPLE ACCOUNTABILITIES

Typically:

  • Not typically responsible for supervising others- if they do, spends more than 80% of time as a team member rather than supervisor
  • Not responsible for the development of others

KNOWLEDGE AND APPLIED SKILLS

Typically:

  • Able to perform role to the required standard within a short period after completion of training
  • Current first aid certificate from a recognised Institution
  • Current SIA essential
  • Capable of using the Microsoft Office packages (Work, Excel, Outlook) and generally IT literate with knowledge of electronic security systems.

BEHAVIORAL COMPETENCIES

Typically:
People Success Factors:

  • Planning & Organising
  • Building Relationships
  • Delivery through People
  • Business Awareness
  • Customer Focus
  • Contributing to Continuous Improvement
  • Dealing with Change
  • Be customer focused with a smart presentable appearance and willing to uphold the BT s customer service approach
  • Strong verbal and written communication skills
  • Excellent inter-personal skills
  • Security experience preferably as part of an in-house team
  • Ability to maintain a sense of calm and control in difficult situations, minimising panic in others
  • Reliable with excellent timekeeping
  • Ability to use initiative and be adaptable
  • Self-motivated with a willing and friendly approach
  • Willingness to undertake a flexible shift pattern, to include night shifts in accordance with BT Sport s roster
  • Ability to respond appropriately to alarms
  • A good knowledge and appreciation of current security environments, the potential risks and threats and actions to mitigate these

ADDITIONAL ROLE INFORMATION

  • To liaise daily with your Line Manager reporting to them any information relevant to the provision of the service
  • Good communication skills
  • Understanding of security specification
  • Ability to work as a team
  • Health and Safety awareness

Other Responsibilities

  • To perform any other duties which may be reasonably required by your Line Manager or the company

He/she may be required to attend any training at the company s request.

To apply please send your CV to Rachel.gedge@bt.com

More: Security Officer – Barlborough

Microsoft Releases Azure Blueprint To Support UK Government …

Microsoft says its Azure Blueprint for the UK Government s Cloud Security Principles will provide the highest level of security for cloud services. Azure Blueprint for the UK Government details how services built on Microsoft s cloud platform1 implement the 14 cloud security principles2 published by the UK s National Cyber Security Centre, which include practices around data governance, authentication and operational security.

Microsoft Releases Azure Blueprint To Support UK Government ...

The Azure Blueprint UK Government Customer Responsibilities Matrix outlines how Azure implements security controls designed to satisfy each security principle and assists customers in understanding how they may implement safeguards within their Azure solution3 to fulfill the requirements of each principle where they hold a responsibility, said Matt Rathbun, chief information security officer for Azure Government. Microsoft has also released a Blueprint compliance architecture ARM (Azure Resource Manager) template on GitHub, which provides a baseline from which customers can build secure environments in line with the cloud security principles4.

In other Microsoft news, business communication service Yammer5 has been integrated into Office 365 Groups, enabling users to connect and communicate with colleagues across their organisation.

When users create a new group in Yammer it will automatically be part of the Office 365 Groups environment, providing a OneNote notebook, Planner for task management, a SharePoint Online site and a document library.

Microsoft Releases Azure Blueprint To Support UK Government ...

All shared resources can be access directly from Yammer by all group members, with group membership queries based on Azure Active Directory attributes such as role, location and manager.

This integration between Yammer and Office 3656 Groups affects customers who have enforced Office 365 identity in their networks, and have only one Yammer network associated with their Office 365 tenant, added Connie Woo, product marketing manager at Yammer.

The full rollout of Office 365 Groups will take place in phases, which will connect Office 365 Groups7 with existing non-connected Yammer groups and remaining Office 365 tenants.

You can also look forward to integration with Outlook Calendar as well as greater enhancements to Yammer integration with SharePoint Online and Planner.

Quiz: The history, products and people of Microsoft8

To fully grasp the potential benefits of the Internet of Things, look no further than General Electric . GE is making a big bet on industrial Internet of 9

If you were to stop anyone working at SunTrust and ask them, What is the purpose of your role ? I’d wager that not only would they be able to give 10

Digital transformation is one of the key opportunities in today’s business for CIOs to increase leverage with their internal and external customers .

Digitization 11

References

  1. ^ Microsoft s cloud platform (www.silicon.co.uk)
  2. ^ 14 cloud security principles (www.ncsc.gov.uk)
  3. ^ within their Azure solution (www.silicon.co.uk)
  4. ^ cloud security principles (www.silicon.co.uk)
  5. ^ business communication service Yammer (www.silicon.co.uk)
  6. ^ integration between Yammer and Office 365 (www.silicon.co.uk)
  7. ^ which will connect Office 365 Groups (www.silicon.co.uk)
  8. ^ The history, products and people of Microsoft (www.silicon.co.uk)
  9. ^ (www.trustopen.net)
  10. ^ (www.trustopen.net)
  11. ^ (www.trustopen.net)

Security researcher breaks Google ReCaptcha with Google tools

Security Researcher Breaks Google ReCaptcha With Google Tools

Security research has cracked the captcha conundrum nightmare

A SECURITY RESEARCHER HAS EARNED HIS MONEY this week by poking a fat hole into the Google Captcha system by turning Google on itself.

The attack is simple, but that doesn’t mean that it is not capable . In very short terms, it takes the audio Captcha challenge from Google, runs it through Google’s voice recognition technology and throws it back as a response.

A teaser on GitHub introduces us to the easy logic vulnerability attack1, while a more detailed blog on the East-Ee Security site provides the necessary information . There we learn that some human interaction is involved because it is necessary to select the audio ReCaptcha option.

ReBreakCaptcha knows how to solve ReCaptcha v2 audio challenges . Therefore, we need a methodology of how to get an audio challenge every time2 . What is our goal ? To bypass the ReCaptcha . Can we do this ? Yes . How ?

Google Speech Recognition API!,” says our anonymous poster. Google helps out by offering the challenged user the chance to download the audio file challenge . This makes the crack much easier.

“Now comes the fun part, taking advantage of one Google’s service to beat another Google’s service ! Let’s download the audio file and send it to Google Speech Recognition API,” adds the blog.

“Now we have the audio challenge file and are ready to send it to Google Speech Recognition . How can this be done ? Using their API.

“Before doing so, we will convert it to a wav’ format which is requested by Google’s Speech Recognition PI.”

So what we have here is something of a dog bites dog incident . Except someone has incited the dog to bite itself and got a python involved .

The research used a Python library named SpeechRecognition and got nothing but positive results.

“We will use this library implementation of Google Speech Recognition API . We will send the wav’ audio file and the Speech Recognition will send us back the result in a string (e.g .

25143′) . This result will be the solution to our audio challenge,” adds the blog.

“The verification stage is fairly short . All we need to do now is to copy-paste the output string from Stage 2 into the text box and click Verify’ on the ReCaptcha widget . That’s right, we now semi-automatically used Google’s Services to bypass another service of its own.”

A proof of concept is posted on GitHub.

References

  1. ^ Github (github.com)
  2. ^ East EE blog (east-ee.com)