Threat targets such as devices, information, and infrastructure can be vulnerable to threat actors who consistently attempt to compromise them. The impact of cyber attacks can be devastating to individuals, organizations, businesses, and government institutions when they are unable to Keep information in threat targets from being compromised by cybercriminals, hacktivists, terrorist groups, insider threats, nation-states and thrill-seekers. The resultant reputation damage, litigations, huge financial and time loses can be avoided.
How to Protect Yourself from Ransomware
How to Protect Yourself from Ransomware
Ransomware is a quickly growing form of cyberattack that can have devastating consequences for an individual or business. Ransomware is a type of malware, not unlike a virus, that infects a system and locks out access to extort money from the user or business. Losing access to data and software can be devastating to a business that relies on it and attackers make use of that to extort large sums of money from them.
There are very few options once your system has been infected with a carefully crafted ransomware attack. So don’t wait until ransomware becomes a problem to begin looking to defend yourself. There are several options you can use to prepare and protect yourself against ransomware attempts on your data.
Be Aware of the Common Methods of Attack
For malware to infect your system, it must get into your system. There are different ways that an attacker can accomplish this, but all of them are avoidable if you are vigilant and stay aware.
Emails and messages are likely one of the most common means of attack. Phishing emails pretend to be official emails that seek to get information or access to a system. If an email has an attachment or link, clicking it could install malware, including ransomware, onto your system. Once malware infects your system, it can use your contact list to send copies of itself to all your friends and colleagues. We’ve talked about phishing emails before if you want to learn more about how to identify them. In general, if you receive an email with a link or attachment, check that you know for certain that it’s from a trusted source. Look for any subtle mistakes or anything that seems off, especially with the sender’s address. If you’re uncertain at all, contact your IT department to be sure. All of this can apply to social media messages as well.

Another source of malware such as ransomware is suspicious websites. Do not download anything from a website or click buttons, links, or popups unless you’re certain the website is a trusted source. Even if it looks like an official website, double check the URL and look for suspicious mistakes. If you’re uncertain or the website feels suspicious, leave the site immediately.
Attackers will also sometimes use harmless-looking devices to access your computer. Check out our previous article to learn more about these devices, but the important thing is to not connect any device to your computer if you don’t know where it came from. Even if it seems like a thumb drive that someone dropped, and you want to identify it to return it to the owner. Do not connect your computer to any unfamiliar Wi-Fi networks. Hackers can use these devices to install ransomware onto your computer.
Keep Your Software Up to Date
Your computer and network’s security software helps keep you safe even if malware manages to slip onto your system. Sometimes you may miss something or an attacker uses a new avenue of attack you didn’t expect and some ransomware manages to get onto the system. Your antivirus, anti-malware and firewall systems are your next line of defense to catch the malware that squeezes through.

An up-to-date security software system can regularly scan for and detect suspicious activity and isolate it before it does any damage. These systems usually work by recognizing patterns of code or behaviour associated with malware, but attackers are constantly trying to change their method of attack to get around these systems. For that reason, the makers of anti-malware software are constantly releasing updates to stay ahead and keep your system safe. Make sure these updates get installed so your system is not vulnerable to attack from new techniques.
Attackers also regularly look for flaws in your systems and software to find a new method of attack. Whenever software companies become aware of a vulnerability in their system, they create an update or patch to fix the issue. You also want to make sure your systems and software is always up-to-date, especially your operating system.
DigitalJTI offers system maintenance services so we can keep all of these systems up to date for you. Allow us to make sure your computer isn’t vulnerable to attack.
Keep Your System Backed Up in Case of Emergency
Even with all of the above advice, some especially slippery ransomware from an especially clever attacker may still slip through. If you are properly prepared, these attacks can become no more than a minor annoyance. If you keep your system and files backed up on a separate platform, in the event of a ransomware attack taking away your access, you can simply wipe your system and restore it to regain access.
If you would like help maintaining system and software backups for your computer, we offer backup and recovery services that can get you up and running in minimal time in the event of a ransomware attack.
Conclusion
Ransomware attacks can be devastating to individuals and businesses, costing large sums of money and loss of business. But if you know what to look out for and are prepared, you can reduce the threat significantly. Don’t let your system be held ransom, be aware.
5 Business Security Tips to Protect Your Workplace
5 Business Security Tips to Protect Your Workplace
In the digital age we find ourselves in, security is more important than ever before. Keeping customer and employee personal information, sensitive business information and assets out of the hands of would-be attackers requires cooperation from every person in a business. All it takes is one person thinking a suspicious situation is harmless to result in an attacker gaining access.
For many, the very word “hacker” draws to mind a mysterious figure in a hoodie sitting in a dark room and typing furiously on a keyboard. It seems to be all about password cracking and creating backdoors into systems. Either they’re too good to be stopped or a good enough firewall will keep them out, right? However, while there are some brute-force ways to attack a system the reality is that most hackers operate more like con-artists and scammers; piecing together pieces of information from discarded documents and gaining the trust of unsuspecting employees.
This approach to beating security is known as social engineering and it is one of the most insidious weapons in an attacker’s arsenal. It takes advantage of the fact that people tend to let their guard down when everything seems normal and safe. Even the most level-headed and reasonable person can be fooled by social engineering if they don’t have reason to believe the behaviour is suspicious. We at DigitalJTI have compiled a list of 5 security tips that you can use to identify suspicious behaviour so you can help keep your workplace and your personal information safe from attack.
#1 Do Not Leave Sensitive Information Where Others Can Find It
This one seems deceptively straight-forward, but it can take a lot of awareness and discipline to keep information from slipping into the wrong hands. Desks and garbage bins seem like they’d be safe from intrusion, but they’re favored places for information gathering for attackers. You should be careful to file and dispose of documents, even informal ones, properly.
Beyond the obvious, you should pay special attention to business information such as names and personal information of employees and customers, internal phone numbers, dates and times of meetings and other internal events and anything else that’s not publicly available. This sort of information can help an attacker gain access to the system or provide a lead to where they can get that access. If you’re uncertain, it’s better to treat the information as sensitive.
Documents should be carefully organized and stored to prevent unwanted access. Sticky notes with reset passwords or a business card with a colleague’s personal email should be carefully tucked away in a secure place if still needed or destroyed if not. If left on a cluttered desk, even for a few minutes, they can be easily viewed by someone walking by or quickly searching your desk. Sensitive documents should be filed away somewhere that can’t be accessed quickly and easily by someone looking. If they must be stored on the desk surface, keep them organized and stored in a way that they can’t be easily identified at a glance. The more time it would take for a would-be attacker to find something, the less likely they will be to take the risk of being caught. A clean and organized desk goes a long way towards this and allows you to quickly recognize if something sensitive goes missing so you can report it.
Documents with sensitive information to you or the business that are no longer needed shouldn’t be simply discarded in the trash. Hackers have been known to dig through garbage bins and dumpsters to find sensitive and useful information. Sensitive documents should be shredded or thoroughly torn up to ensure they cannot be read by anyone getting them. A general policy of shredding all discarded documents would be even better to ensure nothing slips through.

#2 Do Not Put Sensitive Information Online
This is another one that appears simple on the surface. Anything that gets put online can have a traceable record and can be potentially accessed by anyone from anywhere. This can be as simple as sending the password to access the online store in an email to a coworker or posting on Facebook to complain about a meeting you must attend this weekend.
A savvy hacker can potentially breach a less-secured system or monitor wireless signals to steal data as it is transferred. You should be especially careful of anything posted publicly or used in a public place such as a coffee shop. Some hackers use devices known as packet sniffers to snatch signals such as emails through a network which they can then access if they’re not properly encrypted.
Even basic information that seems harmless can be used by attackers. Good social engineers can piece together shreds of information from multiple people. A Facebook post with a couple employee names here, a Tweet about a meeting there, and an attacker can build up the information necessary to launch their intrusion attempt. If it’s information the business doesn’t actively make public, it’s best to avoid putting it in a public place just to be safe.
#3 Be Wary of Unknown People Even If They Seem Like They Belong
Social engineers are good at pretending they belong and coming across like they know you. You likely believe that you’ll immediately recognize a would-be intruder as suspicious, but it’s not as straight-forward as we tend to think.

Consider this: have you ever had someone come up to you who knows you by name and is friendly, but you don’t remember them? Maybe they were introduced by a mutual friend or they met you at an office event. Likely you didn’t want to admit you didn’t remember them and chose to be friendly back. Chances are they were who they said they were, but this is exactly the kind of situation where social engineers shine. This is also where the information from tips #1 and #2 can be useful to attackers. They can make their presence in the company seem more authentic if they can show they know your name and face (which they got from a document in the dumpster) and can recount a funny story from the recent office Christmas party (which they saw you post about on Facebook). If you don’t remember them and they can’t prove their identity, don’t trust them with access to the office or documents.
A common trick for social engineers is to act like someone official who just needs their password reset or access to an area to do their job. They make you feel sympathetic to put you off guard; they’re in a hurry, their boss is breathing down their neck, and they were so flustered they forgot their password, couldn’t you just help them out? Even if they seem like they belong and you feel like you should give them a break, don’t help them if you don’t recognize them and can’t confirm they should have access. Instead, find someone who can confirm their identity and access such as an administrator or the IT department to help them out.
#4 Do Not Interact with Suspicious Messages
Another common tactic for would-be hackers is trying to get information electronically, especially via email or social media. This is known as phishing and can be as insidious as the methods mentioned in tip #3. We’ve all probably seen obvious phishing attempts: poorly worded messages requesting banking info or password resets. It can be easy to conclude that phishing messages are easy to identify, but this is not always the case. Some attackers use carefully crafted emails that look nearly identical to official emails sent by a company.
Another risk from messages is malware: dangerous software meant to harm or steal from your computer, such as viruses. A message may contain an official-looking link or attachment, such as what appears to be a Word document from your department head. Clicking on such an attachment or link can give the malware a chance to install itself on your computer where it can damage the system or even copy files and data to send back to the hacker.
If you receive any emails or social media messages that appear official, but request sensitive or personal information, or have attachments or links, take a moment to confirm the email is from a trusted source. Look for small mistakes in any images, logos, or titles, and confirm that the sender name and email is correct. Mistakes and misspellings, especially in the sender name or address, can indicate a phishing message. If you’re uncertain, contact your IT department for advice.
#5 Beware of Suspicious Devices
Our last tip for today covers a couple seemingly-harmless devices hackers can use to trick people. If you find a lost USB thumb drive, do not use it. It may seem like someone forgot it on a table or dropped it on the floor. You might think you should plug it into a computer to see if you can identify who it belongs to so you can return it. However, while most thumb drives are simply a storage device for files, a hacker can set one up to automatically access your system when plugged in, stealing the data on your computer, or creating a backdoor access for them. Then they just have to leave it somewhere where it looks like it was forgotten. If you find a thumb drive or similar device, instead ask around to see if you can find who lost it or turn it over to your IT department to deal with.

Another device some hackers use, sometimes called a pineapple, appears like a regular Wi-Fi router. However, it can track any data sent through it by computers that connect to it. They’re often named in ways that seem sensible. If you notice a new open Wi-Fi network appears near your workplace, or the coffee shop you’re taking your lunch break in has a second Wi-Fi network with the same or similar name, do not connect to it.
Conclusion
Attackers have a wide range of subtle techniques for getting access to sensitive information. But they can be stopped if we all remain aware and vigilant. You should always be careful with how you manage sensitive documents and information and destroy them properly when they’re no longer needed. You should be careful of people and messages who can’t be identified, even if they seem legitimate. You should be careful of unfamiliar digital devices even if they appear innocuous. Security starts with the individuals and so long as we’re all alert and careful we can keep our businesses safe.
Computer Systems Technician
Computer Systems Technician
JOB DESCRIPTION
Computer systems technician will be responsible for installation, maintenance and repair of business electronic equipment such as audio and video systems, mobile phones, computers and peripherals, office equipment and other communication electronic equipment and assemblies.
KEY RESPONSIBILITIES
- To act as the day to day lead for all Computer hardware, peripherals, devices, phones and software technical support and maintenance activities.
- To provide expert advice both within the Company and externally on all aspects of electronics repairs.
- To be responsible for the preparation and monitoring of the Computer hardware, peripherals, devices, phones and software maintenance policies of the Company, including identifying Information and communication technology trends and new legislation and making appropriate proposals to meet changing situations.
- To be responsible for the programming and scheduling of Computer hardware, peripherals, devices, phones and software technical support services with appropriate procedures, including the preparation of delivery plans, strategies and budgets.
- Work closely with the Systems Integration Team to ensure that all forecast programmed targets in relation to Computer hardware, peripherals, devices, phones and software repairs are met.
- To be responsible for the delivery of our computer and electronics project tests.
- To provide an effective administration of other forms of technical support and overseeing the process for disposing of properties considered surplus to requirements.
- To ensure that the equipment leases and software licenses entered into for or on behalf of the company are regularly monitored, updated and renewed as required by the lease terms.
- Ensure the delivery of an excellent quality support service against Key Performance Indicators, which are continually improved and meet the diverse needs of stakeholders.
EDUCATIONAL QUALIFICATIONS:
Completion of a university degree in engineering/sciences or two to three years college program in electronics or Completion of a four-year apprenticeship program in electronic servicing and repair.
EXPERIENCE
Experience in electronics repairs, maintenance, design, build and documentation, particularly in Computer hardware, peripherals, devices, phones and software products is required. Candidate must be proficient in use of diagnostics tools, android and IOS administration techniques and use of other applicable mobile software systems. Relevant certifications and ability to code in Apps development languages including Java, Javascript, js, C#, C++, HTML5, PHP and use a wide variety of system development tools will be an advantage.
OTHER SKILLS
English language grade of CLB 6+ in IELTS, CELPIP or TIF is required in addition to Active Listening, Critical Thinking, Using logic, Complex Problem Solving and Operations Analysis.
SALARY
Attractive and competitive with what is obtainable in the industry. Successful candidate will also benefit from our employee retention programs , bonuses and allowances. These include Extended Medical Insurance, Pension Plan, Work Accident Compensation and Death Insurance.
Interested applicants to please:
Apply on CareerBeacon.com
or
Send application with job title and resume to Career@jeabstech.com
IT Project Coordinator
IT Project Coordinator
Job Description:
Our growing company is seeking to hire an IT Project Coordinator who will be in assisting our Project Managers in project implementation while growing career in project management. This task involves monitoring IT project plans, schedules, work hours, budgets, and expenditures, organizing and participating in stakeholder engagements, and ensuring that project deadlines are met in a timely manner.
To be successful as a Project Coordinator, candidate will have understanding of information technology and will need to be able to work on tight deadlines, be competent project management methodologies and use of Microsoft Office applications. Candidate must be self-motivated with excellent organizational, communication, problem-solving and multitasking skills.
Responsibilities:
- Maintaining and monitoring project plans, project schedules, work hours, budgets and expenditures.
- Organizing, attending and participating in stakeholder meetings.
- Ensure resource planning for all IT projects including systems installations, Apps and Website developments
- Documenting and following up on important actions and decisions from meetings.
- Preparing necessary presentation materials for project engagements.
- Ensuring project deadlines are met.
- Determining project changes.
- Undertaking project tasks as required.
- Developing project strategies.
- Ensuring projects adhere to frameworks and all documentation is maintained appropriately for each project.
- Assess project risks and issues and provide solutions where applicable.
- Ensure stakeholder views are managed towards the best solution.
- Chair and facilitate meetings where appropriate and distribute minutes to all project team members.
- Create a project management calendar for fulfilling each goal and objective.
- Organize contracts, financial files, reports, and invoices, and perform administrative duties such as ordering office supplies, bookkeeping, and billing.
- roll out new products and features, as well as keep track of bugs.
- Provide strategy for integration of new products with existing technology.
Qualifications
- Bachelor’s degree in sciences, social sciences or related field of study.
- Exceptional verbal, written and presentation skills.
- Ability to work effectively both independently and as part of a team.
- Awareness of latest technologies including AI, VR, AR and Machine learning.
- Awareness of enterprise Software and Hardware selection, implementation and deployment.
- Willingness to acquire certification in IT Project Management.
SALARY
Attractive and competitive with what is obtainable in the industry. Successful candidate will also benefit from our employee retention programs , bonuses and allowances. These include Extended Medical Insurance, Pension Plan, Work Accident Compensation and Death Insurance.
Interested applicants to please send application with job title and resume to Career@jeabstech.com
Sales and Marketing Officer
Sales and Marketing Officer
JOB DESCRIPTION: To be responsible for ensuring that the Sales and Marketing service in relation to Computer hardware, peripherals, devices, phones and software is delivered in an effective and cost effective manner within specified budgets and approved program. Incumbent will ensure an excellent customer service is provided to various categories of customers and also ensure the sales and services are delivered in line with business plan expectations and that the service continuously improves to meet best practice and customer expectations.
OTHER KEY RELATIONSHIPS:
To build effective relationships with a range of partners including key internal officers/teams, external customers, solicitors, and developers.
1. PERFORMANCE
1.1. To contribute to the Annual Operational Plans and monitoring and to report on performance.
1.2. To assist the Systems Integration Manager in the preparation of reports to Senior Management Team, Sub-Committees, Board and IT Forum meetings as required.
2. POLICIES & PROCEDURES
2.1. To deal with all complaints, as referred via the Company Complaints Policy and Procedure.
2.2. To act at all times in accordance with the Company’s published policies and procedures
2.3. To ensure that the Company’s Equal Opportunities, Diversity and Health and Safety Policies are complied with and promoted.
2.4. To ensure that the requirements of the Data Protection Act are complied with.
2.5. To ensure that inventory status is consistently maintained and performance collated and reported to the Performance Manager.
2.6. To be aware of and contribute to the Company’s Policies and Procedures for Risk Management.
2.7. To contribute to the Company’s culture of achieving Best Value through raising standards of performance and improving efficiency
3. FINANCIAL MANAGEMENT
3.1. To manage and control any budgets assigned to you.
3.2. To process invoices in accordance with agreed procedures and timetable.
3.3. To achieve efficiencies through procurement initiatives working closely with partners and stakeholders.
3.4. To monitor both budgetary and service delivery performance against targets, in order to achieve high standards of delivery and resident satisfaction are achieved
4. KEY RESPONSIBILITIES
4.1. To act as the day to day lead for all Computer hardware, peripherals, devices, phones and software sales and marketing activity within
Jeabs Technologies Incorporated. To provide expert advice both within the Company and externally on all aspects of sales and the sales process.
4.2. To be responsible for the preparation and monitoring of the Computer hardware, peripherals, devices, phones and software ownership policies
of the Company, including identifying Information and communication technology trends and new legislation and making appropriate proposals to meet changing situations.
4.3. To be responsible for the programming and financial control of marketing Computer hardware, peripherals, devices, phones and software to ensure the effective application of all appropriate procedures, including the preparation of marketing plans, strategies and budgets.
4.4. Work closely with the Development Team to ensure that all forecast programmed targets in relation to Computer hardware, peripherals, devices, phones and software sales are met.
4.5. To be responsible for the delivery of the stair casing and resale activities to ensure the income generated further revenue in accordance with annual targets.
4.6. To provide an effective administration of other forms of sales and overseeing the process for disposing of properties considered surplus to requirements.
4.7. To ensure that the commercial leases entered into for or on behalf of the company are regularly monitored, updated and renewed as required by the lease terms.
4.8. Ensure the delivery of an excellent quality sales service against Key Performance Indicators, which are continually improved and meet the diverse needs of stakeholders.
5. NEW SCHEMES
5.1. To ensure that appropriate marketing plans are produced and presented to the management
5.2. In accordance with the production of marketing plans for sales schemes, the Sales & Marketing Manager will co-ordinate appropriate market research information e.g. acquiring comparable values, internet research, speaking to local competitors to obtain comparable prices.
5.3. Working in collaboration with the Communications Officer, co-ordinate all marketing campaigns, including launch events, PR, website updates, and appropriate press releases.
5.4. To co-ordinate the set up and management of show Computer hardware, peripherals, devices, phones and software .
5.5. To ensure a customer focused viewing service to customers for available schemes.
This will include assistance with viewings at evenings and weekends.
5.6. To prepare sales strategies and ensure that all Computer hardware, peripherals, devices, phones and software s are sold on time and to budget.
Ensure that services are continuously improved and meet the diverse needs of stakeholders.
5.7. To prepare full marketing feasibility assessment reports and assists the Head of
Development & Sales in the design and development of new schemes.
5.8. Ensure that all “offers” with regard to market sales are managed in accordance with the
approved Sales and Marketing Strategy process.
5.9. Working with internal / external IT providers to keep under review new systems and to
influence the internet strategy towards web based sales.
5.10. Develop and maintain sales cash flows to ensure that forecast sales targets are met.
6. JTI LOYALTY PROGRAM
When requested and when appropriate to do so, to lead the provision of sales and marketing services to members.
7. STATUTORY SCHEMES – Right To Acquire, Right To Buy, Social Computer hardware, peripherals, devices, phones and software Buy
To ensure that all applications are processed in accordance with statutory guidelines and within our Policies & Procedures.
8. GENERAL
a. To promote the Company in a positive and professional manner.
b. To carry out any other duties, as directed, commensurate with this post
The job description will be reviewed at regular intervals
9. EDUCATION: A bachelors degree in Business Administration, Accounting, Finance and Banking or related fields is required.
English language grade of CLB 7+ in IELTS, CELPIP or TIF is required.
10. EXPERIENCE: 2 years experience in sales and marketing of niche ICT products and services is required. Skill in inventory management systems, accounting tools, presentations, Marketing campaigns, Marketing intelligence and use of MS Office tools are required. Ability to create graphic designs with array of tools and carry out website update , maintenance, issues resolution and publish contents are required. Membership and affiliation to sales and marketing organisations and knowledge of marketing in Canada will be an advantage.
11. OTHER SKILLS
·Performance driven with initiative to assess complex situations and make decisions quickly and effectively and deliver excellent customer service
·A positive ‘can do’ attitude
·Excellent time management, able to work under pressure
·Self motivated to achieve targets.
·Excellent communication skills required orally and written
·Excellent Administration skills
·Effective working within teams and individually
·Able to deal with customers in a positive and constructive way
·Ability to represent the Company to external agencies including the courts
·Ability to work in a challenging and diverse environment
12. SALARY
Attractive and competitive with what is obtainable in the industry. Successful candidate will also benefit from our employee retention programs , bonuses and allowances. These include Extended Medical Insurance, Pension Plan, Work Accident Compensation and Death Insurance.
Interested applicants to please send application with job title and resume to Career@jeabstech.com
Computer Systems Programmer Analyst
Computer Systems Programmer Analyst
Description
Design and develop software solutions including mobile Apps, Web Apps, Static and dynamic websites. Lead and co-ordinate team of computer programmers to modify, integrate and test software for e-commerce and other Internet applications. Keep abreast of emerging technologies to sustain our ability to support businesses in saving time, money and effort.
Job Tasks
- Communicate with staff or clients to understand specific system requirements.
- Provide technical guidance or support for the development or troubleshooting of systems.
- Identify system data, hardware, or software components required to meet user needs.
- Provide guidelines for implementing secure systems to customers or installation teams.
- Monitor system operation to detect potential problems.
- Direct the analysis, development, and operation of complete computer systems.
- Investigate system component suitability for specified purposes and make recommendations regarding component use.
- Recommend changes to improve computer or information systems.
- Perform ongoing hardware and software maintenance operations, including installing or upgrading hardware or software.
- Configure servers to meet functional specifications.
- Develop or approve project plans, schedules, or budgets.
- Design and conduct hardware or software tests.
- Develop system engineering, software engineering, system integration, or distributed system architectures.
- Define and analyze objectives, scope, issues, or organizational impact of information systems.
- Establish functional or system standards to ensure operational requirements, quality requirements, and design constraints are addressed.
- Evaluate existing systems to determine effectiveness and suggest changes to meet organizational requirements.
- Train system users in system operation or maintenance.
Job Requirements and Education
A bachelor’s degree in computer science or in relevant discipline with a significant programming component or Completion of a college program in computer science is required.
Experience in software and mobile Apps system analysis, design, development, deployment and documentation is required. Candidate must be proficient in data analysis and modelling techniques, database designs and administration techniques and use of various RDBMS. Ability to code in Apps development languages including Java, JavaScript, C#, C++, HTML5, PHP and use a wide variety of system development tools are critical to efficient delivery of results. Certifications in these programming languages, Oracle or other RDBMS, networking tools will be an advantage.
Other Skills
English language grade of CLB 7+ in IELTS, CELPIP or TIF is required in addition to Active Listening, Critical Thinking, Complex Problem Solving and Operations Analysis.
Salary
Attractive and competitive with what is obtainable in the industry. Successful candidate will also benefit from our employee retention programs, bonuses and allowances. These include Extended Medical Insurance, Pension Plan, Work Accident Compensation and Death Insurance.
Interested applicants to please:
Apply on CareerBeacon.com
orSend application with job title and resume to Career@jeabstech.com