From Installations to Troubleshooting: Daily Tasks of a Security Systems Technician

    Back to A Day in the Life of a Security Systems Technician
    A Day in the Life of a Security Systems TechnicianBy ELEC Team

    Explore a full day in the life of a security systems technician, from installations and commissioning to rapid troubleshooting, with practical checklists, salary insights for Romania, and proven workflows for CCTV, access control, and intrusion systems.

    security systems technicianCCTV installationaccess controltroubleshooting guideRomania salariesfield servicerecruitment
    Share:

    From Installations to Troubleshooting: Daily Tasks of a Security Systems Technician

    Engaging introduction

    Security systems technicians keep people, property, and operations safe by making sure cameras capture critical moments, access control doors lock and unlock reliably, and alarms raise the right alerts at the right time. It is a hands-on, highly technical role with a unique mix of electrical work, networking, programming, and customer-facing problem solving. Whether you are supporting a bank branch in Bucharest, commissioning cameras for a logistics hub near Cluj-Napoca, maintaining access control in a Timisoara office park, or troubleshooting a faulty intrusion sensor at a retail site in Iasi, the daily work is as varied as it is vital.

    This in-depth guide walks you through a real day in the life of a security systems technician: what they do, the tools they use, the skills they rely on, and the challenges they navigate. You will get practical, step-by-step troubleshooting checklists, sample workflows, essential gear lists, and career insights, including salary ranges in EUR and RON and typical employers in Romania and across Europe. If you are considering this career or hiring technicians to keep your security infrastructure running, this guide will help you understand the work from installation to long-term maintenance.

    Who a Security Systems Technician is and what they do

    A security systems technician installs, configures, tests, maintains, and repairs electronic security components and platforms, including:

    • CCTV and video surveillance: IP cameras, NVRs/DVRs, VMS servers, network storage
    • Access control systems: door controllers, readers, locks, exit devices, credentials
    • Intrusion detection: control panels, motion detectors, door/window contacts, sirens
    • Intercom and video door entry: door stations, handsets, monitors, SIP integration
    • Perimeter detection: beams, fence vibration sensors, radar or thermal cameras
    • Network and power infrastructure: PoE switches, UPS units, structured cabling, fiber

    They combine several skill sets:

    • Electrical and low-voltage installation
    • IP networking and device configuration
    • Physical installation and mounting to building standards
    • Software commissioning and firmware management
    • Documentation, testing, and client training
    • Preventive maintenance and reactive troubleshooting under SLAs

    In practice, technicians move between planned project work (new installations, upgrades) and service work (diagnosing faults, replacing components, optimizing systems). Many employers also schedule on-call rotations for after-hours incidents.

    A real-world daily timeline

    Every site and employer is different, but this is a realistic snapshot of a day for a mid-level technician working for a systems integrator based in Bucharest with clients across Romania.

    07:15 - Van check, paperwork, and route planning

    • Confirm today’s jobs in the field service app: an installation task in a new office fit-out near Pipera and an afternoon service call in central Bucharest.
    • Check van stock: Cat6 cable, 22/4 security cable, anchor bolts, BNC adapters, RJ45 connectors, spare readers, motion detectors, maglocks, and PoE injectors.
    • Safety check: ladders, PPE (helmet, gloves, safety glasses), first aid kit, fire extinguisher, and lockout/tagout kit for door power.
    • Verify asset register: laptop, cable tester, label maker, multimeter, PoE tester, punch-down tool, fiber kit.
    • Print or download drawings, device schedules, and risk assessments to the tablet.

    08:30 - Site arrival and toolbox talk

    • Meet the general contractor and the site facility representative. Review permits and the Job Safety Analysis (JSA) for working at height.
    • Walk the site to confirm camera and reader locations against the drawings. Identify any clashes with HVAC or lighting fixtures.
    • Agree on the day’s milestones: mount and cable 6 IP cameras, install 2 access-controlled doors, test badge reads, and ensure VMS registration.

    09:00 - Access control door installation

    • Pull cable: 18/2 for maglock power, 22/6 for reader, 22/4 for door contact and request-to-exit (REX) sensor, Cat6 for door controller if using PoE.
    • Mount hardware: fit the maglock, strike plate, and door position switch. Ensure mounting surface is flush and adequately reinforced.
    • Terminate and label: consistent labeling scheme such as FLR02-DR05-RDR for Floor 2, Door 5, Reader. Document in the panel schedule.
    • Controller configuration: set door mode, schedules, anti-passback policy, and assign test credentials. Verify local power and PoE status.
    • Functional test: present a badge to unlock for 5 seconds, check door held-open alarms, confirm REX triggers a clean release.

    11:30 - CCTV camera placement and image tuning

    • Mount cameras: ensure secure mounting to studs or anchors, observe minimum bend radius for cable, and avoid cable pinch points.
    • Networking: assign static IPs according to the plan (e.g., 10.20.12.151-160), set unique admin passwords, and disable default accounts.
    • VMS enrollment: add cameras to the VMS (Milestone XProtect or Genetec Security Center), align camera names to the naming convention.
    • Image tuning: enable WDR near glass, set bitrate and resolution per retention policy, adjust IR intensity to prevent overexposure at night.
    • Field of view verification: confirm critical coverage for entrances, cash desks, loading bays, and emergency exits. Capture as-built snapshots.

    13:00 - Lunch, admin, and order placement

    • Update the project management system with completed tasks and hours logged.
    • Place an order for an extra PoE midspan and two surface boxes needed tomorrow.
    • Respond to a service dispatcher about a door that will not unlock at a retail store.

    13:45 - Reactive service call: door not unlocking

    • Arrive at the site. Greet the store manager and ask for a demonstration.
    • Quick triage: badge read beeps but door stays locked.
    • Check basics: power to the maglock at 12/24 VDC? Verify with multimeter.
    • Reader and controller: verify LED status on controller, check input from door contact and REX, review event log in the access software.
    • Root cause: broken wire on the REX sensor loop preventing unlock command. Replace and retest. Update firmware while on site to the latest stable version.
    • Customer sign-off: demonstrate normal operation, document fix and parts used.

    15:45 - Commissioning and client training

    • Return to the first site to finish. Run a full door cycle test and camera recording verification.
    • Train the client representative on adding users, acknowledging alarms, and exporting video clips.
    • Obtain signatures on the commissioning forms and handover documents.

    17:00 - Debrief, documentation, and prep for tomorrow

    • Update tickets with photos, test results, and as-built changes.
    • Email the project manager a snag list for patch painting around a camera mount and a network port that needs activation.
    • Prepare the van for an early start in Cluj-Napoca tomorrow. Check stock for fiber jumpers and an OTDR since the next site uses single-mode fiber uplinks.

    Core responsibilities and repeatable workflows

    Successful technicians rely on repeatable steps to execute consistent, high-quality work.

    1) Site surveys and pre-start planning

    • Review floor plans, riser diagrams, device schedules, and security zones.
    • Verify wall and ceiling materials to choose correct anchors and mounting hardware.
    • Identify routes for cable pulls and potential obstacles (fire stopping, plenums, shared conduits).
    • Confirm network readiness: VLAN assignments, IP ranges, PoE budgets, and switch port availability.
    • Check compliance requirements (e.g., GDPR signage for CCTV, restricted camera views in sensitive areas).

    2) Installation and cabling

    • Use appropriate cable types: Cat6 or Cat6A for IP devices, 18/2 or 22/2 for power runs, 22/4 to 22/8 for sensors and readers, and fiber SC/LC for backbones.
    • Respect bend radius and separation from power lines to reduce interference.
    • Label both ends of every cable to a documented standard. Update drawings in real time.
    • Firestopping: properly seal penetrations with rated materials and record locations.

    3) Device mounting and termination

    • Mount to solid structures. Use the right anchors for concrete, brick, or drywall.
    • Weatherproof exterior devices: use junction boxes with sealing grommets and UV-rated cable ties.
    • Terminate with care: avoid cold solder joints, crimp to spec, and use a cable certifier when required.

    4) Programming and network configuration

    • Assign IP addresses and hostnames per the plan. Enforce unique strong credentials.
    • Time synchronization: point all devices to the same NTP server for accurate event logs.
    • VMS configuration: streams, storage rules, motion schedules, and user roles.
    • Access control programming: door schedules, reader modes, card format (Wiegand 26-bit, OSDP), and anti-passback policies.

    5) Testing, commissioning, and documentation

    • Test each device against a commissioning checklist. Record objective results.
    • Image quality: verify identification-level views at entrances and cash handling points.
    • Door function: test badge in, badge out (if applicable), REX, door held, and forced entry alarms.
    • Handover: deliver as-built drawings, device lists, passwords in a sealed envelope or vault, and a quick-start user guide.

    6) Maintenance and reactive service

    • Preventive maintenance visits: visual inspections, cleaning camera domes, firmware audits, battery health checks, and log review.
    • Reactive fixes: triage, isolate, replace, and retest.
    • Post-incident analysis: capture lessons learned and improve standards for future work.

    Tools of the trade: a practical checklist

    A technician’s toolkit can make or break the day. Here is a proven list to prepare for most scenarios.

    Installation and mechanical tools

    • Hammer drill with masonry bits
    • SDS drill and impact driver
    • Assorted anchors and screws (concrete, brick, drywall)
    • Hole saws, step bits, and spade bits
    • Level and laser level
    • Cable fish tapes and rods
    • Conduit bender and cutters
    • Wire strippers, crimpers, and punch-down tool
    • RJ45 crimp tool and tester
    • Label maker with heat-shrink and adhesive labels

    Electrical and test equipment

    • Multimeter with continuity, voltage, and current functions
    • PoE tester to verify power class and available wattage
    • Cable certifier or qualification tester for Cat6/Cat6A
    • Tone generator and probe for cable tracing
    • OTDR and fiber inspection scope for fiber runs (as needed)
    • CCTV test monitor for coax or ONVIF for IP

    Networking essentials

    • Laptop with dual network adapters and VLAN capability
    • Portable PoE injector and midspan
    • Small unmanaged switch for bench tests
    • USB-to-serial adapter for legacy console ports
    • Network scanner and IP discovery tools
    • USB flash drive for firmware and backups

    Safety gear and site equipment

    • PPE: hard hat, gloves, safety glasses, ear protection, high-vis vest
    • Ladder or step stools, MEWP access if trained and required
    • Lockout/tagout kit for door power and panel lockouts
    • First aid kit and spill kit

    Software stack

    • VMS clients: Milestone XProtect, Genetec Security Center, Bosch BVMS, Avigilon Control Center
    • Camera tools: Axis Device Manager, Hikvision SADP, Dahua ConfigTool, ONVIF Device Manager
    • Access control clients: LenelS2 OnGuard, Honeywell Pro-Watch, Gallagher Command Centre, Kantech EntraPass
    • Ticketing and reporting: ConnectWise, ServiceNow, simPRO, or in-house FSM
    • Diagramming and notes: Bluebeam, Visio, or Draw.io for quick markups

    Troubleshooting playbooks you can use today

    When something fails, structured troubleshooting saves time and restores service quickly. Use these field-tested sequences.

    Playbook 1: IP camera is offline in the VMS

    1. Confirm power:
    • Check link lights on the switch port.
    • Test with a PoE tester; verify voltage and power class.
    • If using a PoE injector, confirm it is powered and correctly patched.
    1. Network basics:
    • Ping the camera’s IP. If no reply, try ARP and check for IP conflicts.
    • Connect laptop directly to the switch port in the same VLAN; verify DHCP/static settings.
    • Check switch port status, VLAN, and PoE budget; move to a known-good port if unsure.
    1. Camera-level checks:
    • Factory reset if locked out and reapply the baseline config.
    • Update firmware to a stable release recommended by the VMS vendor.
    • Disable unused services and confirm RTSP stream path.
    1. VMS enrollment:
    • Remove and re-add the camera in the VMS.
    • Verify credentials, ONVIF compatibility, and matching time/NTP settings.
    1. Physical layer:
    • Inspect connectors and patch cords.
    • Test cable run for opens, shorts, and split pairs. Re-terminate if needed.

    Playbook 2: Night-time motion blur or overexposed images

    • Switch to night mode to see if IR is causing reflection from nearby surfaces.
    • Reduce IR intensity, reposition the camera slightly, or add a visor/housing.
    • Increase shutter speed and adjust gain; balance with additional lighting.
    • Enable WDR for mixed lighting scenes near entrances.
    • Clean the dome or lens to remove smudges and spider webs.

    Playbook 3: Door will not unlock for a valid card

    • Confirm controller sees the badge read in software logs.
    • Check door contact and REX status; stuck input loops can block unlock commands.
    • Measure voltage at the lock when an unlock is triggered; if voltage dips, suspect a failing PSU or cable damage.
    • Bypass readers temporarily to isolate lock hardware vs. control logic.
    • Verify schedules and access levels; ensure the door is not in lockdown mode.

    Playbook 4: Frequent false alarms on an intrusion zone

    • Check sensor placement and look for airflow, HVAC vents, or moving signage.
    • Reduce sensitivity or change lens options for PIRs.
    • Inspect for loose mounting, reflective surfaces, or pets if in a mixed-use area.
    • Replace aging sensors and check for proper zone end-of-line resistor values.

    Playbook 5: VMS recording gaps or missing archives

    • Validate storage health and free space. Check RAID status.
    • Compare camera bitrate to storage policy. Lower bitrate or adjust retention as needed.
    • Confirm time sync across servers and cameras; mismatched time can break indexing.
    • Check VMS service health and event logs for licensing or service restarts.

    Quality, compliance, and standards that matter

    Security systems intersect with building codes, data protection, and industry standards. Knowing the basics prevents rework and legal risk.

    • EN 50131: Specifies grades and requirements for intrusion and hold-up systems in Europe.
    • EN 54: Addresses fire detection and alarm system components. Coordination is critical when integrating with fire panels for door release.
    • IEC 60364 and low-voltage best practice: Guides safe electrical installations.
    • GDPR: Requires clear notification where CCTV is in use and strict control of who can access recorded footage. Minimize capturing public areas unless justified.
    • Romanian context: Law 333/2003 governs physical security of objectives, goods, and values. Design and installation companies typically require licensing from the Romanian Police for certain security activities. Always work through licensed entities and adhere to local regulations and standards.

    Documentation deliverables to standardize:

    • As-built drawings with accurate device locations and labels
    • Device inventory with MACs, IPs, serial numbers, and firmware versions
    • Test and commissioning sheets with pass/fail and measured values
    • User access matrices and role definitions for VMS and access control
    • Maintenance plans and recommended spare parts lists

    Working safely and efficiently

    Safety is non-negotiable, and efficiency is how you hit deadlines without cutting corners.

    • Job Safety Analysis (JSA): Identify fall risks, overhead work, live circuits, and public interaction. Put mitigations in place before starting.
    • Working at height: Use the right ladder or MEWP. Maintain three points of contact and tie off where required.
    • Lockout/tagout: De-energize door circuits and power supplies before handling wiring.
    • Firestopping and clean sites: Maintain fire integrity and leave tidy work areas to reduce trip hazards.
    • Lone working: Share your itinerary, carry a charged phone or radio, and use a check-in system.
    • Weather readiness: For outdoor cameras in winter in Cluj-Napoca or Iasi, bring covers, dry wipes, and silicone grease for seals. Plan for heat in Timisoara summers; shield equipment from direct sun.

    Career path, pay, and employers: Romania and beyond

    Security systems technicians can build strong careers with hands-on expertise and vendor certifications. Pay varies by city and experience, and benefits often include vehicle use, per diem for travel, and meal vouchers.

    Indicative net monthly salary ranges in Romania (figures are approximate and can vary by employer and workload):

    • Entry-level technician (0-2 years): 3,500 - 5,000 RON net (about 700 - 1,000 EUR)
    • Mid-level technician (2-5 years): 5,500 - 8,500 RON net (about 1,100 - 1,700 EUR)
    • Senior technician (5+ years): 8,500 - 12,000 RON net (about 1,700 - 2,400 EUR)
    • Lead technician or project engineer with hands-on work: 10,000 - 15,000 RON net (about 2,000 - 3,000 EUR)

    By city:

    • Bucharest: often 10-20% higher than national averages due to demand and cost of living.
    • Cluj-Napoca: competitive with Bucharest for specialized roles, especially in tech and data center projects.
    • Timisoara: slightly below Bucharest, with strong industrial and automotive sector demand.
    • Iasi: typically 5-10% below Bucharest, with growth in office and education sectors.

    Contractor or freelancer day rates in Romania:

    • 600 - 1,200 RON per day (about 120 - 240 EUR), depending on certifications, tools provided, and project complexity.

    Common benefits:

    • Company vehicle or mileage allowance, tools, and phone
    • Overtime pay or time off in lieu
    • Meal vouchers and per diem for travel
    • Training budgets for vendor certifications

    Typical employers and sectors:

    • Systems integrators and security companies: local and regional firms delivering design, installation, and maintenance
    • Multinational integrators and service providers: examples include operations affiliated with Securitas Technology, G4S, and Honeywell partners
    • Facilities management and MEP contractors working on large construction projects
    • End users with in-house teams: banks, retail chains, hospitals, logistics parks, manufacturing plants, and data centers

    Popular vendor certifications that boost employability:

    • VMS: Milestone XProtect, Genetec Security Center, Bosch BVMS, Avigilon
    • Cameras: Axis Communications certification, Hikvision, Dahua
    • Access control: LenelS2 OnGuard, Honeywell Pro-Watch, Gallagher, Kantech
    • Networking: CompTIA Network+, vendor switch basics (Cisco/MikroTik)
    • Safety: working at height, MEWP operation, and low-voltage electrical safety

    Productivity frameworks and templates

    Small improvements to process reduce rework and callbacks. Use these checklists and templates.

    Pre-site read-through checklist

    • Review drawings and device lists; flag any inconsistencies
    • Confirm network details: VLANs, IP ranges, and switch ports
    • Verify permit requirements and site rules
    • Pre-label devices and prepare a labeling map
    • Confirm spare parts and consumables stock

    Installation day checklist

    • Morning:
      • Safety briefing and JSA
      • Agree on milestones and sign-off criteria
      • Confirm device locations with the client
    • During work:
      • Label both ends of each cable
      • Photograph terminations and device mounting
      • Update as-builts as changes occur
    • End of day:
      • Clean work area and remove debris
      • Log progress, parts used, and snags
      • Back up configs and share with the team

    Commissioning checklist

    • CCTV:
      • IP address and hostname verified
      • Correct time sync and timezone
      • Stream, bitrate, and retention policy configured
      • User roles and permissions set
      • Test recordings and export function validated
    • Access control:
      • Door schedules and reader modes configured
      • Alarm inputs and outputs verified
      • Badge reads logged and permissions correct
      • Door held and forced alarms tested
    • Intrusion:
      • Zones named and mapped
      • EOL resistors and zone values verified
      • Arm/disarm sequences tested
      • Alarm reporting paths confirmed

    Service ticket notes template

    • Site and contact:
      • Client name, site address, and on-site contact
    • Reported issue:
      • Symptoms, when they occur, frequency
    • Diagnosis steps:
      • Tests performed and results
    • Resolution:
      • Actions taken, parts replaced, firmware versions
    • Verification:
      • Tests confirming resolution and customer confirmation
    • Follow-up:
      • Recommended preventive actions or upgrades

    Van stock essentials

    • Cables: Cat6, 18/2, 22/4, pre-made patch cords
    • Terminations: RJ45, BNC, SC/LC fiber jumpers, keystone jacks
    • Hardware: maglocks, strikes, readers, motion detectors, door contacts
    • Power: spare PSUs, PoE injectors, fuses, and inline connectors
    • Consumables: labels, cable ties, Velcro, grommets, sealant, firestop material

    Common challenges and how to handle them

    • Change orders mid-install: freeze scope daily and get written approval before deviating. Track time and materials separately.
    • Firmware regressions: test firmware in the lab first. Maintain a known-good version list.
    • PoE budget surprises: calculate total power draw and allow 20-30% headroom per switch. Use midspans where needed.
    • Dirty power and outages: stabilize with UPS units rated for the actual load and test runtime. Add surge protection.
    • Multi-vendor integration: map protocols and versions, assign ownership for each subsystem, and document interconnections.
    • Privacy and restricted views: mask private areas and avoid unintended public surveillance. Post required CCTV notices.
    • Environmental extremes: select appropriate IP and IK ratings, use heaters/blowers for outdoor enclosures, and schedule periodic cleanings.

    Practical, actionable advice for technicians and managers

    • Standardize labeling from day one; future-you will thank present-you.
    • Keep a laminated quick-reference of default IPs, subnets, and OUI vendor prefixes.
    • Maintain golden images and baseline configs for rapid device replacement.
    • Always sync device time; inconsistent logs make investigations painful.
    • Apply unique passwords per site; store them securely in a password manager.
    • Photograph every termination and rack bay before closing the cabinet.
    • Clean domes and lenses during every visit; picture quality often improves instantly.
    • Verify PoE power class and cable quality before blaming the camera.
    • Use VLANs to segment CCTV, access control, and admin traffic.
    • Disable unused services like UPnP or Telnet on cameras.
    • Size storage with a proper calculator; align bitrate, resolution, and retention with client needs.
    • Inspect doors for mechanical issues before replacing electronics.
    • Avoid placing PIRs facing windows or HVAC vents.
    • Carry a spare laptop NIC dongle; network ports fail at the worst time.
    • Log every change in the ticket. Good notes reduce callbacks.
    • Batch firmware updates to maintenance windows and inform the client.
    • Keep a spare reader and lock on the van for emergency swaps.
    • Build relationships with facilities and IT teams; they unlock doors, literally and figuratively.
    • Train end users on how to export video properly and securely.
    • For Romania-specific projects, align with Law 333/2003 requirements and ensure the company licensing is in order.

    A day in different Romanian cities: practical notes

    • Bucharest: Expect heavier traffic and stricter site protocols in major office parks such as those in Pipera and Floreasca. Book parking in advance and budget time for permit checks.
    • Cluj-Napoca: Tech campuses and data centers demand clean cable management, strict access control, and after-hours windows for network changes.
    • Timisoara: Industrial and logistics projects may require ruggedized equipment and careful planning around plant shutdowns.
    • Iasi: University and healthcare clients prioritize privacy, so pay close attention to camera masking and data retention.

    Conclusion: keep people and operations safe - and build a rewarding career

    From exacting installations to urgent troubleshooting, security systems technicians are the backbone of modern physical security. They blend practical craftsmanship with networking and software skills to deliver reliable, compliant systems that protect people and property. If you are exploring a career as a security systems technician, now is a great time to build your toolkit, invest in vendor training, and pursue projects across Romania’s growing commercial and industrial sectors. If you are hiring, define your standards, invest in documentation, and create a culture of safety and continuous improvement.

    ELEC connects skilled technicians and forward-thinking employers across Europe and the Middle East. Whether you are building a team in Bucharest, scaling service coverage in Cluj-Napoca, or seeking project contractors in Timisoara and Iasi, our recruitment specialists can help you find the right people fast. Contact ELEC to discuss your hiring plans or your next career move.

    FAQ: Security Systems Technician

    1) What certifications help a technician stand out?

    Vendor certifications carry real weight. For video, Milestone, Genetec, Bosch BVMS, and Avigilon are strong. For access control, LenelS2, Honeywell Pro-Watch, Gallagher, and Kantech are widely recognized. Add a networking baseline like CompTIA Network+. Safety training for working at height and MEWP operation is a must for many sites.

    2) How long does it take to become fully competent?

    With consistent field exposure and mentorship, most technicians gain solid independence within 12 to 24 months. Mastery of commissioning complex, multi-site environments often takes 3 to 5 years, especially when integrating multiple vendors and networking scenarios.

    3) What tools should every new technician buy first?

    Start with a reliable multimeter, RJ45 crimp tool and tester, punch-down tool, PoE tester, label maker, impact driver, and quality hand tools. Add a laptop with the right software tools and a small unmanaged switch and PoE injector for bench testing.

    4) How do salaries differ between Bucharest and other cities?

    Bucharest typically commands a 10-20% premium versus national averages due to demand and cost of living. Cluj-Napoca can be comparable for specialized projects, while Timisoara and Iasi are often 5-10% lower, depending on sector and employer.

    5) What are the biggest causes of CCTV image problems?

    Common culprits are poor lighting, dirty lenses, IR reflection, incorrect exposure settings, weak network links, and misaligned fields of view. A short cleaning and tuning session often produces dramatic improvements.

    6) How can we reduce false alarms in access control?

    Verify door alignment and latching, ensure REX sensors are correctly positioned, configure alarm delays to match door closers, and review schedules. Sensor placement and mechanical health often matter as much as software settings.

    7) What documentation should we always deliver at handover?

    Provide as-built drawings, device inventory lists, admin credentials stored securely, commissioning test sheets, user role matrices, maintenance plans, and a quick-start guide tailored to the client’s daily workflows.

    Ready to Start Your Career?

    Browse our open positions and find the perfect opportunity for you.