Golden Eagle Security

Our Team

Meet Our Security Team

GoldenEagle Security is dedicated to upholding the highest standards of security. We rigorously screen and train our team members to ensure their expertise in handling confidential information. Our unwavering focus on security has earned us a proven track record of providing dependable and secure services to our valued clients.

Fahde Yousif (Director)

Golden Eagle Security Australia Director, Fahde Yousif, has over 10 years of Security Industry Experience and has held various security leadership roles within hospitality and entertainment sector.

Joshua hopper (Opertional Manager)

Josh Hopper is an attentive Operations Manager who works in the Golden Eagle Hospitality Sector. He Brings a vast amount of Security/Hospitality experience majority of that in senior management roles. Josh brings his leadership, Problem-solving and communication skills for growth and success within Golden Eagle and to our clients.

Fahde Yousif (Director)

Golden Eagle Security Australia Director, Fahde Yousif, has over 10 years of Security Industry Experience and has held various security leadership roles within hospitality and entertainment sector.

Dino Juklen (Head Opertional Manager)

Dino has been in the Law Enforcement Sector over 5 years, has a strong understand of New South Wales Criminal and Law Legislation. He has a vast experience working directly with hospitality groups and government organisations. Dino delivers a high standard of excellence and drive towards his clients and maintaining relationships. Dino holds a Bachelor Degree in Bachelor of Policing.

Joshua hopper (Opertional Manager)

Josh Hopper is an attentive Operations Manager who works in the Golden Eagle Hospitality Sector. He Brings a vast amount of Security/Hospitality experience majority of that in senior management roles. Josh brings his leadership, Problem-solving and communication skills for growth and success within Golden Eagle and to our clients.

GET IN TOUCH

Contact security involves protecting personal and sensitive information by limiting access to authorized individuals and ensuring the confidentiality, integrity, and availability of data. This can be achieved through measures such as secure communication channels, encryption, access controls, regular security audits, and employee training programs.

Contact us for a consultation.