Get new jobs by email
- ...Job Overview: We are looking for a skilled L2 Access Network Engineer with strong expertise in FTTX, GPON, OLT, and ISP access network technologies . The ideal candidate will be responsible for network operations, troubleshooting, commissioning, and optimization...
- ...Intelligence is seeking a Lead Metering Control System to join our dynamic Wellhead and... ...meter runs, communication maps, security levels, diagnostics, backups, report configuration... ...dependents. ~ Learning Opportunities: Access to training programs, workshops, and...
- ...are looking for a skilled and proactive Security Administrator to join our Information... ...security solutions with a focus on Privileged Access Management (PAM)and Data Loss... ...policy violations Implement security controls, configuration management, and access governance...
- ...Last date to apply: 25th May 2026 What is Manager Internal Controls? Manager Internal Controls plays a crucial role in the organization... ...being part of transformation at a national scale; expanding access, unlocking opportunity, and building a more connected digital...
- ...Job Role As Manager – Information Security, you will be responsible for establishing... ...protection, SIEM, encryption, and identity/access management tools. Incident Response &... ...ensure consistent enforcement of risk controls and secure infrastructure design....
- ...Job Description: Financial Controller - Sr. Management Accountant Reports To: CEO / Managing Director Location: Remote (Working... ...capital call processes. ~ Manage owner distributions, security deposits, and loan draw schedules. ~ Support annual...Remote job
- ...Speed with Purpose | Passion for Thoughtful Innovation | Genuineness | No Ego, Full Ownership About the Role: The Senior Internal Controls Analyst is responsible for strengthening and scaling the company's internal control environment across manufacturing and...Remote job
- ...2026 What is Specialist Cloud & AI Security? Specialist Cloud & AI Security is responsible... ...best practices: a. Identity & Access Management (IAM) b. Network... ...c. Adversarial attacks 7. Implement controls for: a. Model integrity and versioning...
- ...Job Purpose The Credit Controller is responsible for managing the company’s credit risk by ensuring timely collection of outstanding receivables, assessing customer creditworthiness, and maintaining healthy cash flow while supporting strong customer relationships....
- ...Job Summary To provide a professional, proactive, and effective credit control across the business liaising with internal departments and external customers. The Credit Controller will be responsible for the collection of aged debt reporting, with the responsibility...
- ...s oldest and finest, exclusive members-only club based in Karachi. They are seeking a seasoned professional for the role of Cost Controller. Industry: Hospitality Qualifications: Bachelor's in Finance | Masters / CA / ACCA (preferred) Experience: 5 – 8 Years...
- ...Our client Spark AI is looking for Endpoint Security Engineer in Lahore. Job Description: We are seeking a skilled and... ...configurations for all endpoints Implement least privilege access controls and application whitelisting Enforce system hardening and...
- Crescent Bahuman Limited is seeking a dedicated Weaving Quality Control Officer with at least three years of experience to join and lead a team of 10 professionals. This role focuses on ensuring the highest standards of fabric quality throughout the weaving process by conducting...
- ...Overview The Control & Reporting Asst Analyst will be a key member of the Reporting COE and will report directly to the Control & Reporting Manager. The individual will be primarily involved Obela and MtGambier (Australia) HFM reporting and will be assisting in submitting...
- ...We are a company based in Sweden with employees in all parts of the planet! We are looking for a Finance & Business Analyst – Controller Track (Remote) to join our team and support financial reporting, budgeting, forecasting, and performance analysis. This is an excellent...
- ...compliance standards across operations Monitor, verify, and generate reports for all change activities Identify and document network security cases for awareness and improvement Perform root cause analysis (RCA) for non-compliance cases Track and follow up on...
- ...has ranged from creating highly usable, secure digital experiences, mobile and software... ...ensure implementation of approved security controls ~ Coordinate with IT teams and other... ...security events ~ Troubleshoot user access and connectivity issues related to security...
- ...corrective and preventive actions and ensure accurate and timely reporting to regulatory authorities. · Develop and maintain change control, business continuity, incident response, disaster recovery and crisis management plans and procedures. · Conduct regular drills...
- ...We are looking for a skilled and proactive Security Administrator (Email & End Point Security) to join our Information Security team. The ideal candidate will be responsible for managing and maintaining enterprise security solutions, ensuring the protection of organizational...
- ...technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses... ...audit systems to ensure implementation of approved security controls ~ Coordinate with IT teams and other stakeholders ~...
- ...to align on strategy and execution. The company is founder-led, profitable, and growing. Canonical is looking for exceptional security-focused software engineers to be integrated across product teams. While they also contribute to the product as engineers, their primary...
- ...Zameen.com is looking to hire a ‘Quality & Data Control Officer' for its Bayut and Dubizlee Operations. Job Responsibilities: To ensure products meet quality and efficiency standards set by the company. Manage the spam and competitor section. Responsible for...
- ...Affairs Matters including relevant correspondence with customers, assisting in • security clearance of the firm/ employees, interaction with military personnel etc. • Managing and controlling the internal process of offer preparation including the identification of...
- ...Key Responsibilities: Develop and implement information security policies and procedures. Conduct regular risk assessments and vulnerability assessments. Monitor and respond to security incidents and breaches. Manage and maintain security tools and technologies...
- ...Our client Bykea Technologies is looking for Senior Application Security Engineer in Karachi. What You Will Do Lead threat modeling and secure design reviews for Bykea's applications and infrastructure, ensuring secure-by-default architectures Design...
- ...Managed IT Services company (Managed Service Provider). Since 1997 we have specialized in providing managed IT services and managed security services for our clients. which are made up of small to medium-sized enterprises. We are looking for highly passionate individuals...
- ...Requirements: ~ Bachelor's degree in Computer Science, Information Systems, or a related field. ~2+ years of experience in Cyber Security, SOC, or IT Security roles. ~ Basic understanding of SOC operations, SIEM tools, and incident management. ~ Familiarity with...
- ...Company Overview: Mechatronix Solutions is Pakistan’s leading provider of integrated security and fire safety solutions, delivering reliable, innovative, and certified systems across industries. We are committed to quality, precision, and client satisfaction. Job...
- ...teams to ensure efficient, reliable, and secure infrastructure operations. Responsibilities... ..., spot pricing). Automate security controls and incident responses to ensure... ...resources in AWS, Azure, or GCP, ensuring that access controls, encryption, and configurations...
- ...capacity utilisation, attrition — and surface trends, patterns and risks early. • Ensure segregation of duties, data security and access controls are respected across the Islamabad office. • Act as the primary point of accountability for any operational incident affecting...