Get new jobs by email
- ...Site Name: Karachi Sky Tower Posted Date: Mar 27 2026 Job Purpose: As the Financial Controller, you will be working within our MEA Hub to play a key role in creating a high performing team responsible for delivering Close and Control activities for MEA markets...
- A leading biopharmaceutical company is seeking a Financial Controller to join their MEA Hub in Karachi. The role involves ensuring accurate reporting and compliance, managing finance activities, and acting as a strategic partner to business units. Ideal candidates should...
- A global security solutions provider is looking for a Technical Support Engineer based in Pakistan. The role involves maintaining and servicing complex x-ray and CT-based security systems at various customer sites. Candidates must have excellent communication skills, knowledge...
- ...maintaining, and servicing x‑ray and CT based security systems at customer sites. Typically... ...Pneumatics Hydraulics Robotics Control systems Electrical power systems... ...maintenance windows. ~ Tasks may require accessing confined spaces, raised platforms, service...
- ...external teams to better understand Enterprise Architecture and Security standards and provide designs and implementations based on... ...the corporation. Configure and manage security settings and access controls for GitLab. Implement and manage CI/CD pipelines using...
- ...and Visual Sciences (SIOVS) Hyderabad, under project “Improving Access to Inclusive Education and Healthcare in Rural Sindh”, aims to... ...compliance with clinical protocols. Ensure adherence to infection control, sterilization, and patient safety guidelines. Ensure proper...
- ...to manage large-scale network environments and ensure network security and performance. ~ Strong collaboration and communication skills... ...and Juniper firewall. # Experience with iMaster Fabric Controller and iMaster NCE Campus (is plus). #3. Technical Skills: #...
- ...responsible for designing, developing, and maintaining scalable and secure RESTful APIs and backend services using the .NET ecosystem. ~... ...methods (JWT, OAuth). ~• Experience with Git/version control. ~• Understanding of software design patterns and architecture...
- ...require any accommodation, please submit your request through the accessibility email button on the UNICEF Careers webpage Accessibility |... ...in the employment of the staff is the necessity of securing the highest standards of efficiency, competence, and integrity...
- ...timeframes, ensuring effective identification, assessment, monitoring, control, and reporting of digital and branchless banking risks.... ...related to core banking system, portfolio exposure fraud patterns, access controls etc. Ensure compliance with SBP digital lending...
- ...-to-end UX design process (research → wireframes → prototypes → high-fidelity designs → usability testing) Design intuitive, accessible, and visually appealing web interfaces Translate complex workflows into seamless, user-friendly experiences Contribute...
- ...Cisco). Implement and manage Site-to-Site VPN connections and other secure network communication channels. Configure and manage Microsoft Azure services, including Azure Portal, Identity and Access Management (IAM), and related cloud resources.. Manage Microsoft...
- ...Job Title: Security Engineer Experience: 4–6 Years Location: Pakistan (Hybrid)... ...design, implement, and maintain security controls across cloud and on-premises environments... ...trust security models with least-privilege access Configure and maintain identity and...
- ...Mobile is looking for a hands‑on IT & Cloud Access Administrator to manage and streamline... ...infrastructure — ensuring our employees have secure, reliable, and compliant access to... ...permission requests, and group‑based access controls Support and maintain SAML/OIDC integrations...
- ...experienced cybersecurity professional eager to take on a key role in securing Digital Retail Banking (DRB) operations? We are looking for a... ...analyzing security events and escalating issues. Manage access control policies to prevent unauthorized access to sensitive data....
- ...world of digital banking? We’re seeking a dynamic Information Security Administrator to take charge of securing our cutting-edge... ...protection, and real-time threat detection. Manage user access control, identity verification, and multi-factor authentication....
- ...experienced Principal Consultant – Cyber Security to provide strategic direction and... ...mechanisms, and integrated enterprise security controls. Drive the evaluation and maturity... ...experience in identity governance, privileged access management, data protection controls,...
- ...the annual external audit process and maintain strong internal controls to ensure compliance with regulatory requirements and accounting... ...as the primary administrator, ensuring data integrity, system security, and optimal performance through upgrades and collaboration with...
- ...reviews As our ideal candidate, you should have: DAE (Diploma of Associate Engineer) or equivalent Familiarity with document management systems, version control, ISO documentation (plus) Excellent organizational skills & attention to detail #J-18808-Ljbffr...
- ...Responsibilities Implement and enforce the company security program in compliance with PCAA regulations and ICAO standards.... ...operational areas to detect and respond to suspicious activity. Control access to restricted zones by verifying credentials and issuing...
- ...-end development practices and has working knowledge of web accessibility (ADA / WCAG) , ensuring our applications are usable for all users... ...Optimize existing systems for scalability, performance, and security. Accessibility (ADA/WCAG) Responsibilities Ensure all...
- A growing tech company is seeking an IT & Cloud Access Administrator to manage secure access to tools and infrastructure. This role requires a minimum of 2 years in IT administration and hands-on experience with platforms like Okta and Jamf. You'll be instrumental in optimizing...
- ...As the Chief Information Security Officer (CISO) for HugoBank, a cloud-native digital bank... ...of information security risks, controls, and posture to senior management and the... ...allocation and utilization of resources. Access Management & Controls Define and enforce...
- ...materials based on established pedagogical best practices and user feedback. Ensure that all content is clear, accurate, and accessible for the intended audience. The Manager will lead the enhancement of Mathematics teaching and learning materials, implement content...
- ...Job Title: Cyber Security Specialist (SOC / Incident Response) Experience: 7–9 Years... ...through evidence collection, reporting, and control execution Coordinate with platform, network... ...control expectations (logging, access, incident handling, evidence) Preferred...
- ...Level3 BOS (Pvt.) Ltd. is seeking a Cyber Security Specialist to design, implement, and maintain robust security controls across enterprise systems, networks, and endpoints... ...and network devices. Manage identity and access management (IAM), including user provisioning...
- ...with visitors and clients. Equipment, Machinery, Tools, and Materials Utilization: Requires the ability to operate, maneuver and/or control the actions of equipment, machinery, tools, and/or materials used in performing essential functions. Verbal Aptitude: Requires the...
- ...Company Overview: Mechatronix Solutions is Pakistan’s leading provider of integrated security and fire safety solutions, delivering reliable, innovative, and certified systems across industries. We are committed to quality, precision, and client satisfaction. Job...
- ...Australia) | Permanent Position Senior SAP Security Consultant Karachi, Pakistan | Posted... ...and technical teams to align system access design with business needs and project... ...developing and maintaining SAP GRC Access Controls 12.0, including workflows, rule sets,...
- ...Implement, configure, and deploy cyber security solutions for enterprise clients. Lead end-to-end deployment of Data Loss Prevention... ...concepts, policies, incident workflows, and information security controls. We are seeking a proactive and technically strong Cyber...
