Search Results: 16 vacancies
...activity so that they have better chances to earn higher incomes, have increased access and control over resources and have greater security and protection from violence.
Duties and Responsibilities
Immediate Objective
Under the guidance and direct supervision...
...facilities in a month for correcting the issues at the field level and prepare monitoring report.
Essential Requirements:
An advanced university degree (Master’s or higher) in computer science will be preferred.
A first University Degree in a relevant field...
Primary and Secondary Consultants Food Supply Chain to Assist Food department (Closing date -03[...]
...endorsed by the Strategic Advisory Group and
Presentation Workshop
WFP standard payment terms are net 30 days. In case advance payment is required, service provider will be required to submit bank guarantee /insurance from AA+ rating on WFP standard template...
...integrate user-facing elements with server-side logic.
Implement security measures and data protection protocols in applications.... ...Integrate machine learning models into web applications for advanced features.
Collaborate with data scientists and engineers to...
...scalable PERN Stack solutions.
- Design and develop efficient, secure, and maintainable backend APIs using Node.js and Express.js.... ...the development process and stay ahead of technological advancements.
- Contribute to the documentation of code, processes, and best...
...(or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity...
...child protection, education, livelihoods, health, energy and health).
The Senior GBV Associate will also support the operation in securing solutions for GBV survivors through comprehensive case management. Therefore, experience working with GBV survivors is essential....
...Position:
Quetta is provincial capital of Baluchistan which is constantly exposed to risks of complex emergencies due to the volatile security situation, the protracted refugee situation, weather and the political and general situation in Afghanistan. There are more than...
...maintaining and running its own accommodation unit for the past decades. The need for such an arrangement is continuous given the security restrictions, as well as staff welfare. The International Staff Accommodation is managed in accordance with UNHCR Guidelines for accommodation...
...being implemented by the EVAW Unit in BalochistanSupport the strategy development for strengthening RoL institutions and justice/ security sector stakeholders in Balochistan.Support the Head of the Sub-office in implementing the ROL work Plan within given timelines and...
...efficiently scrape business emails and generate B2B leads from Google Maps. Collect valuable data from Google Maps' business listings using advanced techniques.
Job Description:
- Specializes in generation and contact list building.
- Utilizes a data-driven approach...
...into land use patterns and their environmental implications.
Key Responsibilities:
Utilize GIS and R programming to conduct advanced land use mapping and analysis.
Apply landscapemetrics or similar packages to extract meaningful landscape metrics.
Develop...
...field partner for technical teams, working closely with customers, and assisting initial sales and delivery to customers who require advanced technological designs and services.
Follow the root cause analysis for every issue a customer reports and revert with an...
...Customers interested in purchasing airline tickets and tour packages
Helps Customers choose the best option
Use one of the most advanced bookings and sales engines for airline tickets and tours
Build trust and long-term cooperation with Customers...
...processes and also minimize any waste
Promoting and building automated processes wherever feasible
Enhance the IT infrastructure's security protocols by identifying and deploying needed cybersecurity measures by continuously conducting vulnerability assessment and risk...
...Configures the CMC and uses this to access content.
Adds to and changes objects in the repository.
Analyses BO Enterprise security model and creates security content such as users, groups and categories.
Maintenance of error logs and Knowledge Base.
To be...