Search Results: 19 vacancies
...Key Responsibilities:
# WordPress Website Development: Develop and maintain WordPress websites, ensuring high performance, security, and usability.
# Theme Customization: Customize and extend WordPress themes to match client requirements and design specifications...
...Chemistry, Mathematics, or Supply Chain Management.
Responsibilities:
Collaborate with vendors to assess, negotiate, and secure services and supplies.
Develop comprehensive plans for the purchase of equipment, services, and supplies in line with company...
...Job Type: Full Time
Job Location: Nationwide Pakistan
Job Field: Sales & Marketing
Responsibilities
1. Strive to secure market expansion by signing new investors for our current products
2. According to the demand analysis of each target customer group...
...responsibilities for this occupation are the following:
Manage Building Maintenance, Renovations, and Repairs.
From overseeing security systems to managing renovation projects, he will be responsible for everything that affects the buildings and grounds of an...
...(or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity...
...company. We pioneer in crafting state-of-the-art private LLMs tailored for businesses, emphasizing the highest standards of privacy and security. Our mission is to provide robust tools that seamlessly integrate AI into enterprises, ensuring both innovation and utmost safety....
...The Manager, Environment, Health, Safety & Security (EHS), is responsible for
implementing effective processes, programs and continuous improvement to deliver EHS performance country wide. The position is implementing EHS strategies together with the regional EHS lead...
...backup, recovery, migration etc.
Profile server resource usage, and optimize and tweak as necessary.
Ensure the performance, security, and availability of databases • Collaboration with other team members.
Passionate about delivering excellent solutions....
...content and layouts within Shopify themes.
Implement and adhere to e-commerce best practices for user experience, performance, and security.
Work closely with designers, front-end developers, and other team members to ensure seamless integration of design and...
...optimizing data entry processes within the ERP system.
Safeguard sensitive information by maintaining data confidentiality and security.
Qualifications:
Strong attention to detail and a commitment to data accuracy.
Proficiency in data entry with a high level...
...of Hosting Accounts from a Server to Other
Restoration of Services in Minimum Possible Time in Case of any Failure
Ensuring Security of Hosting Servers.
Handling Issues Elevated by Subordinates
Ensuring Availability on Call in Emergency 24/7.
Preparation...
...Mayfair Valley Housing Scheme is a leading housing development company based in Faisalabad. We are committed to providing comfortable, secure, and affordable living options to residents in Lahore, Faisalabad, and Islamabad. Our goal is to create vibrant and sustainable...
...skills and contribute to long term growth.
Key Responsibilities:
- Build and nurture relationships with prospective clients to secure new business deals.
- Generate sales leads through proactive cold calls and internet research.
- Handle freight negotiation &...
...scheduled full-time shifts: either night shift, day shift, or a combination of the two
• Reliable laptop/computer (PC not MAC) with secure and private wifi internet connection (computer must have a video camera to attend online training sessions held via zoom video call...
...Description : Your main responsibilities will be to assist clients with digital transformation through API Management and API Security, which includes
Propose solutions to clients, based on best practices.
Support & develop API security policies and configure...
...processes and also minimize any waste
Promoting and building automated processes wherever feasible
Enhance the IT infrastructure's security protocols by identifying and deploying needed cybersecurity measures by continuously conducting vulnerability assessment and risk...
...Configures the CMC and uses this to access content.
Adds to and changes objects in the repository.
Analyses BO Enterprise security model and creates security content such as users, groups and categories.
Maintenance of error logs and Knowledge Base.
To be...
...framework.
Collaborate closely with front-end developers to integrate user-facing elements with server-side logic.
Implement security measures and data protection protocols in applications.
Leverage ML/AI expertise to develop solutions based on data-driven...
...understand project requirements and translate them into high-quality, scalable PERN Stack solutions.
- Design and develop efficient, secure, and maintainable backend APIs using Node.js and Express.js.
- Create and maintain a robust database structure using PostgreSQL,...