Search Results: 20 vacancies
...UN WOMEN Jobs - 114480- Programme Associate - Livelihood and Food Security Open Accessibility menu Press the enter key to adjust the page for a screen reader
Skip to main navigation
Skip to language selector
Skip to content
Skip to footer
UNDP around...
...(or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity...
...profession design template of the profession
with the skill you need)
Knows
Practices
Proficient
Expert
Information security management
Use of the Information System
O t her professional skills – Emergency (see profession design template of the...
...Assist the regional manager in acceptance testing and handover/takeover activity.
Liaise with internal stakeholders for legal and security issues and escalating to the head office if issues are not resolved in the agreed time frames
Assist in the installation,...
...Previous exposure to blockchain frameworks like Ethereum or Binance Smart Chain is advantageous.
Understanding of blockchain security protocols and CI/CD pipelines is a plus.
Education and Experience:
Bachelor's degree in Computer Science, Engineering, or a...
...Define the technical requirements of the app, such as the programming languages, the frameworks, the APIs, the databases, the security protocols, etc
Prepare a non-functional prototype that is in line with the following requirements; so that the client gets the...
...Pakhtunkhwa Rural Accessibility Project an ...
Compliance Specialist Jobs professionals in Peshawar
Supply chain and Administrative professional
INUSRANCE UNDERWRITTER CUM IT/ISO COORDINATOR
To secure a role in Security and business firm.
#J-18808-Ljbffr
...Representation at relevant forums
Strategy & business/proposal development
Support the Area Manager in monitoring the security situation and liaison with relevant stockholders
Donor reporting.
A. Missions / responsibilities
1. Management
1....
...Manager Operations
Monarch Security Company, Pakistan
To manage security operations in Peshawar and NWFP and head the branch of Peshawar.
Job Specification
Must be an Ex Army Officer of the rank of Capt or Major with sound proficiency in Computer, MS Office...
...Leaves unbounded and unlimited
Achieve monthly target and proceed on leave
Accommodation messing electricity all inclusive
Lab secured and protected by state police
Synthesis of salts involve complex procedures in complex lab equipments as per lab manual
Bonus...
...of Companies, Pakistan
Assist Head Administration in managing administrative team incl. Operational/ Maintenance personnels & Security staff.
Providing assistance to the Head for smooth operations.
Knowledge of dealing with Office Administrative matter i.e. general...
...more than 10,000 passive nodes.Suitable candidate should have following
1- Understanding of ICT Infrastructure (Servers, Networks, Security etc)
2- Good understanding of enterprise IT architecture
3- Good Knowledge of Databases
4- Ability to manage ICT department...
...developing front-end web client applications for various software platforms. A software engineer makes sure that the functionality, security and performance of the client application is as per the design and is completely bug free.
Duties & Responsibilities...
...Medical Services on any emergent medical care matters at RMI
14.Shall coordinate with Administration Department i.e. Engineering, Security, and Support Services etc. with regards to patient care and running of all Medical Units
15.Shall ensure implementation of RMI...
...viewings, and offer insights on the neighborhood, amenities, and market trends. They also assist in negotiations, helping clients secure the best possible deal and navigate through the complex paperwork involved in real estate transactions.
Real estate agents often...
...environment.
- Promote mainstreaming of Age, Gender and Diversity (AGD) across all sectors and activities such as health, safety and security, psychosocial and legal shelter, WASH, and Energy and coordinate with Programme and Protection sections to ensure that GBV risk...
...processes and also minimize any waste
Promoting and building automated processes wherever feasible
Enhance the IT infrastructure's security protocols by identifying and deploying needed cybersecurity measures by continuously conducting vulnerability assessment and risk...
...framework.
Collaborate closely with front-end developers to integrate user-facing elements with server-side logic.
Implement security measures and data protection protocols in applications.
Leverage ML/AI expertise to develop solutions based on data-driven...
...Configures the CMC and uses this to access content.
Adds to and changes objects in the repository.
Analyses BO Enterprise security model and creates security content such as users, groups and categories.
Maintenance of error logs and Knowledge Base.
To be...
...understand project requirements and translate them into high-quality, scalable PERN Stack solutions.
- Design and develop efficient, secure, and maintainable backend APIs using Node.js and Express.js.
- Create and maintain a robust database structure using PostgreSQL,...