Get new jobs by email
- Riphah International University seeks a dedicated Assistant Professor Cyber Security to join its academic team. The successful candidate holds a PhD in Cyber Security from an HEC recognized institute and brings expertise in network security and cryptography. This role...
- Riphah International University is seeking a qualified and knowledgeable Lecturer in Cyber Security/Information Security to join its academic team. The ideal candidate holds a Master of Science degree in Cyber Security or Information Security from an HEC recognized institute...
- Riphah International University seeks a dedicated Assistant Professor specializing in Cyber Security for its Institute of Systems Engineering. The successful candidate holds a Ph.D. in a relevant discipline from an HEC recognized university or institution and possesses...
- ...Requirements: ~ Bachelor's degree in Computer Science, Information Systems, or a related field. ~2+ years of experience in Cyber Security, SOC, or IT Security roles. ~ Basic understanding of SOC operations, SIEM tools, and incident management. ~ Familiarity...
- ...compliance standards across operations Monitor, verify, and generate reports for all change activities Identify and document network security cases for awareness and improvement Perform root cause analysis (RCA) for non-compliance cases Track and follow up on...
- Riphah International University seeks a dedicated Junior Lecturer specializing in Software Engineering, Cyber Security, Information Security, or Computer Science. The ideal candidate holds an MS degree in the relevant field from an HEC-recognized institute and possesses...
- ...Our client Spark AI is looking for Endpoint Security Engineer in Lahore. Job Description: We are seeking a skilled and proactive... ...desktops, laptops, servers, and mobile devices, against evolving cyber threats. The role involves implementing, managing, and...
- ...such as public cloud, data science, AI, engineering innovation, and IoT. Our customers include... ...Canonical is looking for exceptional security-focused software engineers to be integrated... ...Location: Worldwide, this is a globally remote role What you'll do Security...
- ...providing managed IT services and managed security services for our clients. which are made... ...talented Security Operations Center (SOC) Engineer to join our Team. The Security Operations... ...designed to protect the company from cyber threats and attacks. Lead in deploying...
- ...planet! About the Role We’re looking for a product-minded engineer who can own the front-end domain , lead initiatives, move fast... ...: REST APIs Authentication & authorization flows Web security fundamentals Data validation & error handling ~ Ability to...
- ...technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses... ...the two. Role 10Pearls is looking for a Security Engineer to lead platform security through policy-as-code and modern...
- ...As a DevOps Engineer, you will be responsible for designing, implementing, and maintaining the infrastructure that supports our applications... ...MongoDB instances, ensuring data integrity, performance, and security. Implement backup, recovery, and disaster recovery...
- ...Our client Bykea Technologies is looking for Senior Application Security Engineer in Karachi. What You Will Do Lead threat modeling and secure design reviews for Bykea's applications and infrastructure, ensuring secure-by-default architectures Design...
- ...Communications, Managed Connectivity and Managed Security which has earned its stellar reputation... ...and proactive Tier 2 Managed Services Engineer to design, implement, and support... ...environment. Work Schedule Location: 100% Remote. Hours: Standard business hours based...
- ...of Cloud Communications, Managed Connectivity and Managed Security which has earned its stellar reputation by taking service... ...Job Description We're Hiring: Managed Services Engineer – Tier 3 (Remote, Pacific Time Zone) Are you a seasoned network engineer...
- ...especially those who may find it challenging to secure traditional financing. Typically, the... ...Data Analysts, one specializing in data engineering & migration, and another focused on data... ...-time opportunity. Enjoy the freedom of a completely remote work environment!...
- ...tools (e.g., ELK stack or similar). Familiarity with A/B testing and experimentation frameworks. Strong knowledge of RBAC, security, and governance in data/ML platforms. Experience with cloud environments (Azure preferred). Responsibilities: Design...Remote job
- ...We are looking for a skilled and proactive Security Administrator to join our Information Security team. The ideal candidate will be responsible for managing and maintaining enterprise security solutions with a focus on Privileged Access Management (PAM)and Data Loss...
- ...Last date to apply: 30 April 2026 What is Specialist Cloud & AI Security? Specialist Cloud & AI Security is responsible to secure cloud environments and AI/ML systems against evolving cyber threats. This role focuses on protecting cloud infrastructure, applications...
- ...validation for backend and data testing. ~ Knowledge of BDD, TDD, and modern QA methodologies. ~ Experience in performance and security testing is an added advantage. ~ Strong communication, analytical thinking, and problem-solving skills. Responsibilities:...Remote job
- ...Institution (EMI), seeks to appoint an experienced professional for the following role: Job Role As Manager – Information Security, you will be responsible for establishing and enforcing security protocols that safeguard Company's information systems, digital...
- ...Ability to interpret operational requirements, convert them into technical solutions, and clearly communicate the business impact of engineering decisions. ~ Demonstrated ability to take ownership, work independently, and drive projects successfully in dynamic or...Remote job
- ...especially those who may find it challenging to secure traditional financing. Typically, the... ...IP work Collaborate with Data Engineering to structure and prepare datasets for modeling... ...-time opportunity. Enjoy the freedom of a completely remote work environment!...
- ...Remote Recruiter - No Experience Needed Location: Remote (Worldwide) Type: Freelance / Flexible / Platform Access Overview:... ...client roles (RecX Direct) * Roles shared by recruiters (Xchange Engine) * Global recruiter community for support * Upgrades available...
- Riphah International University is seeking a motivated and knowledgeable Teaching Fellow specializing in Software Engineering, Cyber Security, Information Security, Computer Science, or Artificial Intelligence. The successful candidate will be responsible for delivering...
- ...We are looking for a skilled and proactive Security Administrator (Email & End Point Security) to join our Information Security team. The ideal candidate will be responsible for managing and maintaining enterprise security solutions, ensuring the protection of organizational...
- ...United States, especially those who may find it challenging to secure traditional financing. Typically, the work schedule is from 9:00am... ...only 6 months with us. This opportunity is a full-time position. Work comfortably from anywhere with our fully remote setup!...
- ...Specialist to provide 1st level technical support to both onsite and remote employees. The ideal candidate will have hands-on experience in... ...experience with Active Directory ~ Understanding of IT security best practices What We Offer ~ Opportunity to work with...
- ...nationalities and team members working remotely from all over the world We are fully... ...About the Role As the Lead Full Stack Engineer, you will take on a pivotal role in guiding... ...uphold platform reliability. Ensure security and compliance by following best...
- ...including modules, workspaces, providers, state management, and remote state handling. ~ Strong experience with Azure services,... ...integrating IaC with CI/CD pipelines, including automated validation, security scanning, and compliance checks. ~ Experience building and...