Get new jobs by email
- ...Technical/Functional Expertise (Primary) GRC (Governance, Risk & Compliance), Information Security Policies, Risk Assessment, ISO 27001:2022 Controls, Security Documentation, Audit Support Technical/Functional Expertise (Secondary) SOC Monitoring, Security Event...
- ...Are you an experienced cybersecurity professional eager to take on a key role in securing Digital Retail Banking (DRB) operations? We are looking for a Cybersecurity Specialist to lead the implementation and monitoring of SIEM/SOC solutions, conduct security testing,...
- ...you passionate about cyber threat detection and response? We are seeking a Cybersecurity Analyst to monitor, analyze, and triage security alerts, ensuring a proactive defense against evolving threats in a Digital Retail Bank (DRB) environment. This role involves SIEM...
- ...Key Responsibilities: Develop and implement information security policies and procedures. Conduct regular risk assessments and vulnerability assessments. Monitor and respond to security incidents and breaches. Manage and maintain security tools and technologies...
- ...about cybersecurity and looking to make a real impact in the fast-evolving world of digital banking? We’re seeking a dynamic Information Security Administrator to take charge of securing our cutting-edge Digital Retail Bank (DRB) infrastructure. This role is perfect for...
- ...As the Chief Information Security Officer (CISO) for HugoBank, a cloud-native digital bank operating in Pakistan, one will play a pivotal leadership role in safeguarding the bank’s digital ecosystem. The CISO is responsible for defining and executing the enterprise information...
- ...Job Title: Security Engineer Experience: 4–6 Years Location: Pakistan (Hybrid) Employment Type: Full-Time Job Summary We... ...Required Skills & Qualifications ~4–6 years of experience in information/network security ~ Strong expertise in firewall...
- ...Manager IT Operations, you will be responsible for ensuring the secure, stable, and efficient operation of all technology systems and... ...Minimum 16 years of education, preferably a Masters degree in Information Technology, or a related field from an HEC-recognized or...
- ...providing managed IT services and managed security services for our clients. which are made... ...Security Operations Center (SOC) Engineer to join our Team. The Security Operations... ...An understanding or proficiency in information security and compliance regulations (ISO...
- ...Requirements: ~ Bachelors degree in Computer Science, Information Technology, or a related field. ~5+ years of hands-on experience in network security and enterprise networking environments. ~ Strong hands-on experience with BGP configuration and troubleshooting...
- ...UNHCR continues to focus on advocacy, legal protection, life‑saving assistance, and efforts to advance durable solutions. The Information Management Associate will support the operationalization of common operational datasets and participate in needs‑assessment processes...
- ...Job Title: SDLC Security Operations Engineer (DevSecOps) Experience: 7–9 Years Location: Pakistan - Remote (UAE Business Hours) Employment Type: Full-Time Job Summary We are looking for a hands-on SDLC Security Operations Engineer to embed security controls...
- ...Are you a seasoned IT Security professional passionate about ensuring robust security frameworks? We are seeking a highly motivated... ...opportunity to play a vital role in safeguarding our organization's information assets and fostering a strong security culture. Key...
- ...partners. Job Description: Aqovia is seeking a Security Officer to lead and enhance our Information Security Management System (ISMS) and strengthen... ...Produce SOC2 reports. Collaborate closely with engineering, delivery, and client teams to improve overall security...
- ...are seeking a highly experienced Principal Consultant – Cyber Security to provide strategic direction and delivery leadership across... ...skills. Bachelor’s or Master’s degree in Computer Science, Information Security, Cybersecurity, or related discipline. Preferred Certifications...
- ...points and verify IDs. Patrol areas to prevent theft or damage. Respond to emergencies and report incidents. Monitor CCTV and security equipment. Support junior security staff when needed. Follow all security rules and discipline. Prepare daily security...
- ...The Specialist, GIS (Geographic Information Systems) plays a critical role in the development and implementation of GIS projects and systems. This position involves analyzing spatial data through mapping software, maintaining and updating geographic databases, and producing...
- ...passionate and driven cybersecurity professional looking to make a significant impact? We are seeking a talented Assistant Manager – Security Architecture & Threat Intelligence to join our team in Karachi, Pakistan. This is a Permanent opportunity to contribute to a...
- ...Job Title: Cyber Security Specialist (SOC / Incident Response) Experience: 7–9 Years Location: Pakistan (Hybrid) (UAE Business Hours... ...Solutions Architect – Associate Microsoft Azure Security Engineer Associate (AZ-500) Good to Have Telecom, Government or regulated...
- ...client Neem is looking for Cybersecurity Engineer in Karachi. What are we looking for... ...We are seeking an experienced Cyber Security Engineer to strengthen Neem's security... ...Bachelors degree in Computer Science, Information Security, or related field. At least...
- ...Network Engineer Location: Gulberg 3, Lahore Employment Type: Full-Time -... ...VPN (Site-to-Site & Remote Access), and security profiles. Monitor and optimize network... ...~ Bachelors degree in Computer Science, Information Technology, or related field (or...
- ...Role We are looking for a Mobile Software Engineer to help build and evolve a decentralized... ...client-side verification and security. Responsibilities Collaborate with... ...accepted cryptocurrencies. For more information on Dash, please visit To apply for this...
- ...Jordan. We have offices in Riyadh, Jeddah, Madinah, Dammam, Khobar, Amman, Lahore, and Karachi. Job Brief: The Lead IT Security and Compliance Officer will establish and oversee Jeeny’s security and compliance program, ensure alignment with ISO 27001, SOC 2...
- ...Summary: We are seeking a skilled DevOps Engineer with AWS Cloud Practitioner... ...release processes. - Maintain optimal security practices within our cloud environments.... ...- Bachelors degree in Computer Science, Information Technology, or a related field is preferred...
- ...administration of Linux servers, ensuring system stability and security. Manage and deploy SAN switches, including... ...~ Bachelor’s degree in computer science, Information Technology, Electrical or Computer Engineering, or a related field. ~ Certified Linux Administrator...
- ...thoroughly professional and experienced SQA Engineer with good communication skills and a... ...processes. Collaborate with security team for cybersecurity measures. Manage... ...or Master’s degree in Computer Science, Information Technology, or a related field. Strong...
- ...As a DevOps Engineer, you will be responsible for designing, implementing, and maintaining the infrastructure that supports our applications... ...MongoDB instances, ensuring data integrity, performance, and security. Implement backup, recovery, and disaster recovery...
- ...with portfolio manager, product managers, developers, and security engineers to ensure that security is embedded throughout the projects... ...Experience: ~ Bachelor’s degree in Computer Science, Information Security, or related field. ~3–5 years of professional experience...
- ...Job Brief: We are seeking a highly skilled Network Engineer with expertise in AWS Network Architecture and Terraform, combined with... .... The ideal candidate will design, implement, and support secure, scalable, and highly available cloud and hybrid network infrastructures...
- ...and innovation that sets us apart. We’re looking for a Cloud Engineer to strengthen Paymentology’s cloud infrastructure foundations, with a strong focus on AWS multi-account governance, IAM security controls, and Infrastructure as Code automation. This role plays...