Get new jobs by email
- ...Electronic Money Institution (EMI), seeks to appoint an experienced professional for the following role: Job Role As Manager – Information Security, you will be responsible for establishing and enforcing security protocols that safeguard Company's information systems...
- ...experienced cybersecurity professional eager to take on a key role in securing Digital Retail Banking (DRB) operations? We are looking for a... ...of SIEM/SOC solutions, conduct security testing, and manage security tools such as antivirus, endpoint protection, and data...
- ...seeking a Cybersecurity Analyst to monitor, analyze, and triage security alerts, ensuring a proactive defense against evolving threats... ...involves SIEM monitoring, incident handling, vulnerability management, and compliance enforcement to maintain the highest security standards...
- ...-evolving world of digital banking? We’re seeking a dynamic Information Security Administrator to take charge of securing our cutting-edge Digital... ...thrives on deploying state-of-the-art security solutions, managing SIEM integrations, and ensuring compliance with industry-...
- ...Key Responsibilities: Develop and implement information security policies and procedures. Conduct regular risk assessments and vulnerability... ...Monitor and respond to security incidents and breaches. Manage and maintain security tools and technologies. Collaborate...
- ...Are you a seasoned IT Security Compliance professional looking for a challenging and rewarding... ...a highly skilled and motivated Deputy Manager IT Security Compliance to join our team... ...: • Develop, and maintain comprehensive Information Security Management System (ISMS)...
- ...Achievement of Order Intake Targets assigned by Market Segment/ Management. • Sales support for Market Segment, including requirements... ...including relevant correspondence with customers, assisting in • security clearance of the firm/ employees, interaction with military...
- ...Pakistan’s leading provider of integrated security and fire safety solutions, delivering... ...We are looking for a motivated Assistant Manager Marketing & Sales to join our Karachi team... .... -Provide awareness and technical information about products (Fire Doors, Road Blockers...
- ...30 April 2026 What is Specialist Security Operations Center? Specialist Security... ...application firewalls o Identity and access management systems o Cloud and hybrid-IT... ...and Educational requirements BE/MS (Information Security, Software, Telecoms), 2 – 5...
- ...What is Expert Application & Product Security? Expert Application & Product Security... ...4. Align AppSec with enterprise risk management and business objectives 5. Conduct threat... ...Security? BS/MS in CyberSecurity/Information security/Information Technology Practical...
- ...apply: 22 April 2026 What is Specialist Cyber Security Operations? The role reports directly to the Manager Identity and Access Operations and will be part... ...Operations? Bachelor’s in computer science, Information Security, or related field. Experience: 1–3 years...
- ...30 April 2026 What is Telco Network Security Expert? Telco Network Security Expert... ...functions. The role reports directly to the Manager Architecture & Cloud Security with an... ...Security Expert? BS/MS in Telecom/Information Technology Practical experience of telecom...
- ...A leading E&P Company invites applications for the position of Chief Officer (Security). QUALIFICATION & EXPERIENCE: Having served in Pakistan Army in the capacity of Col. / Lt. Col or equivalent rank in Pakistan Navy or Air force. Preference will be given...
- ...2026 What is Specialist Cloud & AI Security? Specialist Cloud & AI Security is responsible... .... The role reports directly to the Manager Architecture & Cloud Security with an... ...Expert? BS/MS in AI/CyberSeurity/Information Technology Practical experience of Cloud...
- ...to align on strategy and execution. The company is founder-led, profitable, and growing. Canonical is looking for exceptional security-focused software engineers to be integrated across product teams. While they also contribute to the product as engineers, their primary...
- ...2026 What is Specialist Application Security & Pen Tester? Specialist Application... ...responsible to evaluate and plan mitigations of information security related risk to Jazz... ...sensitive information. 9. Coordinate and manage internal stakeholder expectations with the...
- ...technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to... .... The ideal candidate will have a strong foundation in information security, risk management, and security operations, along with a proactive...
- ...technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to... ...lifecycle. Responsibilities: ~ Implement, manage ISO 27001, and update information security policies and procedures ~ Monitor network...
- ...Shan Marketing Services seeks a highly skilled and experienced Security In Charge to oversee and enhance the security operations within... ...five years of relevant experience. This leadership role involves managing a team of 19 personnel, ensuring the safety and security of...
- ...The Specialist, GIS (Geographic Information Systems) plays a critical role in the development and implementation of GIS projects and systems. This position involves analyzing spatial data through mapping software, maintaining and updating geographic databases, and producing...
- ...Our client Spark AI is looking for Endpoint Security Engineer in Lahore. Job Description: We are seeking a skilled and proactive... ...evolving cyber threats. The role involves implementing, managing, and monitoring endpoint security solutions to protect against...
- ...client Bykea Technologies is looking for Senior Application Security Engineer in Karachi. What You Will Do Lead threat modeling... ..., JavaScript preferred) ~ Proven experience integrating and managing security tools (SAST, DAST) within CI/CD environments ~ Solid...
- ...April 2026 What is Specialist Cyber Security - IAM, PAM Planning and Delivery? The... ...directly to Head of Identity Access Management and will be part of 10 team members.... ...Requirements Bachelor's degree in Information Technology, Cybersecurity, or a related...
- ...~ Bachelor's degree in Computer Science, Information Systems, or a related field. ~2+ years of experience in Cyber Security, SOC, or IT Security roles. ~ Basic understanding... ...SOC operations, SIEM tools, and incident management. ~ Familiarity with security monitoring,...
- ...: We are a privately owned leading Managed IT Services company (Managed Service Provider... ...managed IT services and managed security services for our clients. which are made... ...An understanding or proficiency in information security and compliance regulations (ISO...
- ...Manchester, United Kingdom. We provide secure online remittance services to customers... ...worldwide. Job Title: Sanctions Manager Re p orting to: MLRO Alterna... .... Collect and analyze supporting information, including transaction data, customer details...
- ...Job Title: SDLC Security Operations Engineer (DevSecOps) Experience: 7–9 Years Location: Pakistan - Remote (UAE Business Hours)... ...using GitHub, GitLab, Azure DevOps, and Jenkins Implement and manage SAST/DAST , dependency scanning, secret scanning, and...
- ...Company Overview: Mechatronix Solutions is Pakistan’s leading provider of integrated security and fire safety solutions, delivering reliable, innovative, and certified systems across industries. We are committed to quality, precision, and client satisfaction. Job...
- ...: Karachi, Pakistan JOB OVERVIEW The Account Manager (Consultant) will partner with Study Group on a contractual... ...should be selected based on skills and experience alone. Your information will be kept confidential and stored securely. Please see our Privacy Policy ....
- ...Overview: We are seeking a Senior Product Manager to lead the evolution of a cutting-edge... ...sector environments. Familiarity with secure cloud-based infrastructures, testing... ...vision, anticipate challenges, and make data-informed decisions. Leadership: Proven track...