Get new jobs by email
- ...Strategic Security Leadership Develop and maintain a security strategy aligned with our FinTech and SaaS business objectives.... ...program with clear metrics and KPIs. Establish and enforce information security policies and procedures. Security Operations & Incident...
- ...We are seeking a detail-oriented and proactive Information Security Specialist to join our IT security team. The ideal candidate will be responsible for protecting our organizations computer systems and networks from cyber threats by monitoring, detecting, analyzing,...
- ...Money Transfer is seeking a highly experienced and dynamic Cyber Security Manager to lead and mentor both our Offensive (Red Team) and... ...Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Relevant security certifications...
- ...Job Title : Senior Security Operations Centre (SOC) Analyst Location: Lahore / Kharian Position Type: Full-Time About... ...cybersecurity team. The ideal candidate will have a strong background in information security, incident response, and threat detection. As a SOC...
- ...have specialized in providing managed IT services and managed security services for our clients. which are made up of small to medium... ...network technologies An understanding or proficiency in information security and compliance regulations (ISO 27001, PCI DSS, GDPR)...
- ...administration and architecture. If youre also passionate about security and data protection, wed like to talk with you. Job... ...very quickly in a fast-paced environment Ability to communicate information and ideas in speaking so others will understand Job Requirements...
- ...Full-time: On site Experience: 10 plus years of experience in security operations Qualification: Bachelor’s/Master’s from a... ...to guide the exchange of sensitive, complicated, and difficult information, convey performance expectations and handle problems. • Good...
- ...liabilities. Ensuring accurate account allocation for all financial information recorded. Review and ensure all expenses are budgeted for... ...such as banks, acquirers, issuers or as may be assigned. Securely maintaining any credentials of provided accesses to systems,...
- ...realities, all over the world. Learn more at purpose The role of Information Technology (IT) Services Manager - Middle East and Africa (MEA... ..., networking, projects, support, disaster recovery and security. The IT Services Manager - MEA coordinates closely with the Global...
- ...colour, national origin, ethnic or social background, genetic information, gender, gender identity and/or expression, sexual orientation... ...and equipment following authorized routing and UN safety and security rules and regulations to ensure safe and efficient services. 2...
- ...regardless of race, gender, religion, nationality, or any other factor. We believe that the best person for the job should be selected based on skills and experience alone. Your information will be kept confidential and stored securely. Please see our Privacy Policy ....
- ...providing a comprehensive range of services, including Network & Security, UNIX/Linux & Windows Engineering, System & Database... ...team and across departments ~ BS/BA in Computer Science, Information Technology, or relevant field ~ Relevant certifications (e...
- ...Responsibilities Proven hands-on experience with Office 365, Windows Security, and Email Security Knowledge of Exchange, OneDrive, Email... ...Required: Education Requirements Bachelor’s degree in Information Technology, Computer Science, Systems Engineering #128736;...
- ...deployments (AWS, Azure, etc.) and implement best practices for security and cost optimization. Utilize containerization... ...Qualifications: Bachelor’s degree in Computer Science, Information Technology, or related field. Proven experience as a DevOps...
- ...business operations. Protects organization's value by keeping information confidential. Enhance organization reputation by accepting... ...systems and IT components. Good knowledge of internet security and data privacy principles. Excellent troubleshooting skills...
- ...highly skilled DevSecOps Engineer to join our team and enhance the security posture of our CI/CD pipelines, infrastructure, and... ...Requirements ~ Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience). ~2+...
- ...a proactive and experienced Senior System Engineer – Cloud & Security to join our dynamic IT infrastructure team. The ideal candidate... .... Requirements Bachelor’s degree in Computer Science, Information Technology, or a related field. A Master’s degree is a plus....
- ...effectively with clients, providing status updates, technical information, and recommendations. Perform any additional job duties... ...mailbox configuration, or generating reports on M365 usage and security. Assisting with M365 Security Center tasks like detecting...
- ...leader entity in delivering functionally rich, easy to deploy e-security solutions? Ascertia promotes fast paced and challenging... ...continue to dominate the high trust end of our market. Product Information SigningHub (more business focused) delivers a complete signing...
- ...peripherals . Manage user accounts, permissions, and IT security protocols. Ensure network connectivity and performance... ...Requirements Bachelor’s degree in Computer Science, Information Technology, or a related field . Proven experience in IT...
250000 - 300000 PKR
...Core and Angular. Design and implement robust, scalable, and secure backend services using ASP.NET Core and RESTful APIs. Build... ...& Experience: Bachelor’s degree in Computer Science, Information Technology, or a related field, or equivalent practical experience...- ...how the services or products meet their requirements Deal with doubts and complaints to secure the company’s reputation. Prepare sales records and all the useful information Go ‘extra mile’ to achieve sales targets and facilitate future sales Requirements...
- ...communicated to key stakeholders. Ensure systems are configured with security, performance, resiliency and high availability in mind.... ...with the wider product team. Ensure partner and customer information, including project, case, deployment, and contact details are...
- ...team, responsible for monitoring, analyzing, and responding to security threats and incidents. The successful candidate will have a... ...Requirements Basic Requirements: # Bachelor/Master Degree in Information Security, Computer Science or related field # At least 6+...
- ...and guidance throughout project lifecycles. Implement data security and privacy policies in line with industry best practices and... ...Bachelor’s or master's degree in computer science, Engineering, Information Technology, or a related field. ~7+ years of experience in...
- ...fix services, hosting complex applications, conducting network security audits on regular intervals, ensuring disaster recovery plans... ...problems with servers. GCS helps companies realize the full value of information technology from anywhere at any time. Job Description...
- ...fix services, hosting complex applications, conducting network security audits on regular intervals, ensuring disaster recovery plans... ...problems with servers. GCS helps companies realize the full value of information technology from anywhere at any time. Job Description...
- ...architecture, software development, data insights and intelligence, cyber security, emerging tech, and quality assurance ensures that we are... ...of industry trends, tools, and technologies to provide informed recommendations to clients. Requirements ~5-7 year of Full...
- ...regardless of race, gender, religion, nationality, or any other factor. We believe that the best person for the job should be selected based on skills and experience alone. Your information will be kept confidential and stored securely. Please see our Privacy Policy ....
- ..., software development, data insights and intelligence, cyber security, emerging tech, and quality assurance ensures that we are delivering... ...Monitor current and future trends, technology, and information; review and adopt emerging technology trends to improve capabilities...