Get new jobs by email
- ...Key Responsibilities: Develop and implement information security policies and procedures. Conduct regular risk assessments and vulnerability assessments. Monitor and respond to security incidents and breaches. Manage and maintain security tools and technologies...
- ...workstations, laptops, peripherals, and mobile devices. Follow IT security protocols (e.g., data backups, password policies, access... ...changes. Requirements Qualification . Bachelor’s in Information Technology / Computer Sciences. Experience . Minimum 2 years...
- ...sector . This role is pivotal in identifying, attracting, and securing top-tier professionals across both technical and non-technical... ...reflecting the organizations values and employer brand. Stay informed of U.S. labor market trends, salary benchmarks, and competitive...
- ...Job Title : Expert Information Security – JazzCash Grade Level: L2 Location: Islamabad Last Date to Apply: 26th July 2025 What is Expert Information Security? Seeking an experienced and highly motivated information security professional to join as an...
- ...production, and DR environments. Support backup operations, security compliance, patch management, and access controls. Maintain... .... Requirements Bachelor’s degree in computer science, information technology, information systems. Relevant professional qualifications...
- ...with various departments to ensure our HR systems are efficient, secure, and user-friendly. You'll lead projects that optimize our... ...HR policies and procedures relevant to the use of HRIS. Stay informed about industry trends in HRIS technology and recommend solutions...
- ...appointments and managing meeting rooms · Maintain office supplies and inform management when inventory is low · Provide general... ...other departments to ensure smooth office operations · Uphold security by following procedures and monitoring visitor access Requirements...
- ...database administrator (DBA) will be the performance, integrity and security of a database. You'll be involved in the planning and... ...Three to five years of experience in database administration, information technology, database architecture, or a related field Proven...
- ...integrations, and notification services. · Ensure data privacy, security, and compliance with Meta’s and Twilio’s messaging policies.... ...and Experience: · Bachelor's degree in Computer Science, Information Technology, or a related field. · Proven experience with WhatsApp...
- ...The ideal candidate will be responsible for conducting advanced security assessments and penetration testing activities across networks... ...: · Bachelor's degree in Cybersecurity, Computer Science, Information Security, or a related field (or equivalent experience). · Must...
- ...& Accessories: Stable internet connection Headphones Secure internet location, protected by a strong password For audio... ...this effect the Candidate agrees to provide any documentation or information reasonably requested by the Company to verify their identity...
- ...Docker and Kubernetes. Monitor application and system performance using tools like Prometheus, Grafana, or Datadog. Ensure security, compliance, and availability across all systems and environments. Collaborate with development, security, and SRE teams to...
- ...scalable, maintainable architecture and clean coding practices. Translate client business requirements into robust, scalable, and secure web solutions. Full Stack Development Front-end : Develop responsive UIs using HTML5, CSS3, JavaScript, React, Vue.js...
- ...: Install, update, and configure software applications and operating systems on employee devices. Work with the team to ensure security of all VOIP devices and servers, Provide support for VOIP telephone systems. Including softphones and PBX. Knowledge of Active...
- ...to join our team. The successful candidate will be responsible for crafting high-quality, compelling bid responses and proposals to secure new business opportunities. You will work closely with business development, sales, technical, and operations teams to produce...
- ...analysis and build process flows. You’re very detail oriented and pay attention to all the steps in the process. Additional Information What does your playfield look like? We work in a flexible but fast paced environment. We start and end with...
- ...optimization and enhancements of existing automation solutions. Ensure that automation solutions adhere to relevant compliance and security standards. Requirements Additional Responsibilities: Design and implement QA quality tests using scripts that...
- ..., MySQL, or MongoDB. Collaborate with front-end developers, DevOps, and other teams for seamless integration. Implement security and data protection best practices. Debug and resolve software defects and technical issues. Write clean, maintainable,...
- ...services. · Write clean, maintainable, and scalable code following best practices. · Optimize application performance and address security vulnerabilities. · Debug and troubleshoot issues across multiple browsers and platforms. · Stay updated with the latest...
- ...processes. Conduct complex data analysis to support business strategy and decision-making. Ensure data integrity, accuracy, and security in all processes. Mentor and guide junior analysts to build a high-performing data analytics team. Requirements...
- ...respond to incoming customer inquiries (via calls, SMS, WhatsApp, etc.) related to assigned car stock, providing accurate and engaging information to prospective buyers. Conduct visits to seller locations alongside prospective buyers, utilizing effective sales techniques...
- ...or inconsistencies in data entries. · Assist in the generation of reports and summaries based on data entries. · Ensure data security and confidentiality in accordance with company policies. · Collaborate with team members to ensure data consistency and accuracy...
- ...skills. · Good understanding of Agile methodologies and DevOps practices. Preferred Qualifications: · Experience with mobile application testing (iOS, Android). · Experience with security testing methodologies and tools. · ISTQB certification or equivalent....
- ...specialized repairs and services. · Maintain records of maintenance activities, supplies, and equipment inventory. · Ensuring proper security measures for the workplace, including collaborating with security system vendors or a team of security professionals. ·...
- ...to-end recruitment process for technical roles. As a key player in our talent acquisition strategy, you will identify, engage, and secure top-tier technical talent, ensuring alignment with our company’s goals and culture. This role demands a proactive approach, excellent...
- ...Job Title: Expert Cyber Security Grade Level: L2 Location: Islamabad Last Date to Apply: 7 July 2025 What is... ...Offensive Security Certified Professional), or CISSP (Certified Information Systems Security Professional) are a plus. ~ Experience with...
- ...maintainable, and well-documented code following industry best practices. · Optimize application performance, scalability, and security. · Implement database solutions using SQL Server, or other relational databases. · Conduct unit testing, debugging, and troubleshooting...
- ...campaigns, and launches to engage audiences in real time. Develop and maintain a crisis management protocol for social media. Stay informed about industry trends, algorithm updates, and best practices to keep strategies ahead of the curve. Key Qualities and...
- ...and resolve conflicts where necessary. Handling all incoming emails and calls related to property queries and prepare clear, informed responses to customers via emails, messages, etc. Liaise with the Complaints Manager to update and manage complaints processes...
- ...management in the accurate production of budgets. Ensure cashflow is utilised properly and protect reserves. Audit financial information for inconsistencies. Providing tax planning strategies in accordance with existing legislation. Ensure the books of the...