Get new jobs by email
- ...Company invites applications for the position of Chief Officer (Security). QUALIFICATION & EXPERIENCE: Having served in... ...force. Preference will be given to Pakistan Staff Course / Intelligence Staff Course qualified officers with 02-03 years' service in Intelligence...
- ...the following role: Job Role As Manager – Information Security, you will be responsible for establishing and enforcing... ...handling security incidents, vulnerability assessments, and threat intelligence operations. Security Operations & Architecture – Hands-on...
- ...and front-end BI tools, and a true passion for technology. This resource will oversee BI end-to-end solution, assuring Business Intelligence technical consistency to the solution configuration and customization, as well as being the point of reference for the client and...
- ...Last date of apply: 30 April 2026 What is Specialist Security Operations Center? Specialist Security Operations Center is... ...devices o Infrastructure server and end-user systems o Threat intelligence platforms o Web proxies o Application logs and web-...
- ...data literacy across the organization. Requirements Required Skills & Experience ~4+ years of experience in Business Intelligence or Data Analytics roles ~ Advanced expertise in SQL (including CTEs, window functions, and performance optimization) ~ Hands-...
- ...Role Purpose The associate is responsible for the intelligence and preparation layer around the CEO. They research, synthesise, and structure so that the CEO walks into every engagement informed and so that the content and PR teams have solid, well-reasoned material...
- ...Job Brief: We are looking for a Business Intelligence Intern who is passionate about leveraging AI to transform reporting and analytics processes. This role focuses on exploring how AI can be effectively utilized across the BI lifecycle — from requirement gathering...
- ...Last date to apply: 30 April 2026 What is Telco Network Security Expert? Telco Network Security Expert is responsible to lead... ...DPI) § SIEM platforms (Splunk, ELK, QRadar, etc.) § Threat intelligence and incident response o Experience with: § Kubernetes, Docker...
- ...and a passion for helping our partners succeed. The Role We are looking for a highly skilled and communicative Business Intelligence (BI) Analyst to join our growing Data Team. In this role, you will be the bridge between our raw data and our internal business...
- ...systems. Ensure high standards of code quality, documentation, security, and compliance throughout the AI development lifecycle.... ...Requirements ~ Bachelor’s degree in Computer Science, Artificial Intelligence, Software Engineering , or a related field. ~3+ years of...
- ...Our client Exper Labs is looking for Artificial Intelligence Engineer in Lahore. Job Description Position Overview We're looking for a skilled AI Engineer with 3 to 6 years of experience in building intelligent applications powered by Large Language Models...
- ...to align on strategy and execution. The company is founder-led, profitable, and growing. Canonical is looking for exceptional security-focused software engineers to be integrated across product teams. While they also contribute to the product as engineers, their primary...
- ...Grade: L2 Location: Islamabad Last date to apply: 26 April 2026 What is Expert Application & Product Security? Expert Application & Product Security is responsible to drive secure design, development, and deployment of digital products. This role is responsible...
- ...Grade Level: L1 Location: Islamabad Last date to apply: 22 April 2026 What is Specialist Cyber Security Operations? The role reports directly to the Manager Identity and Access Operations and will be part of 10 members team. The L1 IAM Operations Engineer is...
- ...seeking a Cybersecurity Analyst to monitor, analyze, and triage security alerts, ensuring a proactive defense against evolving threats... ...highest security standards. If you have experience in threat intelligence, log analysis, and security policy implementation, this is the...
- ...experienced cybersecurity professional eager to take on a key role in securing Digital Retail Banking (DRB) operations? We are looking for a... ...threats and enhance detection techniques. Conduct threat intelligence analysis and proactively implement risk mitigation measures....
- ...serving some of the largest mega events in the Kingdom surpassing over 2 billion sales. Role Overview: The Senior Marketing Intelligence Officer will lead our marketing data strategy by designing dashboards, producing insights, and enabling data-driven decisions....
- ...Science, Information Systems, Statistics, Economics, or a related quantitative field. ~4+ years of proven experience in a Business Intelligence or Data Analytics role. ~ Strong expertise in SQL, including complex querying, window functions, common table expressions (...
- ...Grade: L1 Location: Islamabad Last date to apply: 30 April 2026 What is Specialist Cloud & AI Security? Specialist Cloud & AI Security is responsible to secure cloud environments and AI/ML systems against evolving cyber threats. This role focuses on protecting...
- ...Are you a seasoned IT Security Compliance professional looking for a challenging and rewarding opportunity? We are seeking a highly... ...and insightful IT security risk reports, providing actionable intelligence to stakeholders, including senior management. Required Qualifications...
- ...architectural decisions , mentoring engineers, and delivering applied intelligence solutions that create measurable business impact.... ...architecture discussions , ensuring scalability, reliability, security, and performance . Deploy AI systems on cloud platforms (...
- ...Our client Spark AI is looking for Endpoint Security Engineer in Lahore. Job Description: We are seeking a skilled and proactive Endpoint Security Engineer to safeguard the organization's endpoint devices, including desktops, laptops, servers, and mobile devices...
- ...Segment opportunities in C4C • Handling Corporate Affairs Matters including relevant correspondence with customers, assisting in • security clearance of the firm/ employees, interaction with military personnel etc. • Managing and controlling the internal process of...
- ...Systems, or a related field. ~2+ years of experience in Cyber Security, SOC, or IT Security roles. ~ Basic understanding of SOC... ...threats, vulnerabilities, and attack techniques. Utilize threat intelligence sources and feeds to enhance detection and improve...
- ...transform, scale, and accelerate by adopting digital and exponential technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses modernize through cloud adoption and development and the...
- ...Grade: L1 Location: Islamabad Last date to apply: 30 April 2026 What is Specialist Application Security & Pen Tester? Specialist Application Security & Pen Tester is responsible to evaluate and plan mitigations of information security related risk to Jazz...
- ...transform, scale, and accelerate by adopting digital and exponential technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses modernize through cloud adoption and development and the...
- ...Our client Bykea Technologies is looking for Senior Application Security Engineer in Karachi. What You Will Do Lead threat modeling and secure design reviews for Bykea's applications and infrastructure, ensuring secure-by-default architectures Design...
- ...have specialized in providing managed IT services and managed security services for our clients. which are made up of small to medium... ...response function across the environment. Translate threat intelligence into actionable security across tools such as firewall, IPS...
- ...Key Responsibilities: Develop and implement information security policies and procedures. Conduct regular risk assessments and vulnerability assessments. Monitor and respond to security incidents and breaches. Manage and maintain security tools and technologies...