Get new jobs by email
Search Results: 243 vacancies
- Internship Duration: 3 Months (with potential conversion to full-time employment based on performance) Responsibilities: Participate in the acquisition, transformation, and integration of data from various structured and unstructured sources. Contribute to...
- ...Money Transfer is seeking a highly experienced and dynamic Cyber Security Manager to lead and mentor both our Offensive (Red Team) and... ...'s security monitoring, incident response, and threat intelligence capabilities. Ensure the effective detection, analysis, containment...
- ...We are seeking a detail-oriented and proactive Information Security Specialist to join our IT security team. The ideal candidate will... ...communication skills. Preferred: Experience with threat intelligence platforms and incident response frameworks. Familiarity...
- ...Strategic Security Leadership Develop and maintain a security strategy aligned with our FinTech and SaaS business objectives. Drive adoption of industry frameworks (ISO 27001, NIST, SOC 2) and monitor regulatory compliance (e.g., PCI‑DSS, GDPR, PDPL)....
- ...Job Title : Senior Security Operations Centre (SOC) Analyst Location: Lahore / Kharian Position Type: Full-Time About... ...vulnerabilities Threat Detection: Utilize advanced threat intelligence to proactively identify and mitigate potential security risks...
- ...have specialized in providing managed IT services and managed security services for our clients. which are made up of small to medium... ...response function across the environment. Translate threat intelligence into actionable security across tools such as firewall, IPS...
- ...Full-time: On site Experience: 10 plus years of experience in security operations Qualification: Bachelor’s/Master’s from a... ...protocol, stay, security, and coordinating with government and intelligence/security agencies for necessary permissions and a seamless experience...
- ...excellent problem-solving skills and thorough knowledge of network administration and architecture. If youre also passionate about security and data protection, wed like to talk with you. Job Responsibilities ~4+ years experience in Network engineering...
- ...buildout that will enhance analytics, reporting, and organizational intelligence across our teams. Working directly with Uzair and other... ...modern data architectures Understanding of data governance, security, and compliance best practices Experience in cross-...
- ...business processes, and enabling data-driven decision-making through intelligent assistants and copilots across productivity tools. Key... ...search, and grounding data with enterprise content. Ensure secure, ethical, and compliant use of generative AI across the...
- ...broad expertise in product management, user experience/design, cloud architecture, software development, data insights and intelligence, cyber security, emerging tech, and quality assurance ensures that we are delivering solutions that address business needs. 10Pearls is...
- ...implement corrective actions as needed. Negotiate pricing and secure cost reductions for Jazz’s international outgoing traffic with local and international LDI operators. Conduct market intelligence and develop business plans to achieve approved targets....
- ...broad expertise in product management, user experience/design, cloud architecture, software development, data insights and intelligence, cyber security, emerging tech, and quality assurance ensures that we are delivering solutions that address business needs. 10Pearls is...
- ..., cloud architecture, software development, data insights and intelligence, cybersecurity, emerging tech, and quality assurance ensures that... ...large-scale projects, ensuring that solutions are scalable, secure, and aligned with business goals. Lead technical reviews...
- ...Implement and maintainsecure coding standards to mitigate secure coding vulnerabilities. Analyze, detect and respond to cyber... ...Essential Technical Skills: Proficient in Cyber Threat Intelligence (CTI) Experience with penetration testing and ethical hacking...
- ...team, responsible for monitoring, analyzing, and responding to security threats and incidents. The successful candidate will have a... ...systems: Such as Splunk, ELK Stack, or IBM QRadar. # Threat intelligence platforms: Like ThreatQuotient, Anomali, or MISP. # Intrusion...
- ...reports and dashboards. Collaborate with data analysts, business intelligence teams, and stakeholders to understand data requirements and... ..., refresh failures, and performance bottlenecks. Implement security measures to ensure data privacy and compliance with industry...
- ...broad expertise in product management, user experience/design, cloud architecture, software development, data insights and intelligence, cyber security, emerging tech, and quality assurance ensures that we are delivering solutions that address business needs. 10Pearls...
- ..., and financial processes, offering 24/7 support and business intelligence through flexible subscription services. With a global presence... ...data governance principles, including quality, integrity, and security protocols. Monitor, troubleshoot, and improve data...
- ...broad expertise in product management, user experience/design, cloud architecture, software development, data insights and intelligence, cyber security, emerging tech, and quality assurance ensures that we are delivering solutions that address business needs. 10Pearls is...