Get new jobs by email
- ...Electronic Money Institution (EMI), seeks to appoint an experienced professional for the following role: Job Role As Manager – Information Security, you will be responsible for establishing and enforcing security protocols that safeguard Company's information systems...
- ...Achievement of Order Intake Targets assigned by Market Segment/ Management. • Sales support for Market Segment, including requirements... ...including relevant correspondence with customers, assisting in • security clearance of the firm/ employees, interaction with military...
- ...Are you a seasoned IT Security Compliance professional looking for a challenging and rewarding opportunity? We are seeking a highly skilled and motivated Deputy Manager IT Security Compliance to join our team in Karachi, Pakistan. This is a Permanent position offering...
- ...Monitor and maintain quality assurance of KPIs related to change management Enforce rules, regulations, and compliance standards across... ...for all change activities Identify and document network security cases for awareness and improvement Perform root cause analysis...
- ...Mechatronix Solutions is Pakistan’s leading provider of integrated security and fire safety solutions, delivering reliable, innovative, and... ...Job Introduction: We are looking for a motivated Assistant Manager Marketing & Sales to join our Karachi team. This role focuses...
- ...A leading E&P Company invites applications for the position of Chief Officer (Security). QUALIFICATION & EXPERIENCE: Having served in Pakistan Army in the capacity of Col. / Lt. Col or equivalent rank in Pakistan Navy or Air force. Preference will be given...
- ...Grade Level: L1 Location: Islamabad Last date to apply: 22 April 2026 What is Specialist Cyber Security Operations? The role reports directly to the Manager Identity and Access Operations and will be part of 10 members team. The L1 IAM Operations Engineer is...
- ...apply: 26 April 2026 What is Expert Application & Product Security? Expert Application & Product Security is responsible to drive... ...coding guidelines 4. Align AppSec with enterprise risk management and business objectives 5. Conduct threat modelling (STRIDE,...
- ...to align on strategy and execution. The company is founder-led, profitable, and growing. Canonical is looking for exceptional security-focused software engineers to be integrated across product teams. While they also contribute to the product as engineers, their primary...
- ...Last date to apply: 30 April 2026 What is Telco Network Security Expert? Telco Network Security Expert is responsible to lead... ...-native network functions. The role reports directly to the Manager Architecture & Cloud Security with an extended team of 15 team...
- ...date to apply: 30 April 2026 What is Specialist Cloud & AI Security? Specialist Cloud & AI Security is responsible to secure... ...compliance and resilience. The role reports directly to the Manager Architecture & Cloud Security with an extended team of 15 team...
- ...Our client Spark AI is looking for Endpoint Security Engineer in Lahore. Job Description: We are seeking a skilled and proactive... ...evolving cyber threats. The role involves implementing, managing, and monitoring endpoint security solutions to protect against...
- ...seeking a Cybersecurity Analyst to monitor, analyze, and triage security alerts, ensuring a proactive defense against evolving threats... ...involves SIEM monitoring, incident handling, vulnerability management, and compliance enforcement to maintain the highest security standards...
- ...experienced cybersecurity professional eager to take on a key role in securing Digital Retail Banking (DRB) operations? We are looking for a... ...of SIEM/SOC solutions, conduct security testing, and manage security tools such as antivirus, endpoint protection, and data...
- ...date to apply: 30 April 2026 What is Specialist Application Security & Pen Tester? Specialist Application Security & Pen Tester... ...leakage of confidential/sensitive information. 9. Coordinate and manage internal stakeholder expectations with the right balance of...
- ...technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses... ...will have a strong foundation in information security, risk management, and security operations, along with a proactive approach to...
- ...technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses... ...lifecycle. Responsibilities: ~ Implement, manage ISO 27001, and update information security policies and procedures...
- ...client Bykea Technologies is looking for Senior Application Security Engineer in Karachi. What You Will Do Lead threat modeling... ..., JavaScript preferred) ~ Proven experience integrating and managing security tools (SAST, DAST) within CI/CD environments ~ Solid...
- ...Key Responsibilities: Develop and implement information security policies and procedures. Conduct regular risk assessments and vulnerability... ...Monitor and respond to security incidents and breaches. Manage and maintain security tools and technologies. Collaborate...
- ...world of digital banking? We’re seeking a dynamic Information Security Administrator to take charge of securing our cutting-edge Digital... ...who thrives on deploying state-of-the-art security solutions, managing SIEM integrations, and ensuring compliance with industry-leading...
- ...Description The assigned individual will be responsible for managing the 24-hour operational dark store and will be based on-site. A... ...stock takes are carried out and noted down accurately. Physical and system stock variation targets are kept within acceptable tolerance...
- ...Location: Islamabad Last date to apply: 23 April 2026 What is Specialist Cyber Security - IAM, PAM Planning and Delivery? The role reports directly to Head of Identity Access Management and will be part of 10 team members. What does Specialist Cyber...
- ...Information Systems, or a related field. ~2+ years of experience in Cyber Security, SOC, or IT Security roles. ~ Basic understanding of SOC operations, SIEM tools, and incident management. ~ Familiarity with security monitoring, alert analysis, and incident escalation...
- ...Company Overview: Mechatronix Solutions is Pakistan’s leading provider of integrated security and fire safety solutions, delivering reliable, innovative, and certified systems across industries. We are committed to quality, precision, and client satisfaction. Job...
- ...Responsibilities Serve as the primary point of contact and relationship manager for distribution center (DC) partners, focusing on outbound... ..., and fulfillment & transportation costs. Travel to attend physical inventory counts at DCs to ensure the count is executed...
- ...Who We Are: We are a privately owned leading Managed IT Services company (Managed Service Provider). Since 1997 we have specialized in providing managed IT services and managed security services for our clients. which are made up of small to medium-sized enterprises...
- ...commitment. "This role is responsible for customer management, CAM recoveries, and operational control of a... ...all customer data, agreements, and documentation (physical and digital). Coordinate with Admin and Security teams to ensure smooth execution of operations and...
- ...actual and standard cost of the product to be shared with the line manager. • Check and analyze product-related costing and reporting.... ...structures is accurately. • Check and perform monthly physical stock count for raw material and work in progress, review and verify...
- ...of software that enables our customers to develop, deploy and manage responsible, AI-powered applications and experiences with agility... ...connecting OpenEdge systems with modern cloud services, APIs, Security, and microservices ~Implement DevOps practices for OpenEdge development...
- ...designed in 2009. The Role We're hiring an Engineering Manager who owns all of Etera's engineering, across all four verticals... ...engineering teams from scratch in new geographies. Background in security auditing, compliance, or data residency requirements (UAE PDPL...