Search Results: 19 vacancies
...programming language (PHP)
~ Solid knowledge of HTML/CSS
~ Experience with mockup and UI prototyping tools
~ Understanding of security practices
~ Familiarity with network diagnostics tools
~ Team management skills
~ BSc/MSc in Computer Science or...
...devices.
Conduct comprehensive code reviews to maintain code quality, adherence to coding standards, and ensure scalability and security.
Stay up to date with the latest trends, tools, and technologies in WordPress development and share knowledge with the team....
...effective selling techniques and educate them about product qualities & distinctions
Penetrate in markets of designated regions to secure additional sales while improving overall effectiveness
Ensure Franchisee does not violate company policy otherwise inform...
...(or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity...
...and investigate the incidents of hospital infections and teach precaution measurements to the staff accordingly.
Coordinate with school of nursing in arranging teaching and training sessions for nursing students.
Initiate emergency safety practices as needed.
#J...
...within the existing PMIS.
c) Utilize the existing project management database as a foundation for the new system.
Ensure data security, integrity, and accessibility of the system.
For more details see the attached ToRs....
Apply By:
Interested candidates...
...within group to automate information
delivery, minimize paperwork, accessibility of data with reliability confidentiality, and securely for
enhancement of time and cost efficiencies within the companies and at group level.
Atlas IT Resource Center is constantly...
...potential customers for sale of ICT products, solutions, and services. e.g. Managed WiFi, Managed SDWAN, Managed Surveillance, Cyber Security, Cloud, SaaS/PaaS and MS Licensees
Understand and analyze client’s business processes to advise on how they can improve...
...and safeguard organizational reputation.
Implement robust measures for fraud prevention, inventory management, and operational security within the region.
Qualifications and Skills:
Bachelor’s degree in business administration, Marketing, or a related field....
...logic; ensuring high performance, testability, and responsiveness to requests from the front-end, and implement software development security best practices, working under minimal direction.
Requirements:
~2-3 years or above years of web development experience
~...
...and maintaining data storage and processing systems, such as databases, data warehouses, and data lakes
Ensuring data is properly secured and protected
Developing and implementing data governance policies and procedures
Collaborating with business analysts, data...
...outgoing mails in a timely manner in JBL/JBS/MBL
Maintaining updated information of branch asset management ( fixed Assets)
Security and Safety.
Access door/HVAC/Plumbing/Electric/carpentering issues
Maintain/ensure to arrange Nestle water.
Ensure safe and...
...Solid knowledge of SQL and scripting.
Experience working in an Agile/Scrum development process.
Experience with performance and security testing is a plus.
BS/MS degree in Computer Science, Engineering, or a related subject.
At Least 2 years of experience in...
...staff wellbeing programme, breastfeeding policy, flexible work arrangements, childcare room, family support, policies & initiatives, security etc.
~UNICEF strongly encourages the use of flexible working arrangements.
UNICEF is here to serve the world’s most...
...engage their audiences and achieve their goals.
Job Description:
Develop and implement sales strategies to generate leads and secure new clients for our media production and advertising services.
Conduct in-depth client consultations to understand their needs...
...framework.
Collaborate closely with front-end developers to integrate user-facing elements with server-side logic.
Implement security measures and data protection protocols in applications.
Leverage ML/AI expertise to develop solutions based on data-driven...
...Configures the CMC and uses this to access content.
Adds to and changes objects in the repository.
Analyses BO Enterprise security model and creates security content such as users, groups and categories.
Maintenance of error logs and Knowledge Base.
To be...
...processes and also minimize any waste
Promoting and building automated processes wherever feasible
Enhance the IT infrastructure's security protocols by identifying and deploying needed cybersecurity measures by continuously conducting vulnerability assessment and risk...
...understand project requirements and translate them into high-quality, scalable PERN Stack solutions.
- Design and develop efficient, secure, and maintainable backend APIs using Node.js and Express.js.
- Create and maintain a robust database structure using PostgreSQL,...