...programming approaches and gaps.
- Support the planning process in compliance with planning parameters outlined in the Programme Manual and... ...exposed to risks of complex emergencies due to the volatile security situation, the protracted refugee situation, weather and the...
...activity so that they have better chances to earn higher incomes, have increased access and control over resources and have greater security and protection from violence.
Duties and Responsibilities
Immediate Objective
Under the guidance and direct supervision...
...prioritized as per the survivor-centred approach.
- Enforce compliance with, and integrity of, all protection standard operating procedures... ...The Senior GBV Associate will also support the operation in securing solutions for GBV survivors through comprehensive case...
...management.6. Ensure timely and smooth supply of iron Spot test kits to Chakki Mills and food inspectors for monitoring of fortification compliance at production, market and household level.7. Collect samples of fortified Chakki flour from the assigned Chakki mills regularly...
...threaded joint connections
~ Knowledge of scoping and pricing field service work
~ Knowledge of various types of equipment
~ Ability to understand issues and resolve/address strategically
~ Understanding of Corporate Safety & Compliance Policies
#J-18808-Ljbffr
...policies and procedures at branch level.
Responsible monthly reconcile financial reports (bank and branch), and other MIS.
Compliance all complains at branch level.
Responsible to implement any new instruction/policy/procedure at branch level.
Responsible to...
...Impact:
Monitor community population influx and implement management programs.
Support local business opportunities and ensure compliance with social targets.
Coordinate training for local suppliers and identify technical training needs.
Assist Community...
...(or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity...
...registration, refugee status determination and resettlement; to ensure the implementation of the operational policies efficiently, and compliance to the comprehensive protection and solutions strategy applied. The incumbent may provide day-to-day supervision to the UNHCR...
...maintaining and running its own accommodation unit for the past decades. The need for such an arrangement is continuous given the security restrictions, as well as staff welfare. The International Staff Accommodation is managed in accordance with UNHCR Guidelines for accommodation...
...and reflects the UNHCR's policies, standards and priorities, including the Framework for the Protection of Children.
- Ensure compliance with UNHCR's child protection policy, priorities and commitments, as well as other aligned policies on age, gender, diversity (AGD...
...registration, resettlement, and refugee status determination; to ensure the implementation of the operational policies efficiently, and compliance to the comprehensive protection and solutions strategy applied.
The incumbent may provide day-to-day supervision to the UNHCR...
...being implemented by the EVAW Unit in BalochistanSupport the strategy development for strengthening RoL institutions and justice/ security sector stakeholders in Balochistan.Support the Head of the Sub-office in implementing the ROL work Plan within given timelines and...
...statements
2. Analyze financial data and provide management with accurate and timely reports for decision-making purposes
3. Ensure compliance with accounting principles, policies, and regulations
4. Perform month-end and year-end closing activities, including...
...transactions and records
2. Prepare financial reports and statements
3. Monitor budget and financial performance
4. Ensure compliance with accounting standards and regulations
5. Assist in audits and tax filings
Apply Now at Mustakbil.com
This job was originally...
...processes and also minimize any waste
Promoting and building automated processes wherever feasible
Enhance the IT infrastructure's security protocols by identifying and deploying needed cybersecurity measures by continuously conducting vulnerability assessment and risk...
...understand project requirements and translate them into high-quality, scalable PERN Stack solutions.
- Design and develop efficient, secure, and maintainable backend APIs using Node.js and Express.js.
- Create and maintain a robust database structure using PostgreSQL,...
...framework.
Collaborate closely with front-end developers to integrate user-facing elements with server-side logic.
Implement security measures and data protection protocols in applications.
Leverage ML/AI expertise to develop solutions based on data-driven...
...Configures the CMC and uses this to access content.
Adds to and changes objects in the repository.
Analyses BO Enterprise security model and creates security content such as users, groups and categories.
Maintenance of error logs and Knowledge Base.
To be...