Get new jobs by email
- ...The hiring Company is seeking a highly skilled and experienced Senior Manager Risk Assessment and Governance to join our Information Security Division within the Risk Management Group. This role is designed for a dedicated professional eager to contribute significantly...
- ...Haves Experience with machine learning, artificial intelligence, or data analytics Knowledge of cybersecurity principles and secure coding practices Certification in software engineering or related fields Open-source project contributions or personal projects...
- ...the following role: Job Role As Manager – Information Security, you will be responsible for establishing and enforcing... ...regulatory obligations. Cybersecurity Risk Management – Identify, assess, and mitigate cybersecurity risks across infrastructure, applications...
- ~ Job Title: Assessment & Evaluation Officer The Assessment & Evaluation Officer will be responsible for planning, implementing, monitoring, and analyzing assessment and evaluation activities to measure programme effectiveness, improve student learning outcomes,...
- ...We are looking for a skilled and proactive Security Administrator to join our Information Security team. The ideal candidate will be responsible for managing and maintaining enterprise security solutions with a focus on Privileged Access Management (PAM)and Data Loss...
- ...The Assessment & Evaluation Officer will be responsible for planning, implementing, monitoring, and analyzing assessment and evaluation activities to measure programme effectiveness, improve student learning outcomes, and support evidence-based decision-making across...
- ...The Pakistan Centre for Philanthropy is seeking an Assessment & Evaluation Officer to plan and analyze assessment activities aimed at improving student learning outcomes across READ Foundation schools. Responsibilities include designing frameworks, executing data collection...
- ...profitable, and growing. Canonical is looking for exceptional security-focused software engineers to be integrated across product... ...Common Criteria (CC) Experience with OVAL (Open Vulnerability Assessment Language) Knowledge of cryptographic modules such as...
- ...date to apply: 30 April 2026 What is Specialist Cloud & AI Security? Specialist Cloud & AI Security is responsible to secure... ...security tools (CSPM, CWPP, CIEM) 4. Conduct cloud security posture assessments and hardening 5. Secure AI/ML pipelines (data ingestion →...
- ...compliance standards across operations Monitor, verify, and generate reports for all change activities Identify and document network security cases for awareness and improvement Perform root cause analysis (RCA) for non-compliance cases Track and follow up on...
- ...Our client Spark AI is looking for Endpoint Security Engineer in Lahore. Job Description: We are seeking a skilled and proactive... ...teams to enforce security policies, conduct vulnerability assessments, and ensure a strong overall security posture. Key...
- ...Key Responsibilities: Develop and implement information security policies and procedures. Conduct regular risk assessments and vulnerability assessments. Monitor and respond to security incidents and breaches. Manage and maintain security tools and technologies...
- ...surveillance equipment and access points. Ensure all hospital security policies are enforced. Ensure implementation of... ...hospital. Respond to alarms, emergencies, and security breaches, assessing situations, and taking appropriate action, which may include contacting...
- ...We are looking for a skilled and proactive Security Administrator (Email & End Point Security) to join our Information Security team. The ideal candidate will be responsible for managing and maintaining enterprise security solutions, ensuring the protection of organizational...
- ...technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping... ...issues, and respond to breaches ~ Perform vulnerability assessments, identify security gaps in networks and websites, and conduct...
- ...interpretation company seeks an experienced Call Quality Agent based in Rawalpindi. The ideal candidate will conduct English language assessments, monitor call quality, and provide coaching to staff. Required qualifications include a graduate degree, 4-5 years of teaching...
- ...client Bykea Technologies is looking for Senior Application Security Engineer in Karachi. What You Will Do Lead threat modeling... ...security across the software development lifecycle (SDLC) Assess and mitigate risks from third-party libraries and dependencies...
39500 - 45000 PKR per year
...and nurture young learners. The role includes developing engaging lesson plans, maintaining a positive learning environment, and assessing student progress. Candidates must have strong communication and classroom management skills. This position offers a competitive salary...- ...We are looking for a skilled Security Architect to design, implement, and maintain secure enterprise infrastructure solutions. The ideal... ...in network security, infrastructure protection, risk assessment, and security architecture within enterprise environments....
- ...technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping... ...issues, and respond to breaches ~ Perform vulnerability assessments, identify security gaps in networks and websites, and conduct...
- ...have specialized in providing managed IT services and managed security services for our clients. which are made up of small to medium... ...well for clients and/or candidates who have strong experience in assessing and implementing SIEM and other operational tools and...
- ...Systems, or a related field. ~2+ years of experience in Cyber Security, SOC, or IT Security roles. ~ Basic understanding of SOC... ...of security breaches, including root cause analysis and impact assessment. Document security incidents, findings, and resolution actions...
- ...Segment opportunities in C4C • Handling Corporate Affairs Matters including relevant correspondence with customers, assisting in • security clearance of the firm/ employees, interaction with military personnel etc. • Managing and controlling the internal process of...
- ...Company Overview: Mechatronix Solutions is Pakistan’s leading provider of integrated security and fire safety solutions, delivering reliable, innovative, and certified systems across industries. We are committed to quality, precision, and client satisfaction. Job...
- ...architecture, software development, data insights and intelligence, cyber security, emerging tech, and quality assurance ensures that we are... ...operational metrics, partnering with security stakeholders to assess detection effectiveness, workflow efficiency, and areas for...
- ...technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses... ...during design discussions and governance reviews. Assess the impact of proposed changes on existing systems, infrastructure...
- ...negotiations Conduct site visits and measurements for project assessment and quantity verification Maintain records of project... ...projects simultaneously Experience in telecom, IT infrastructure, or security system projects will be an added advantage....
- ...Procedures, Local Regulatory, cGMP requirements, EHS policies and security standing orders / code of business conduct. Also support in QMS... ...timely. To comply with CAPA task implementation. To assess the risk of areas & processes. To be a part of change management...
- ...framework, and IT operations. The role is responsible for ensuring secure, scalable, and efficient technology systems that support... ...legal, and information security standards. * Conduct risk assessments, vulnerability management, and disaster recovery planning....
- ...design and configure Linux systems, and handle all upgrades and security patches within agreed maintenance windows. They will implement... ...judgment in reviewing AI-generated scripts and configs — assessing correctness, idempotency, security exposure, and production-readiness...
