...across all sectors and activities such as health, safety and security, psychosocial and legal shelter, WASH, and Energy and coordinate... ...Calculator
Compendium
Additional Information
Functional clearanceThis position doesn't require a functional clearance...
...(or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity...
...Experience on the grant procedures for enterprise development within USAID implemented project.
Familiarity with the operational and security context of KP and its NMDs.
Strong coordination skills with procurement and finance teams.
Ability to establish effective...
...Assist the regional manager in acceptance testing and handover/takeover activity. Liaise with internal stakeholders for legal and security issues and escalating to the head office if issues are not resolved in the agreed time frames Assist in the installation, commissioning...
...Languages
,
,
Desired Languages English
,
,
Additional Qualifications
SkillsIT-Computer Literacy
EducationHigh School
Certifications
Work Experience
Other informationThis position doesn't require a functional clearance
Home-BasedNo...
...CertificationsHCR Protection Learning Program - UNHCR, Information Technology - Other, Mathematics - Other, Social Sciences - Other, Statistics - Other
Work ExperienceRegistration
Other informationThis position doesn't require a functional clearance
Home-BasedNo...
...-Computer Literacy
EducationBachelor of Arts (BA): Social Science (Required), High School: Fine arts (Required)
Certifications
Work ExperienceCase Management: Returnees
Other informationThis position doesn't require a functional clearance
Home-BasedNo...
...Prog - UNHCR, HCR Protection Learning Program Statelessness - UNHCR, HCR Protection Learning Program - UNHCR, HCR Thematic Protection Learning Program - UNHCR
Work Experience
Other informationThis position doesn't require a functional clearance
Home-BasedNo...
...Literacy EducationHigh School: Fine arts (Required) CertificationsInternational Protection - Other Work ExperienceCommunications, Data Management, Registration, Work Context: Protection Other informationThis position doesn't require a functional clearance Home-BasedNo...
...Define the technical requirements of the app, such as the programming languages, the frameworks, the APIs, the databases, the security protocols, etc
Prepare a non-functional prototype that is in line with the following requirements; so that the client gets the...
...making, Managing resource, Organizational awareness, Planning & organizing, Stakeholder management, Teamwork & collaboration
UNHCR Salary Calculator
Compendium
Additional Information
Functional clearanceThis position doesn't require a functional clearance...
...to all activities pertaining to the supply chain function including planning, sourcing & procurement, transport, shipping, customs clearance, warehousing, assets & fleet management and monitoring within the area of responsibility (AoR).
The incumbent is supervised by...
...developing front-end web client applications for various software platforms. A software engineer makes sure that the functionality, security and performance of the client application is as per the design and is completely bug free.
Duties & Responsibilities...
...of Companies, Pakistan
Assist Head Administration in managing administrative team incl. Operational/ Maintenance personnels & Security staff.
Providing assistance to the Head for smooth operations.
Knowledge of dealing with Office Administrative matter i.e. general...
...therefore, undergo rigorous reference and background checks.
UNDP has a global mandate to support governments in strengthening security and justice sector governance) and has extensive experience in proving strategic advice and assistance in this regard in a range of...
...Manager Operations
Monarch Security Company, Pakistan
To manage security operations in Peshawar and NWFP and head the branch of Peshawar.
Job Specification
Must be an Ex Army Officer of the rank of Capt or Major with sound proficiency in Computer, MS Office...
...scheduling, and participant communications.
Ensure all necessary resources (e.g., training materials, equipment, refreshments) are secured and available for training sessions.
Maintain accurate records of project-related training activities, attendance, and...
...Leaves unbounded and unlimited
Achieve monthly target and proceed on leave
Accommodation messing electricity all inclusive
Lab secured and protected by state police
Synthesis of salts involve complex procedures in complex lab equipments as per lab manual
Bonus...
...Medical Services on any emergent medical care matters at RMI
14.Shall coordinate with Administration Department i.e. Engineering, Security, and Support Services etc. with regards to patient care and running of all Medical Units
15.Shall ensure implementation of RMI...
...more than 10,000 passive nodes.Suitable candidate should have following
1- Understanding of ICT Infrastructure (Servers, Networks, Security etc)
2- Good understanding of enterprise IT architecture
3- Good Knowledge of Databases
4- Ability to manage ICT department...
...viewings, and offer insights on the neighborhood, amenities, and market trends. They also assist in negotiations, helping clients secure the best possible deal and navigate through the complex paperwork involved in real estate transactions.
Real estate agents often...
...framework.
Collaborate closely with front-end developers to integrate user-facing elements with server-side logic.
Implement security measures and data protection protocols in applications.
Leverage ML/AI expertise to develop solutions based on data-driven...
...understand project requirements and translate them into high-quality, scalable PERN Stack solutions.
- Design and develop efficient, secure, and maintainable backend APIs using Node.js and Express.js.
- Create and maintain a robust database structure using PostgreSQL,...
...Configures the CMC and uses this to access content.
Adds to and changes objects in the repository.
Analyses BO Enterprise security model and creates security content such as users, groups and categories.
Maintenance of error logs and Knowledge Base.
To be...
...processes and also minimize any waste
Promoting and building automated processes wherever feasible
Enhance the IT infrastructure's security protocols by identifying and deploying needed cybersecurity measures by continuously conducting vulnerability assessment and risk...