Get new jobs by email
- ...Our client Spark AI is looking for Endpoint Security Engineer in Lahore. Job Description: We are seeking a skilled and proactive Endpoint Security Engineer to safeguard the organization's endpoint devices, including desktops, laptops, servers, and mobile devices...
- ...Overview:**We are seeking a passionate and motivated Application Security Intern to join our team. This role offers a unique opportunity... ...A culture built on innovation, collaboration, and inclusivity Clear career growth and leadership development opportunities Continuous...
- ...transform, scale, and accelerate by adopting digital and exponential technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses modernize through cloud adoption and development and the...
- Senior Information Security Analyst page is loaded## Senior Information Security Analystlocations: Lahoretime type: Full timeposted on:... ...continuous learning opportunities, leadership training, and a clear path to career advancement. Our people-first approach, coupled...
- A software company seeks a UX/UI Designer to transform complex workflows into intuitive product experiences. The role involves creating wireframes, prototypes, and polished interfaces while ensuring usability and consistency across workflows. Candidates should have 2-3 ...
- ...We are seeking a highly skilled and motivated Mid-Tier Cyber Security Consultant with 4–5 years of proven experience in Vulnerability... ...activities, including attack scenarios, methodologies, and outcomes, in clear and concise reports. Client Handling: Act as the...
- **About the Role** We are looking for a skilled and motivated Security Engineer to join our team. In this role, you will be a key point... ...Responsibilities** Contribute to reporting requirements, producing clear and accurate data on IT and security activities, incidents, and...
- ...Job Details Job Title: Security Engineer Experience: 4–6 Years Location: Pakistan (Hybrid) Employment Type: Full-Time Job Summary We are seeking an experienced Security Engineer to design, implement, and maintain security controls across cloud and...
- ...Managed IT Services company (Managed Service Provider). Since 1997 we have specialized in providing managed IT services and managed security services for our clients. which are made up of small to medium-sized enterprises. We are looking for highly passionate individuals...
- ...architecture, software development, data insights and intelligence, cyber security, emerging tech, and quality assurance ensures that we are... ...to translate cybersecurity and threat intelligence needs into clear, prioritized backlogs. You will drive discovery, define product...
- ..., authentication, and authorization mechanisms. Application Security : Apply best practices for data protection, encryption, and secure... ...to ensure system reliability. Documentation : Maintain clear documentation for APIs, system architecture, and deployment processes...
- ...company headquartered in Manchester, United Kingdom. We provide secure online remittance services to customers in 29 countries across the... .... Prepare comprehensive investigative reports with clear conclusions and escalation recommendations. Liaise with regulators...
- ...architectural decisions, and agent configurations. If you can't write clearly, you can't lead clearly. Arabic or German is a genuine plus.... ...teams from scratch in new geographies. Background in security auditing, compliance, or data residency requirements (UAE PDPL...
- ...ideal candidate possesses a hybrid skill set: the ability to write clear, concise English and a working understanding of financial... ...financial operations, ensuring users strictly follow compliance and security protocols in Remittance and Treasury. Accounting Workflows:...
- ...patterns Implement production-ready SQL and Airflow DAGs with clear operational behavior, logging, alerting, and restartability... ...Redshift Define and enforce best practices for data governance, security, and data quality Collaborate with cross-functional...
- ...United States, especially those who may find it challenging to secure traditional financing. Typically, the work schedule is from 9:00am... ...funding packages for review; Grant final authorization for clear to fund, ensuring all criteria are met. Requirements Required...
- ...Jazz Business revenue and market share in Cloud, ICT, and Cyber Security solutions within the assigned region. This role leads regional... ...coaching and enablement. · Drive a high-performance culture with clear KPIs, accountability, and alignment to Jazz Business objectives...
- ...United States, especially those who may find it challenging to secure traditional financing. Typically, the work schedule is from 9:00am... ...-level or internal data science projects Key Soft Skills: Clear communication: can explain data issues, tradeoffs, and results...
- ...United States, especially those who may find it challenging to secure traditional financing. Typically, the work schedule is from 9:00am... ...ratios; ~ Ability to simplify complex financial products into clear, visually engaging messaging; ~ Experience collaborating with...
- ...database systems to ensure optimal performance, reliability, and security. The successful candidate will lead a team of three... ...database configurations, procedures, and policies to maintain a clear reference for team members. Analyze system requirements and...
- ...spec validation. Valuable — these set you apart: OWASP ZAP (security scanning), BrowserStack or AWS Device Farm (real device testing... ...modes naturally. You don't just test the happy path. ~ Clear written communication. Test cases, bug reports, and quality documentation...
- ...streamline operations through features such as custom rental websites, secure driver verification, automated rental agreements, and powerful... ...manner. Troubleshoot platform-related issues and provide clear, step-by-step solutions. Assist clients with day-to-day...
- ...Ensure client requirements, priorities, risks, and expectations are clearly understood, documented, and delivered by the operations teams.... ...operational costs. - Ensure strict adherence to data security, compliance standards, client requirements, and organizational...
- ...value propositions that eliminate technical jargon in favor of clear business growth. Core Responsibilities Executive Outreach... ...with company data, product catalogs, and 5-star reputations to secure top-tier AI recommendations. Tiered Solution Selling: Consult...
- ...organization. Foster a robust compliance culture grounded in clear accountability and strong ethical values. Develop a dynamic compliance... ..., that’s a big plus! Familiarity with U.S. real estate law, secured transactions, and issues related to collateral compliance would...
- ...stakeholders across the organization including Data governance, Security, and country business teams.document the engineering best... ...Manage the expectations of AI delivery with stakeholders by clearly defining experiments, rollouts, and iterations of AI solutions....
- ...penetration testing . The ideal candidate should be able to identify security vulnerabilities, misconfigurations, and weaknesses across... ...findings, misconfigurations, and vulnerabilities with clear risk ratings and remediation guidance. Participate in purple...
- ...needs and offering tailored solutions. Deliver persuasive and clear sales presentations and product demonstrations to communicate... ...efficiently. Employ effective negotiation skills to close deals and secure new business opportunities. Practice cold calling techniques...
- ...all endpoint devices across the organization. This role bridges security, operations, and automation — ensuring that every managed... ...tickets within ConnectWise Manage Document resolution steps clearly for knowledge base contribution Escalate complex issues appropriately...
- ...responsive and mobile-optimised styling SQL / PostgreSQL Security — OpenID Connect, OAuth2, SAML, OIDC; strong understanding of auth... ..., architectural decisions, and day-to-day development — with a clear progression path towards the Pakistan Tech Lead role, enabling...
