Get new jobs by email
- ...Key Responsibilities: Develop and implement information security policies and procedures. Conduct regular risk assessments and vulnerability assessments. Monitor and respond to security incidents and breaches. Manage and maintain security tools and technologies...
34000 - 37000 PKR
...and perform basic maintenance checks Follow all traffic laws and company transport policies Keep accurate logs of travel routes, fuel... ...Assist with loading and unloading (if required) Ensure cargo is secured properly and handled with care Required Skills: Valid HTV...- ...maintain workstations, laptops, peripherals, and mobile devices. Follow IT security protocols (e.g., data backups, password policies, access controls). Ensure compliance with company IT policies and regulatory standards. Maintain logs of IT requests, resolutions...
- ...Ensure that automation solutions adhere to relevant compliance and security standards. Requirements Additional Responsibilities:... ...departments to understand how automation can improve a company's productivity. Qualification Bachelors degree in Computer...
- ...organized Receptionist to be the first point of contact for our company. In this role, you will be responsible for greeting visitors,... ...departments to ensure smooth office operations · Uphold security by following procedures and monitoring visitor access Requirements...
- ...About the job UK’s leading translation and interpretation company Translation Empire is looking for a Data Entry Officer. We are seeking... ...reports and summaries based on data entries. · Ensure data security and confidentiality in accordance with company policies. ·...
- ...technical roles. As a key player in our talent acquisition strategy, you will identify, engage, and secure top-tier technical talent, ensuring alignment with our company’s goals and culture. This role demands a proactive approach, excellent interpersonal skills, and a deep...
- ...##128313; What is Sigma? Sigma is a leading global technology company specializing in data collection and annotation for Artificial Intelligence... ...& Accessories: Stable internet connection Headphones Secure internet location, protected by a strong password For audio-...
- ...About Us ACE Money Transfer is a UK-based fintech company headquartered in Manchester. We provide secure and convenient online remittance services from the UK, Europe, Canada, Switzerland and Australia to over 100 countries. As part of the ACE Group, our portfolio...
- ...maintenance, updates, and patches to keep VOIP and dialer systems secure and up to date. · Track and document technical issues and... ...Willingness to learn and adapt to new systems and technologies as the company grow Basic experience with VOIP platforms such as...
- ...timely processing of employee payrolls, ensuring compliance with company policies and legal regulations. Responsibilities: #... ...Plan, organize, control payroll management system. # Ensure security of data, network access and backup systems. # Maintaining the...
- ...Technologies, established in 2006, is an ISO & OHSAS Certified company with a strong presence in the UAE, Saudi Arabia, Pakistan, and... ...Networks, Managed Services, Staff Outsourcing, Fleet Management, and Security areas. Our clientele includes major Telecom & IT clients such...
38000 PKR
...accurate digital records Troubleshoot and resolve hardware, software, and network issues Back up data regularly and ensure data security Prepare and print reports, documents, and correspondence as required Install and update software applications under...- ...Docker and Kubernetes. Monitor application and system performance using tools like Prometheus, Grafana, or Datadog. Ensure security, compliance, and availability across all systems and environments. Collaborate with development, security, and SRE teams to...
- ...scalable, maintainable architecture and clean coding practices. Translate client business requirements into robust, scalable, and secure web solutions. Full Stack Development Front-end : Develop responsive UIs using HTML5, CSS3, JavaScript, React, Vue.js...
- ...talent acquisition efforts within the United States telecommunications sector . This role is pivotal in identifying, attracting, and securing top-tier professionals across both technical and non-technical functions , including white- and blue-collar roles . The ideal...
- ...troubleshoot, and resolve system issues across development, staging, production, and DR environments. Support backup operations, security compliance, patch management, and access controls. Maintain system documentation (SOPs, configuration, incident reports)....
- ...: Install, update, and configure software applications and operating systems on employee devices. Work with the team to ensure security of all VOIP devices and servers, Provide support for VOIP telephone systems. Including softphones and PBX. Knowledge of Active...
- ...to join our team. The successful candidate will be responsible for crafting high-quality, compelling bid responses and proposals to secure new business opportunities. You will work closely with business development, sales, technical, and operations teams to produce...
- ...services. · Write clean, maintainable, and scalable code following best practices. · Optimize application performance and address security vulnerabilities. · Debug and troubleshoot issues across multiple browsers and platforms. · Stay updated with the latest...
- ..., MySQL, or MongoDB. Collaborate with front-end developers, DevOps, and other teams for seamless integration. Implement security and data protection best practices. Debug and resolve software defects and technical issues. Write clean, maintainable,...
- ...processes. Conduct complex data analysis to support business strategy and decision-making. Ensure data integrity, accuracy, and security in all processes. Mentor and guide junior analysts to build a high-performing data analytics team. Requirements...
- ...Responsibility as a database administrator (DBA) will be the performance, integrity and security of a database. You'll be involved in the planning and development of the database, as well as in troubleshooting any issues. Also transform the data for various reporting...
34000 - 37000 PKR
...looking for a responsible and organized Supplier to manage the procurement and timely delivery of goods and materials required by the company. The ideal candidate will ensure quality, cost-efficiency, and timely supply while maintaining strong relationships with vendors...- ...skills. · Good understanding of Agile methodologies and DevOps practices. Preferred Qualifications: · Experience with mobile application testing (iOS, Android). · Experience with security testing methodologies and tools. · ISTQB certification or equivalent....
- ...specialized repairs and services. · Maintain records of maintenance activities, supplies, and equipment inventory. · Ensuring proper security measures for the workplace, including collaborating with security system vendors or a team of security professionals. ·...
- ...marketing, support) to design and launch automation workflows, chatbot integrations, and notification services. · Ensure data privacy, security, and compliance with Meta’s and Twilio’s messaging policies. · Monitor system performance and troubleshoot issues related to...
45000 - 100000 PKR
We are seeking a detail-oriented and experienced Accountant to manage and oversee the day-to-day financial operations of the company. The ideal candidate will be responsible for maintaining accurate financial records, preparing reports, managing budgets, ensuring compliance...- ...maintainable, and well-documented code following industry best practices. · Optimize application performance, scalability, and security. · Implement database solutions using SQL Server, or other relational databases. · Conduct unit testing, debugging, and troubleshooting...
- ...PEN Tester – Crest Registered (CRT) to join our cybersecurity team. The ideal candidate will be responsible for conducting advanced security assessments and penetration testing activities across networks, applications, cloud infrastructure, and mobile platforms. This...