Get new jobs by email
- ...Job Purpose The Credit Controller is responsible for managing the company’s credit risk by ensuring timely collection of outstanding receivables, assessing customer creditworthiness, and maintaining healthy cash flow while supporting strong customer relationships....
- ...We are a company based in Sweden with employees in all parts of the planet! We are looking for a Finance & Business Analyst – Controller Track (Remote) to join our team and support financial reporting, budgeting, forecasting, and performance analysis. This is an excellent...
- ...Job Title: Security Engineer Experience: 4–6 Years Location: Pakistan (Hybrid) Employment Type: Full-Time Job Summary... ...Security Engineer to design, implement, and maintain security controls across cloud and on-premises environments. You will work closely...
- ...Job Title: SDLC Security Operations Engineer (DevSecOps) Experience: 7–9 Years Location: Pakistan - Remote (UAE Business Hours)... ...a hands-on SDLC Security Operations Engineer to embed security controls into CI/CD pipelines and engineering workflows for a larger enterprise...
- ...Grade Level: L2/L3 Location: Islamabad Last date to apply: October 31st 2025 What is Expert Business Control (HQ)? Expert Business Control (HQ) is responsible for activities include support in (and at time, independently managing) the budgeting, forecasting,...
- ...are seeking a highly experienced Principal Consultant – Cyber Security to provide strategic direction and delivery leadership across cybersecurity... ..., resilience mechanisms, and integrated enterprise security controls. Drive the evaluation and maturity assessment of client...
- ...Job Title: Cyber Security Specialist (SOC / Incident Response) Experience: 7–9 Years Location: Pakistan (Hybrid) (UAE Business Hours... ...compliance through evidence collection, reporting, and control execution Coordinate with platform, network, and application...
- ...Engineer to strengthen Paymentology’s cloud infrastructure foundations, with a strong focus on AWS multi-account governance, IAM security controls, and Infrastructure as Code automation. This role plays a critical part in building secure, scalable cloud platforms that...
- ...backend, frontend, and AI engineering teams to build reliable, secure, and scalable systems. This is a hands-on role where you'll set... ...Terraform, CloudFormation, or AWS CDK for repeatable, version-controlled provisioning. Architect auto-scaling strategies to handle variable...
- ...Every minute of every day, Smiths Detection’s threat detection and security screening technology helps to protect people and infrastructure... ...technical trends. •Exercises every available measure to control and minimize costs. •Travel, overtime and work hours other than...
- ...technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses... ...using Salesforce DX, Change Sets, or Git-based version control. ~ Take full ownership of assigned work, from understanding...
- ...and other Development test objects Participate in the Change Control Board to identify the quality implications of known bugs and... ...to Have: ~ Performance testing using JMeter ~ Knowledge of security testing ~ Familiarity with Katalon Studio is a plus ~ Familiarity...
- ...competent institution underpinning Pakistan's national energy security and energy transition. The CEO will guide the organization's regulatory... ...culture. Operational Oversight Establish systems and controls to effectively manage real-time system operations, scheduling,...
- ...test driven development Work with defect tracking, source code control and software release systems to ensure high-quality software... ...support developed products Work with business, infrastructure and security teams on delivering any enhancements and bug fixes for...
- ...business objectives, and maintaining high standards of scalability, security, and reliability. The ideal candidate should have strong... ...through platforms such as Prometheus, Grafana, ELK, and Confluent Control Center. · Lead capacity planning, scalability strategies, and...
- ...volumes of data from the QuickBooks system ~ Reconciliation of control accounts To Qualify You Will Need: ~ ACCA or B.Com or... ...cricket tournament and a fun, inclusive culture. Financial Security : Contributory Provident Fund (PF) and punctuality bonuses....
- ...architecture, software development, data insights and intelligence, cyber security, emerging tech, and quality assurance ensures that we are... ..., JavaScript, Go, or Python. ~ Experience using version control systems such as Git. ~ Strong preference for working in...
- ...relevant. Responsibilities Places Quality, Health & Safety, Security and protection of the Environment as core values while never... ...line with policies & procedures Time management Quality Control Analysis to ensure product meets required standards Capable...
- ...technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses... ...adherence to standards and best practices (e.g. source code control, code reviews etc.) Guide and participate in recruiting...
- ...candidate will be responsible for maintaining, optimizing, and securing our enterprise systems and ensuring high availability across... ...and support Active Directory , GPOs, DNS, DHCP, and domain controllers. Manage and troubleshoot virtualized environments (Hyper-...
- ...enhancing solutions, ensuring adherence to internal procurement and security processes. Manage vendor engagement throughout the... ..., particularly impacting vendor onboarding and contractual controls. Potentially support DPO responsibilities for specific...
- ...~3-5 experience in collections, accounts receivable, credit control, or customer account management preferred. ~ Familiarity with... ...communication skills. ~ Ability to negotiate payment plans and secure commitments effectively. ~ Strong active listening and conflict...
- ...technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses... ...-tenant architectures with strict data isolation and access controls. • Optimize PostgreSQL queries, indexing strategies, and...
- ...play a foundational role in shaping system architecture, ensuring security and compliance, and delivering production-grade applications.... ...of authentication, authorization, and role-based access control Experience with API design and integration Familiarity...
- ...Environment of Care (EOC) and safety programs. Maintain infection control standards in critical areas. Manage audits and ensure... ...Vendor & Contract Management Manage services (housekeeping, security, waste, etc.). Develop SLAs and monitor vendor performance....
- ...definition through solution delivery—while ensuring the reliability, security, and long-term health of the data ecosystem.... ...integration, and warehousing o Data governance, quality, and access controls o Consulting or solution-architecture–style stakeholder engagement...
- ...Description The IT Manager is responsible for ensuring the smooth, secure, and efficient operation of all information systems, technology... ...data protection regulations and Accor security audits. ~ Control IT budgets, licenses, and asset inventory. User Support &...
- ...ShipHero APIs, Shopify, and internal systems for seamless data flow and real-time updates. Implement secure authentication, session management, and role-based access control (RBAC) for operational users. Write clean, modular code with unit and integration tests;...
- ...strategy, improving performance, procuring material and resources and securing compliance. He/she should be ready to mentor team members, find... ...Manage budgets and forecasts Perform quality controls and monitor production KPIs Ensure that all policies are implemented...
- ...focuses on ensuring reliable day-to-day operations, compliance with security and regulatory requirements, and supporting phased expansion of... ...protocols. Ensure adherence to data security, access controls, and institutional compliance requirements. 3. Use-Case Support...
