Get new jobs by email
- ...succeed based on their job-relevant merits and abilities. Please note that according to Wärtsilä policy, voluntary consent for a security check may be required from candidates being considered for this position, depending on the applicable country. This is Wärtsilä...
- ...Computer Science Graduate to join our technical team as a Network & Security Engineer . This role is a unique hybrid position designed for... .... Manage User Access Identity (IAM) and Firewall Access Control Lists (ACLs). Should be familiar with the principles of IP...
- ...Control-M & Grafana Administrator/Developer Job Title: Control-M & Grafana Administrator/Developer Experience: 7–8 Years Location... ...Grafana (Prometheus, Elastic, SQL, etc.). Ensure platform security, access control, and audit compliance. Automate repetitive...
- ...We’re looking for a Senior Engineer with strong security experience (Data Privacy & Compliance) with strong experience in Python, Terraform... ...secure and compliant infrastructure, automating compliance controls, and ensuring our systems meet global data privacy and security...
- ...About the Job: Need to manage, tracking, and secure storage of project documents to ensure accuracy, compliance, and accessibility... ...organizing both digital and physical records, ensuring version control and compliance. Key Responsibilities: Develop, implement,...
- ...Zameen.com is looking to hire a ‘Quality & Data Control Officer' for its Bayut and Dubizlee Operations. Job Responsibilities: To ensure products meet quality and efficiency standards set by the company. Manage the spam and competitor section. Responsible for...
- ...Job Title: Financial Controller Organization: Leading Coffee Chain in UK Department: Finance Division: Leadership Location: Gulberg, Lahore Pakistan Direct Supervisor: Finance Director / CFO About the Client The client...
- ...Job Overview: As a Senior Information Security Analyst you will play a critical role in safeguarding CureMDs information systems... ...assessments and work with teams to implement appropriate security controls and mitigation strategies. Monitor and analyze security...
- ...transformative solutions and creating significant impact. For our clients and strategic partners. Job Description: Aqovia is seeking a Security Officer to lead and enhance our Information Security Management System (ISMS) and strengthen our global security posture. This...
- ...points and verify IDs. Patrol areas to prevent theft or damage. Respond to emergencies and report incidents. Monitor CCTV and security equipment. Support junior security staff when needed. Follow all security rules and discipline. Prepare daily security...
- ...#119852;: Monitor credit policies & customer creditworthiness Manage accounts receivable & collections Prepare credit control reports Coordinate with Finance Sales & Legal teams #119825;#119838;#119850;#119854;#119842;#119851;#119838;#119846...
- ...visitor logs. Patrol the area regularly to prevent theft damage or any suspicious activity. Respond quickly to emergencies or security incidents and report them to supervisors. Ensure CCTV cameras and security equipment are working properly. Follow company...
- ...ensure the quality, relevance, and fairness of examination questions. # Supervise exam invigilation, seating arrangements, and security protocols to prevent cheating and maintain the integrity of the examination process. # Oversee the timely and accurate processing...
- ...Computer Science Cybersecurity or a related field. ~4 years of hands-on experience in ICS/OT networks industrial automation or control systems security. ~ Experience working with major PLC vendors such as Siemens Allen-Bradley Schneider and ABB. ~ Strong understanding...
- ...lose sight of the aspects of ecology and sustainability when manufacturing our products. Position: Manager Production Planning Control & Stores Department: Planning Location: Hassanabdal-KSB Pakistan Shift: Day Purpose of the Position: We are...
- ...We are seeking a highly skilled and motivated Mid-Tier Cyber Security Consultant with 4–5 years of proven experience in Vulnerability... ...escalation, and lateral movement to identify weaknesses in security controls. Collaborate with blue teams to validate detection and...
- ...maintaining CIS CAT servers. Perform hardening activities to mitigate security gaps identified during different security activities.... ...hardening and vulnerability remediation. Implementing security controls and recommendations as per security assessment and penetration...
- ...strong analytical skills, a proactive approach to identifying and mitigating cyber threats, and the ability to implement and maintain security protocols that align with best practices and compliance standards. Key Responsibilities Risk Assessment and Threat...
- ...Managed IT Services company (Managed Service Provider). Since 1997 we have specialized in providing managed IT services and managed security services for our clients. which are made up of small to medium-sized enterprises. We are looking for highly passionate individuals...
- ...closely with portfolio manager, product managers, developers, and security engineers to ensure that security is embedded throughout the... ...internal and external stakeholders to align product security controls with industry and regulatory requirements. Develop policies...
- ...financial operations, ensuring users strictly follow compliance and security protocols in Remittance and Treasury. Accounting Workflows:... ...). ~ Familiarity with content management systems and version control. ~ Effective problem-solving and analytical skills. ~...
- ...~ Optimize database queries and ensure data integrity and security. # System Integration: ~ Integrate third-party services... ...JavaScript, HTML, CSS) is a plus. ~ Knowledge of version control systems, particularly Git . ~ Understanding of CI/CD...
- ...methods Implement OAuth 2.0, API keys, JWT authentication, and secure credential management Handle API rate limiting, pagination,... ...Manage environment variables, SSL/TLS certificates, and access controls Establish observability frameworks for system health and...
- ...workflows; and implement CI/CD automation and testing. Build secure, scalable cloud-based data infrastructure on AWS/GCP/Azure... ...Data Warehouse. Familiarity with security, compliance, access controls, and enterprise data governance. Exposure to data observability...
- ...structured and unstructured datasets. Build and optimize scalable, secure, and cost-efficient cloud data solutions using AWS, Azure, or... ...engineering best practices — clean code, modularity, version control, CI/CD. Document architecture, data flows, schemas, and...
- ...and AI integrations, and ensure reliability, performance, and security across all backend systems. This role requires engineers who combine... ...pipelines with automated testing, CI/CD workflows, and version control Implement data transformation logic ensuring data quality,...
- ...aspects of solution are production ready, in terms of operational, security and compliance standards. Implement monitoring and logging... ...for deployments. ~ Working knowledge of using code version control repositories like Git. ~ Knowledge of designing, developing,...
- ...with ORM concepts ~ Familiarity with Git and GitHub for version control ~ Basic knowledge of Docker and CI/CD pipelines ~... ...Exposure to cloud monitoring and logging tools ~ Understanding of secure coding practices ~ Good problem-solving communication and teamwork...
- ...adherence to engineering best practices including code reviews source control unit testing CI/CD and defect management Create and maintain... ...with Spring Frameworks including Spring Boot Spring Security and Spring Data Solid understanding of object-oriented...
30000 - 45000 PKR
...responsible for monitoring and operating the CCTV system to ensure the security and safety of property and personnel. This role involves... ...monitor all surveillance security systems/cameras within the control center. Monitor the CCTV screens to detect and prevent crime...
