...records are audit ready, establish cost and fiscal controls and enforce stringent international financial & auditing standards that... ...out of project activities and ensure complete documentation is secured Other related duties as assigned.
Qualifications
Minimum...
...Health Service, using the full range of IS available.
To act, advise on and where appropriate, take appropriate and proportionate enforcement action across the full range of Port health issues, planning and undertaking appropriate inspections, other forms of intervention...
...false,"onboarding_v2":false,"limit_onboarding_to_hired_candidates":false,"personal_details_auto_update":true,"group_assessments":true,"enforce_all_offer_fields_required":false,"resume_parsing":true,"custom_job_posting_locations":false,"offer_splitting":false,"indeed_locale_...
...We are currently looking for a Trading Standards Enforcement Officer to join the Trading Standards team of a south Wales local authority.
The role involves responding to and investigating instances of breaches of a wide variety of trading standards legislation. This...
....
consistent with the ‘Principal Responsibilities of the Job’.
Person Specification
Experience of working in a relevant enforcement or intelligence environment
Will have delivered projects at a local or regional level.
Experience of collaboration between...
...for the project and assist with production of reports as required.
Person Specification
Experience of working in a relevant enforcement or intelligence environment
Will have delivered projects at a local or regional level.
Experience of collaboration between...
...exposures, with recommendations and guidance to management, based on internal expertise and best practices Identify, gain access and secure any necessary devices or systems to be examined; Reconstruct damaged hardware, if necessary; Copy or use other means to ensure data...
...and reliable communication solutions to our customers.
We are seeking a highly skilled and experienced Director of IT and Cyber Security to join our team. The successful candidate will be responsible for overseeing all aspects of our company's IT infrastructure,...
...survivors are prioritized as per the survivor-centred approach.
- Enforce compliance with, and integrity of, all protection standard... ...The Senior GBV Associate will also support the operation in securing solutions for GBV survivors through comprehensive case management...
...the efficiency of operations.
Responsible to conduct or (as directed) technical – administrative investigations e.g. breach of security, violation of Indus code of conduct and to ensure that investigations are carried out impartial manner.
Responsible to develop...
...efficient deliveries to the marketplace; fleet management; administrative matters as regards coordination, personnel management, security management, etc.
Key Job Responsibilities:
Warehousing Management
Inventory Management
Regulatory Affairs and other Regulations...
...technology equipment and services, negotiating with vendors and contractors to achieve favorable terms.
Regulatory Compliance and Security:
Ensure all technology operations and infrastructure comply with relevant laws, regulations, and industry standards....
..., and staff to define the organization's vision and direction. You will be responsible for planning and implementing strategies to secure donors and contributions in support of the organization, provide oversight of the fund development program, monitor development activities...
...Development and Localization of raw material.
# Administer Quality Assurance.
# Take appropriate measures for Quality Assurance enforcement e.g. stoppage of work till effective corrective measures are taken/advised.
# To release or hold the deliveries.
# Call...
...activity so that they have better chances to earn higher incomes, have increased access and control over resources and have greater security and protection from violence.
Duties and Responsibilities
Immediate Objective
Under the guidance and direct supervision...
...unaccompanied and separated children and referral of children to ICRC or other relevant partners for establishment of family linkages.
- Enforce compliance of staff and implementing partners with global protection policies and standards of professional integrity in the...
...RESPONSIBILITIES, AND EXPECTATIONS:
Project Coordination and Analyses.
Mapping.
Records Management.
Complete monthly safety and security requirements assigned by corporate departments.
Attend all other required training and program change updates that affect the...
...daily reports and log sheets of the activit(ies) undertaken
• Repatriation data records and electronic databases are up to date and securely maintained, in line with the applicable SOPs.
• Repatriating refugees are facilitated and assisted to return in safety and with...
...(or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity...
...Experience troubleshooting WordPress and hosting issues
Experience creating custom WordPress themes and plugins
WooCommerce experience
Hands on experience with website speed optimization, security optimization, and on-page SEO
Why waiting? Apply NOW #J-18808-Ljbffr
...safety program ensuring timely recordkeeping, reporting, and training.
Administration
Responsible for the organization, security, confidentiality, and retention of office files.
Coordinates travel arrangements (hotels, conferences) for business related events...
...Position:
Quetta is provincial capital of Baluchistan which is constantly exposed to risks of complex emergencies due to the volatile security situation, the protracted refugee situation, weather and the political and general situation in Afghanistan. There are more than...
...with Ruby or Python, we’d like to meet you.
Ultimately, you will execute and automate operational processes fast, accurately and securely.
Responsibilities
Implement integrations requested by customers
Deploy updates and fixes
Provide Level 2 technical support...
...maintaining and running its own accommodation unit for the past decades. The need for such an arrangement is continuous given the security restrictions, as well as staff welfare. The International Staff Accommodation is managed in accordance with UNHCR Guidelines for accommodation...
...being implemented by the EVAW Unit in Balochistan
Support the strategy development for strengthening RoL institutions and justice/ security sector stakeholders in Balochistan.
Support the Head of the Sub-office in implementing the ROL work Plan within given timelines...
...framework.
Collaborate closely with front-end developers to integrate user-facing elements with server-side logic.
Implement security measures and data protection protocols in applications.
Leverage ML/AI expertise to develop solutions based on data-driven...
...Configures the CMC and uses this to access content.
Adds to and changes objects in the repository.
Analyses BO Enterprise security model and creates security content such as users, groups and categories.
Maintenance of error logs and Knowledge Base.
To be...
...processes and also minimize any waste
Promoting and building automated processes wherever feasible
Enhance the IT infrastructure's security protocols by identifying and deploying needed cybersecurity measures by continuously conducting vulnerability assessment and risk...
...understand project requirements and translate them into high-quality, scalable PERN Stack solutions.
- Design and develop efficient, secure, and maintainable backend APIs using Node.js and Express.js.
- Create and maintain a robust database structure using PostgreSQL,...