Get new jobs by email
- ...Scope Under the direct supervision [1] of the [Chief of Mission (COM), Head of Office (HoO), where there is no presence of a Security Professional such as a Field Security Officer (FSO) or Field Security Support Officer (FSSO)], or the [Field Security Officer (FSO...
- ...Segment opportunities in C4C • Handling Corporate Affairs Matters including relevant correspondence with customers, assisting in • security clearance of the firm/ employees, interaction with military personnel etc. • Managing and controlling the internal process of...
- ...Job Title: SDLC Security Operations Engineer (DevSecOps) Experience: 7–9 Years Location: Pakistan - Remote (UAE Business Hours) Employment Type: Full-Time Job Summary We are looking for a hands-on SDLC Security Operations Engineer to embed security controls...
- ...Job Title: Security Engineer Experience: 4–6 Years Location: Pakistan (Hybrid) Employment Type: Full-Time Job Summary We are seeking an experienced Security Engineer to design, implement, and maintain security controls across cloud and on-premises environments...
- ...Job Title: Cyber Security Specialist (SOC / Incident Response) Experience: 7–9 Years Location: Pakistan (Hybrid) (UAE Business Hours) Employment Type: Full-Time Job Summary We are seeking a Cyber Security Specialist to support day-to-day cybersecurity operations...
- ...budgets, ensuring efficient allocation and cost control. Maintain relationships with media vendors, platforms, and partners to secure competitive rates and added value. Prepare regular reports on campaign performance, insights, and recommendations for improvement...
- ...decision-making, advanced analytics, and AI capabilities within a banking environment while ensuring compliance with regulatory and security standards. Key Responsibilities Design and implement enterprise data architecture across traditional systems, Big Data...
- ...Continuously learn and adapt to emerging technologies and best practices in AI, GIS, and data analytics. Ensure compliance with data security policies and maintain high standards of data integrity across all AI pipeline operations. What you’ll bring along: ~ Bachelor...
- ...This role requires strong expertise across Azure, Microsoft 365, Windows Server, and virtualization technologies, with a focus on secure, scalable, and reliable client solutions. Responsibilities: Collaborate with clients to assess infrastructure needs and design...
- ...Management ~ Oversee cash flow forecasting, bank reconciliations, and capital call processes. ~ Manage owner distributions, security deposits, and loan draw schedules. ~ Support annual budgeting and provide ongoing budget‑to‑actual variance monitoring....Remote job
- ...Ownership of AI Delivery from Ideation till production. Management of stakeholders across the organization including Data governance, Security, and country business teams.document the engineering best practices. Running the daily/weekly/monthly delivery ceremonies...
- .... ~ Develop and maintain APIs and microservices using RESTful APIs, GraphQL, and other relevant technologies. ~ Implement security and compliance measures to ensure the confidentiality, integrity, and availability of customer data. ~ Test and debug code to...
- ...metrics. Media Relations Cultivate and maintain relationships with media outlets, journalists, and key influencers to secure coverage in relevant publications, both online and offline. Develop press releases, media pitches, and other materials to...
- ...management, scalability, and performance Technical Governance & Quality Ensure architectural designs align with industry standards, security requirements, and scalability goals Provide high-level design documentation, reference architectures, and technical blueprints...
- ...expertise in product management, user experience/design, cloud architecture, software development, data insights and intelligence, cyber security, emerging tech, and quality assurance ensures that we are delivering solutions that address business needs. 10Pearls is proud to...
- ...Resolution Address expert queries regarding onboarding, payments, and project processes in a timely manner. Compliance & Information Security Ensure Compliance with internal policies & information security standards throughout project execution. Qualifications &...
- ...statutory registers and compliance calendars under the NAFSA Act, 2026 and notified rules/regulations. The position also establishes secure digital and physical record management for governance documentation, ensuring confidentiality, transparency and auditability....
- ...infrastructure team, responsible for the lifecycle management of all endpoint devices across the organization. This role bridges security, operations, and automation — ensuring that every managed device remains compliant, current, and performing at its best. The ideal...
- ...transform, scale, and accelerate by adopting digital and exponential technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses modernize through cloud adoption and development and the...
- ...Cursor or AntiGravity. Experience in managing complex products in government or public-sector environments. Familiarity with secure cloud-based infrastructures, testing platforms, and large-scale data systems. Experience with integrating biometric and face recognition...
- ...digital news platform committed to delivering accurate, timely, and insightful coverage on geopolitics, international relations, and security affairs. With a strong and expanding presence across web and social media, WE News promotes credible journalism, balanced...
- ...Oversee end-to-end IT and network service delivery in line with agreed SLAs and KPIs. Ensure availability, performance, and security of IT systems and network infrastructure. Implement ITIL-based processes including Incident, Problem, Change, and Service Request...
- ..., Functions, etc.). Optimize performance, latency, and cost of LLM-based applications. Ensure data quality, governance, and security in AI workflows. Collaborate with data engineering and platform teams. Requirements Strong expertise in Python programming...
- ...execution, and successful completion of production jobs; · Sets up and configures desktop computers, peripherals and accounts assigning security level; · Installs software and installs and repairs hardware and peripherals; · Tests programs; · Troubleshoots, diagnoses...
- ...Description: The Security Analyst I role is a critical position within the organization. The primary function of the role will be to provide monitoring of deployed customer environments for security events. This includes establishing the extent of a threat, the business...
- ...documented code. Troubleshoot, debug, and optimize application performance. Participate in code reviews and follow best practices for secure and scalable development. Support deployment processes and work with CI/CD pipelines. Contribute to system design discussions...
- ...patching operations and endpoint management . This role will work closely with existing team members to ensure endpoint devices are secure, compliant, and operationally healthy across the organization. The ideal candidate will be hands‑on, ticket‑driven, and...
- ...maintainability. Contribute to the evaluation and adoption of new technologies and tools that improve development efficiency. Ensure security and data protection best practices are applied throughout the development lifecycle. Maintain clear and effective communication...
- ...facilities matters. Support estate and facilities coordination including utilities monitoring, maintenance follow-ups, vendor liaison (security, janitorial, maintenance), and service tracking logs. Maintain administrative registers including service contracts,...
- ...infrastructure that powers Ruby AI's products. You'll work closely with backend, frontend, and AI engineering teams to build reliable, secure, and scalable systems. This is a hands-on role where you'll set up infrastructure from the ground up, establish CI/CD practices,...