Search Results: 18 vacancies
...Position Title: Junior Cybersecurity Engineer - Application Security
Location: Lahore / Kharian
Position Type: Full-Time
About Us:
ACE Money Transfer is a UK-based company headquartered in Manchester, United Kingdom. The company is an online remittance...
...Position Title: Junior Security Operations Centre (SOC) Analyst
Location: Lahore / Kharian
Position Type: Full-Time
About Us:
ACE Money Transfer is a UK-based company headquartered in Manchester, United Kingdom. The company is an online remittance service...
...Monitoring and Logging: Implement and manage monitoring solutions and centralized logging systems to ensure the health, performance, and security of infrastructure and applications.
# Collaboration with Development Teams: Collaborate closely with development teams to...
...constantly
~ demonstrated success in starting and leading initiatives, working under uncertainty & able to articulating a vision, and securing buy-in from stakeholders
~ excellent interpersonal skills and communication skills.
~ strong analytical and critical thinking...
...Identify and mitigate potential risks associated with business processes.
Implement controls to enhance process reliability and security.
Requirements:
Education:
Bachelor’s degree in business administration or a related field.
Certification:
Six Sigma...
...WordPress
Familiar with at least one eCommerce tool: WooCommerce
A solid understanding of how web applications work including security, session management, and best development practices
Adequate knowledge of relational database systems, Object Oriented...
...Build and maintain RESTful APIs for communication with front-end and mobile applications.
Implement API authentication and security measures.
Testing and Debugging:
Write unit tests and perform debugging to ensure the reliability and robustness of code....
...application with all required documents within the specified time frame. Ensure accuracy and completeness to avoid delays.
Medical and Security Clearance: Undergo a medical examination and obtain a police clearance certificate to demonstrate that you are admissible to...
...Partners for the betterment of services
Efficient handling of disputed matters in case of escalations from concerned stakeholders.
Secure necessary approvals regarding all the necessary items such as KYB, Contracts, Feasibility, Addendum, etc., following the...
...years' experience in Automation Testing for Web application, Mobile applications, Restful API, Load Testing, Performance Testing, Security Testing etc.
# Knowledge of basic testing methodologies.
# Experience with Java or C# is a plus
# Extensive experience in Selenium...
...processes.
Performance Testing: Assist in performance testing activities to assess software scalability and responsiveness.
Security Testing: Participate in security testing efforts to identify vulnerabilities and ensure data protection.
Collaboration:...
...related to Microsoft 365 applications.
- Maintain and update Active Directory infrastructure.
- Create and manage user accounts, security groups, and organizational units.
- Configure and manage firewall settings to ensure network security.
- Monitor firewall logs...
...activities, quality implementation and robust monitoring on the ground.
Enable convergence of various state initiatives (social security, livelihood promotion, financial inclusion, social empowerment) and programs towards creating increased access for the identified...
...differently about the energy transition.
Drawing on more than 55 years’ experience in highly regulated sectors subject to strict security and safety requirements, we provide our customers with engineering and project management services, as well as digital services...
...Departments of ACE Money Transfer
Departments:
Accounts & Finance - Human Resources - Quality Assurance - Network Support & Security --Relationship & Development – Customer Excellence Department - Compliance – Creative & Design - Product & Sales...
...development such as market analysis in line with competitors, banks, FX traders, legal consultants, regulators, and internal projects.
Secure necessary approvals regarding all the necessary items such as KYB, Contracts, Feasibility, Addendum, etc., following the...
...value from data pipeline solutions.
· Develop proofs of concept (POC) as needed
· Validate application code against unit tests, security tests, and profiling tools
· Assist in identifying, troubleshooting, and resolving defects encountered during various stages of...
...restorations, and recovers corrupted databases.
Evaluates and recommends new database technologies.
Implements and maintains database security and encryption.
Develops, manages and tests database and information system backup and recovery plans.
Develops standards...