...party applications and systems, troubleshooting and resolving customerFortiNetimplementations, completing change requests, monitoring security appliances, acting upon and resolving security notifications, pro-actively improving security implementations, keeping abreast of...
...procurement, and vehicle movements and will ensure compliance with USAID mission guidance. The Vetting Officer will work closely with the security team to support all vetting processes of staff, vendors, consultants, partners, and any/all recipients of project funding. The...
USAID West Bank/Gaza Effective Management of Irrigation Water Activity Partner NGO Expression o[...]
...learning) MEL Specialist that will provide support and guidance to the implementation of activities. The Gaza office will open when the security situation stabilizes.
2.2 NGOs Implementation Approaches:
The NGOs role for EMIW project involves the following...
...program, with the purpose of soliciting proposals to award BOAs / BPAs.
• Ensure that procurement records are kept confidential and secure.
• Contribute to the preparation and maintenance of program documentation and reports, adhering to relevant regulations and...
...Greetings from Action Against Hunger ACF,Action Against Hunger ACF International is an i....
NUMARK Associates, Inc. and Energy & Security Group, LLC (ESG) has been contracted by the Uni....
Accelerate Prosperity (AP)Accelerate Prosperity inspires and facilitate.......
...UN WOMEN Jobs - 114480- Programme Associate - Livelihood and Food Security Open Accessibility menu Press the enter key to adjust the page for a screen reader
Skip to main navigation
Skip to language selector
Skip to content
Skip to footer
UNDP around...
...(or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity...
...profession design template of the profession
with the skill you need)
Knows
Practices
Proficient
Expert
Information security management
Use of the Information System
O t her professional skills – Emergency (see profession design template of the...
...operation of the Stores within budgeted expense-to-revenue ratios.
Ensures Stores are well-maintained and adhering to all safety, security, and housekeeping procedures.
Approves donated goods purchase orders, work orders, petty cash, and expense reports in...
...Assist the regional manager in acceptance testing and handover/takeover activity. Liaise with internal stakeholders for legal and security issues and escalating to the head office if issues are not resolved in the agreed time frames Assist in the installation, commissioning...
...Previous exposure to blockchain frameworks like Ethereum or Binance Smart Chain is advantageous.
Understanding of blockchain security protocols and CI/CD pipelines is a plus.
Education and Experience:
Bachelor's degree in Computer Science, Engineering, or a...
...Define the technical requirements of the app, such as the programming languages, the frameworks, the APIs, the databases, the security protocols, etc
Prepare a non-functional prototype that is in line with the following requirements; so that the client gets the...
...development;- ensuring standards for quality, customer service and health and safety are met;- resolving health and safety, legal and security issues;- responding to customer complaints and comments;- promoting the organization locally by liaising with local schools,...
...with their day to day requirements by arranging supplies, transport and other logistics for them as and when needed;
Ensuring the security of the staff and students at the school by supervising and managing their movements and travel and through effective use of the...
...Manager Operations
Monarch Security Company, Pakistan
To manage security operations in Peshawar and NWFP and head the branch of Peshawar.
Job Specification
Must be an Ex Army Officer of the rank of Capt or Major with sound proficiency in Computer, MS Office...
...Pakhtunkhwa Rural Accessibility Project an ...
Compliance Specialist Jobs professionals in Peshawar
Supply chain and Administrative professional
INUSRANCE UNDERWRITTER CUM IT/ISO COORDINATOR
To secure a role in Security and business firm.
#J-18808-Ljbffr
...Leaves unbounded and unlimited
Achieve monthly target and proceed on leave
Accommodation messing electricity all inclusive
Lab secured and protected by state police
Synthesis of salts involve complex procedures in complex lab equipments as per lab manual
Bonus...
...of Companies, Pakistan
Assist Head Administration in managing administrative team incl. Operational/ Maintenance personnels & Security staff.
Providing assistance to the Head for smooth operations.
Knowledge of dealing with Office Administrative matter i.e. general...
..., Java
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by...
...more than 10,000 passive nodes.Suitable candidate should have following
1- Understanding of ICT Infrastructure (Servers, Networks, Security etc)
2- Good understanding of enterprise IT architecture
3- Good Knowledge of Databases
4- Ability to manage ICT department...
...Representation at relevant forums
Strategy & business/proposal development
Support the Area Manager in monitoring the security situation and liaison with relevant stockholders
Donor reporting.
A. Missions / responsibilities
1. Management
1....
...developing front-end web client applications for various software platforms. A software engineer makes sure that the functionality, security and performance of the client application is as per the design and is completely bug free.
Duties & Responsibilities...
...Medical Services on any emergent medical care matters at RMI
14.Shall coordinate with Administration Department i.e. Engineering, Security, and Support Services etc. with regards to patient care and running of all Medical Units
15.Shall ensure implementation of RMI...
...viewings, and offer insights on the neighborhood, amenities, and market trends. They also assist in negotiations, helping clients secure the best possible deal and navigate through the complex paperwork involved in real estate transactions.
Real estate agents often...
...environment.
- Promote mainstreaming of Age, Gender and Diversity (AGD) across all sectors and activities such as health, safety and security, psychosocial and legal shelter, WASH, and Energy and coordinate with Programme and Protection sections to ensure that GBV risk...
...processes and also minimize any waste
Promoting and building automated processes wherever feasible
Enhance the IT infrastructure's security protocols by identifying and deploying needed cybersecurity measures by continuously conducting vulnerability assessment and risk...
...understand project requirements and translate them into high-quality, scalable PERN Stack solutions.
- Design and develop efficient, secure, and maintainable backend APIs using Node.js and Express.js.
- Create and maintain a robust database structure using PostgreSQL,...
...Configures the CMC and uses this to access content.
Adds to and changes objects in the repository.
Analyses BO Enterprise security model and creates security content such as users, groups and categories.
Maintenance of error logs and Knowledge Base.
To be...
...framework.
Collaborate closely with front-end developers to integrate user-facing elements with server-side logic.
Implement security measures and data protection protocols in applications.
Leverage ML/AI expertise to develop solutions based on data-driven...