Get new jobs by email
- ...who can bridge modern AI capabilities with structured enterprise application behavior, ensuring that AI interactions are reliable, secure, tenant-aware, role-aware, and deeply aligned with platform business rules. Key Responsibilities AI Copilot Architecture and...
- ...The Bank seeks a highly experienced Information Security Head to lead its cybersecurity initiatives and safeguard the organization's information assets. This leadership role requires a strategic thinker with a strong background in information security management, governance...
- .... This role involves building scalable, high-performance web applications and integrating them with cloud services, AI APIs, and secure identity systems. You will collaborate with cross-functional teams to deliver modern, user-centric digital solutions. Key Responsibilities...
- ...Our client Spark AI is looking for Endpoint Security Engineer in Lahore. Job Description: We are seeking a skilled and proactive Endpoint Security Engineer to safeguard the organization's endpoint devices, including desktops, laptops, servers, and mobile devices...
- ...Job Title: Security Engineer Experience: 4–6 Years Location: Pakistan (Hybrid) Employment Type: Full-Time Job Summary We are seeking an experienced Security Engineer to design, implement, and maintain security controls across cloud and on-premises environments...
- ...Produce reports and statistics, as required Ensure the follow up of store activities against receipt, storage of materials as per plan. To maintain safety/Security of materials in warehouse Maintaining stock and storing and handling it properly #J-18808-Ljbffr...
- ...The Maintenance technician is responsible for supporting the Facilities Manager by ensuring the maintenance, repair, safety, and security of all school district buildings and grounds. This role includes performing hands‑on maintenance tasks, overseeing contractors and...
80000 - 100000 PKR
...and other tools to meet specific business needs. Role-Based Permissions: Set and enforce role-based permissions to ensure data security and compliance. Qualifications A minimum of 2 years of experience in managing Bitrix, with demonstrable expertise in...- ...as employment contracts, warning letters, show‑cause notices, and experience letters. Ensure proper filing, confidentiality, and secure maintenance of employee records in line with company policies and data privacy requirements. Track employee probation periods...
- ...Agents business unit, focused on building AI Agent platforms and solutions to solve critical pain-points in Customer Experience - securely, responsibly, and at scale. Role Overview As an AI Engineer, you will be responsible for designing, building, and deploying...
- ...sensitivity and community engagement AI & Computer Skills MS Office (advanced documentation and reporting) Data protection and secure digital record keeping Basic AI tools for report drafting, risk analysis, and training material development Use of digital...
- ...Key Responsibilities: Develop and implement information security policies and procedures. Conduct regular risk assessments and vulnerability assessments. Monitor and respond to security incidents and breaches. Manage and maintain security tools and technologies...
- ...competitor activities. Lead participation in international trade fairs, exhibitions, and buyer meetings, representing the company and securing business opportunities. Coordinate with the production and design teams to ensure product development aligns with market needs...
- ...Python, or PHP. Collaborate with UI/UX designers to translate wireframes into code. Maintain code quality, performance, and security best practices. Participate in code reviews and testing. Also Required: ~ Bachelor's degree in Computer Science or Software...
- ...instructional and operational systems Monitor and report on system performance and usage metrics 5. Data Management, Privacy, and Security Establish and maintain systems for data collection, analysis, and reporting Ensure compliance with all applicable data...
- ...: Degree in Computer Science, Information Technology, or a related field (preferred). Knowledge of operating systems (Windows, macOS, Linux) and common software applications. Familiarity with network infrastructure and security principles. #J-18808-Ljbffr...
- ...standards for healthcare data interoperability, which is a must. Adhere to HIPAA coding standards to maintain data privacy and security. Utilize AWS and cloud storage services for scalable and reliable data management. Implement external open-source APIs, webhooks...
- ...will be responsible for the complete solution development cycle, including pre-sales support, developing conceptual designs for OT security for customers, supporting proof of concepts, requirement gathering, final solution design, proposal development, and delivery. The...
- ...Lead and direct all security, investigative, loss prevention, and risk management activities Supervise security staff Oversee all security operations, including emergency response, property protection, and business continuity Develop and oversee a comprehensive...
- ...Managed IT Services company (Managed Service Provider). Since 1997 we have specialized in providing managed IT services and managed security services for our clients. which are made up of small to medium-sized enterprises. We are looking for highly passionate individuals...
- ...Technical/Functional Expertise (Primary) GRC (Governance, Risk & Compliance) Information Security Policies Risk Assessment ISO 27001:2022 Controls Security Documentation Audit Support Technical/Functional Expertise (Secondary) SOC Monitoring Security...
- ...Charge Nurse Jobs 2025 – Apply Online for 3599 Posts In this position, you will be a female nursing professional looking for a secure government job in Punjab through the Punjab Public Service Commission (PPSC), which has announced 3599 vacancies for the role of Charge...
- ...Job Title: SDLC Security Operations Engineer (DevSecOps) Experience: 7–9 Years Location: Pakistan - Remote (UAE Business Hours) Employment Type: Full-Time Job Summary We are looking for a hands-on SDLC Security Operations Engineer to embed security controls...
- A leading industrial automation firm in Pakistan is seeking an OT Cybersecurity Solutions Engineer. The role involves developing security solutions, preparing proposals, and collaborating with various teams to deliver effective cybersecurity strategies. Ideal candidates...
- Senior Information Security Analyst page is loaded## Senior Information Security Analystlocations: Lahoretime type: Full timeposted on: Posted Yesterdayjob requisition id: JR102012**Job Overview:**As a Senior Information Security Analyst, you will play a critical role...
- ...We are seeking a highly skilled and motivated Mid-Tier Cyber Security Consultant with 4–5 years of proven experience in Vulnerability Assessment and Penetration Testing (VAPT), client handling, and red teaming. The ideal candidate will be a self-motivated professional...
- ...Job brief We are looking for a skilled Security Engineer to analyze software designs and implementations from a security perspective, and identify and resolve security issues. You will include the appropriate security analysis, defences and countermeasures at each...
- ...Job Title: Cyber Security Specialist (SOC / Incident Response) Experience: 7–9 Years Location: Pakistan (Hybrid) (UAE Business Hours) Employment Type: Full-Time Job Summary We are seeking a Cyber Security Specialist to support day-to-day cybersecurity operations...
- **About the Role** We are looking for a skilled and motivated Security Engineer to join our team. In this role, you will be a key point of contact for IT administration and security operations across the business, helping to ensure our systems, tools, and people are well...
- We are seeking a highly skilled Azure Security Engineer to design, implement, and maintain secure cloud environments across our Microsoft Azure ecosystem. The ideal candidate brings deep expertise in Azure security architecture, identity management, compliance frameworks...
