...The Aga Khan University Hospital in addition to its five Hospitals creates access through its Outreach Services which include Clinical Laboratories, Outpatient Medical Centres, Pharmacy services, Home Health and other services. Outreach Services are designed to provide...
...operations related to employee’s attendance, leaves, provident fund, promotions, transfers, grievances, employee’s record etc.
Qualifications
Education: University degree (Master or Bachelor).
Experience: At least 2-4 years of relevant experience.
#J-18808-Ljbffr
...monitoring the progress and performance of the department.
Requirements
An advanced degree in a relevant field from an accredited university is preferred.
Project Management Certification preferred.
Leadership and business management skills.
Be thorough and...
...programming language (PHP)
~ Solid knowledge of HTML/CSS
~ Experience with mockup and UI prototyping tools
~ Understanding of security practices
~ Familiarity with network diagnostics tools
~ Team management skills
~ BSc/MSc in Computer Science or...
...devices.
Conduct comprehensive code reviews to maintain code quality, adherence to coding standards, and ensure scalability and security.
Stay up to date with the latest trends, tools, and technologies in WordPress development and share knowledge with the team....
...effective selling techniques and educate them about product qualities & distinctions
Penetrate in markets of designated regions to secure additional sales while improving overall effectiveness
Ensure Franchisee does not violate company policy otherwise inform...
...(or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity...
...within the existing PMIS.
c) Utilize the existing project management database as a foundation for the new system.
Ensure data security, integrity, and accessibility of the system.
For more details see the attached ToRs....
Apply By:
Interested candidates...
...Participates in the design and development of various aspects of BO universes.
Analyses BO Enterprise architecture.
Configures the CMC... ...changes objects in the repository.
Analyses BO Enterprise security model and creates security content such as users, groups and...
...Excellent Industry exposure and understanding of the footwear wholesale and distribution network.
Bachelors/Masters from a renowned university.
Should have local knowledge of major players in the footwear market in main cities.
Proficient user of Microsoft Office....
...and maintaining data storage and processing systems, such as databases, data warehouses, and data lakes
Ensuring data is properly secured and protected
Developing and implementing data governance policies and procedures
Collaborating with business analysts, data...
...potential customers for sale of ICT products, solutions, and services. e.g. Managed WiFi, Managed SDWAN, Managed Surveillance, Cyber Security, Cloud, SaaS/PaaS and MS Licensees
Understand and analyze client’s business processes to advise on how they can improve...
...and safeguard organizational reputation.
Implement robust measures for fraud prevention, inventory management, and operational security within the region.
Qualifications and Skills:
Bachelor’s degree in business administration, Marketing, or a related field....
...within group to automate information
delivery, minimize paperwork, accessibility of data with reliability confidentiality, and securely for
enhancement of time and cost efficiencies within the companies and at group level.
Atlas IT Resource Center is constantly...
...logic; ensuring high performance, testability, and responsiveness to requests from the front-end, and implement software development security best practices, working under minimal direction.
Requirements:
~2-3 years or above years of web development experience
~...
30000 - 35000 PKR
...insurance, retirement plans, and leave management.
Maintain accurate and up-to-date employee records, ensuring confidentiality and security of sensitive information.
Process employee documentation such as contracts, agreements, and disciplinary actions.
Manage...
...Solid knowledge of SQL and scripting.
Experience working in an Agile/Scrum development process.
Experience with performance and security testing is a plus.
BS/MS degree in Computer Science, Engineering, or a related subject.
At Least 2 years of experience in...
...outgoing mails in a timely manner in JBL/JBS/MBL
Maintaining updated information of branch asset management ( fixed Assets)
Security and Safety.
Access door/HVAC/Plumbing/Electric/carpentering issues
Maintain/ensure to arrange Nestle water.
Ensure safe and...
...engage their audiences and achieve their goals.
Job Description:
Develop and implement sales strategies to generate leads and secure new clients for our media production and advertising services.
Conduct in-depth client consultations to understand their needs...
...framework.
Collaborate closely with front-end developers to integrate user-facing elements with server-side logic.
Implement security measures and data protection protocols in applications.
Leverage ML/AI expertise to develop solutions based on data-driven...
...processes and also minimize any waste
Promoting and building automated processes wherever feasible
Enhance the IT infrastructure's security protocols by identifying and deploying needed cybersecurity measures by continuously conducting vulnerability assessment and risk...
...understand project requirements and translate them into high-quality, scalable PERN Stack solutions.
- Design and develop efficient, secure, and maintainable backend APIs using Node.js and Express.js.
- Create and maintain a robust database structure using PostgreSQL,...