Search Results: 14 vacancies
...increased access and control over resources and have greater security and protection from violence.
Duties and Responsibilities... ...required to (i) Present a verification/certification letter from the university verifying the degree & student enrollment, or (ii) Foreign...
...education is required, preferably supplemented by technical or university courses related to the organization's work.
~A minimum of 5... ...arrangements, childcare room, family support, policies & initiatives, security etc.
~UNICEF strongly encourages the use of flexible working...
...increase unique customers through rigorous penetration.
To optimize and increase per day sales productivity
To ensure aggressive penetration throughout entire coverage universe.
To ensure achievement of monthly sales targets and quarterly targets.
#J-18808-Ljbffr
...Participates in the design and development of various aspects of BO universes.
Analyses BO Enterprise architecture.
Configures the CMC... ...changes objects in the repository.
Analyses BO Enterprise security model and creates security content such as users, groups and...
...responsibility and truthfulness are some of the other qualities that we expect from you.
B.Sc/M.Sc or BBA/MBA from a reputable university will be an added plus.
Why join Jazz?
As one of the leading employers in the country, Jazz epitomizes the philosophy that...
...optimize and increase unique customers through rigorous penetration
- To ensure aggressive penetration through the entire coverage universe
- To ensure achievement of monthly sales target and quarterly targets
- To root cause the issues pertaining to the same market...
...Junior/Assistant Manager Sales
Oxford University Press Pakistan, Pakistan
A Junior/Assistant Manager Sales is required in Quetta. The position involves executing sales strategies
Job Specification
~ Preferably a Bachelor's/Master's degree from a reputable institution...
...(or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity...
...Position:
Quetta is provincial capital of Baluchistan which is constantly exposed to risks of complex emergencies due to the volatile security situation, the protracted refugee situation, weather and the political and general situation in Afghanistan. There are more than...
...child protection, education, livelihoods, health, energy and health).
The Senior GBV Associate will also support the operation in securing solutions for GBV survivors through comprehensive case management. Therefore, experience working with GBV survivors is essential....
...maintaining and running its own accommodation unit for the past decades. The need for such an arrangement is continuous given the security restrictions, as well as staff welfare. The International Staff Accommodation is managed in accordance with UNHCR Guidelines for accommodation...
...framework.
Collaborate closely with front-end developers to integrate user-facing elements with server-side logic.
Implement security measures and data protection protocols in applications.
Leverage ML/AI expertise to develop solutions based on data-driven...
...processes and also minimize any waste
Promoting and building automated processes wherever feasible
Enhance the IT infrastructure's security protocols by identifying and deploying needed cybersecurity measures by continuously conducting vulnerability assessment and risk...
...understand project requirements and translate them into high-quality, scalable PERN Stack solutions.
- Design and develop efficient, secure, and maintainable backend APIs using Node.js and Express.js.
- Create and maintain a robust database structure using PostgreSQL,...