Get new jobs by email
- ...Segment opportunities in C4C • Handling Corporate Affairs Matters including relevant correspondence with customers, assisting in • security clearance of the firm/ employees, interaction with military personnel etc. • Managing and controlling the internal process of...
- ...Job Title: Security Engineer Experience: 4–6 Years Location: Pakistan (Hybrid) Employment Type: Full-Time Job Summary We are seeking an experienced Security Engineer to design, implement, and maintain security controls across cloud and on-premises environments...
- ...Scope Under the direct supervision [1] of the [Chief of Mission (COM), Head of Office (HoO), where there is no presence of a Security Professional such as a Field Security Officer (FSO) or Field Security Support Officer (FSSO)], or the [Field Security Officer (FSO...
- ...Job Title: Cyber Security Specialist (SOC / Incident Response) Experience: 7–9 Years Location: Pakistan (Hybrid) (UAE Business Hours) Employment Type: Full-Time Job Summary We are seeking a Cyber Security Specialist to support day-to-day cybersecurity operations...
- ...Job Title: SDLC Security Operations Engineer (DevSecOps) Experience: 7–9 Years Location: Pakistan - Remote (UAE Business Hours) Employment Type: Full-Time Job Summary We are looking for a hands-on SDLC Security Operations Engineer to embed security controls...
- ...backend, frontend, and AI engineering teams to build reliable, secure, and scalable systems. This is a hands-on role where you'll set... ..., Python) Nice to Have Experience with pgvector or vector database operations for AI/ML workloads. Familiarity with LLM...
- ...(FastAPI/Flask). Design and manage embedding pipelines and vector search systems. Integrate AI solutions with Azure services (... ...LLM-based applications. Ensure data quality, governance, and security in AI workflows. Collaborate with data engineering and platform...
- ...to identify AI automation opportunities. Ensure scalability, security, and performance of AI systems in production. Continuously... ...CrewAI, or similar. ~ Experience with RAG architectures , vector databases, and embeddings. ~ Familiarity with OpenAI, open-source...
- ...ML model outputs (forecasting, pricing, inventory). Develop secure integration endpoints for external systems (POS, ERP, e-commerce... ...-commerce, or SaaS product integrations . Familiarity with vector databases (Pinecone, Weaviate, or ChromaDB) and embedding-...
- ...to support GenAI use cases at scale Ensure enterprise-grade security, privacy, and compliance standards in deployments... ...OpenAI, Claude, Gemini, Mistral, or Llama2 ~ Embedding models, vector databases (FAISS, Pinecone, Weaviate, etc.) ~ Prompt engineering...
- ...Responsibilities Design and implement advanced Retrieval-Augmented Generation (RAG) systems with sophisticated chunking strategies, multi-vector retrieval, and hybrid search architectures Develop and optimize conversational AI agents with complex multi-turn dialogue...
- ...trigger logic and cost controls Generate and manage semantic embeddings via Amazon Bedrock (Titan v2), index them in MongoDB Atlas Vector Search, and calibrate similarity thresholds to ensure match accuracy Build and maintain a knowledge graph linking jobs, courses,...
- ...and Google ADK , including tool calling and structured outputs. Retrieval & Knowledge Systems: Implement RAG pipelines using vector databases and search technologies (e.g., Pinecone, Elasticsearch, pgvector ) and graph databases when appropriate. Prototype →...
- ...enhance model reliability. Utilize Retrieval-Augmented Generation (RAG) techniques to improve AI response quality. Work with vector databases, specifically PostgreSQL with pgvector, for efficient similarity search and information retrieval in AI applications....
- ...action, observation) to create high-quality datasets for fine-tuning. Manage RAG Systems: Implement and optimize RAG pipelines using vector databases and code-specific embedding models (e.g., GraphCodeBert) for knowledge retrieval. Design Sandboxed Environments:...
- ...capabilities on top of xquic content including voice interactions. - Optimize reasoning and retrieval pipelines using embeddings, vector databases, and prompt engineering. - Develop, train, and fine-tune ML models using frameworks like PyTorch, TensorFlow, or scikit...
- ...Ownership of AI Delivery from Ideation till production. Management of stakeholders across the organization including Data governance, Security, and country business teams.document the engineering best practices. Running the daily/weekly/monthly delivery ceremonies...
- ...flow. Develop real-time features like order status updates and fulfillment tracking using WebSockets or Socket.IO. Implement secure authentication, session management, and role-based access control (RBAC) for operational and admin users. Collaborate with cross...
- ...statutory registers and compliance calendars under the NAFSA Act, 2026 and notified rules/regulations. The position also establishes secure digital and physical record management for governance documentation, ensuring confidentiality, transparency and auditability....
- ...infrastructure team, responsible for the lifecycle management of all endpoint devices across the organization. This role bridges security, operations, and automation — ensuring that every managed device remains compliant, current, and performing at its best. The ideal...
- ...transform, scale, and accelerate by adopting digital and exponential technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses modernize through cloud adoption and development and the...
- ...patching operations and endpoint management . This role will work closely with existing team members to ensure endpoint devices are secure, compliant, and operationally healthy across the organization. The ideal candidate will be hands‑on, ticket‑driven, and...
- ...management, scalability, and performance Technical Governance & Quality Ensure architectural designs align with industry standards, security requirements, and scalability goals Provide high-level design documentation, reference architectures, and technical blueprints...
- ...Resolution Address expert queries regarding onboarding, payments, and project processes in a timely manner. Compliance & Information Security Ensure Compliance with internal policies & information security standards throughout project execution. Qualifications &...
- ...About World Business Lenders ( At World Business Lenders (WBL), we're dedicated to offering flexible, short-term commercial loans secured by real estate, catering to a diverse clientele of small and medium-sized businesses across the United States that often find...
- ...Every minute of every day, Smiths Detection’s threat detection and security screening technology helps to protect people and infrastructure, making the world a safer place. Smiths Detection, part of Smiths Group is a global leader in the development, manufacture...
- ...plans to new, standardized service offerings. This role involves both documentation enhancements and tool rollout , including security platform deployment, workstation build process updates, and onboarding/offboarding checklist improvements. The specialist will...
- ...facilities matters. Support estate and facilities coordination including utilities monitoring, maintenance follow-ups, vendor liaison (security, janitorial, maintenance), and service tracking logs. Maintain administrative registers including service contracts,...
- ...transform, scale, and accelerate by adopting digital and exponential technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses modernize through cloud adoption and development and the...
- ...digital news platform committed to delivering accurate, timely, and insightful coverage on geopolitics, international relations, and security affairs. With a strong and expanding presence across web and social media, WE News promotes credible journalism, balanced...