Get new jobs by email
- Security Guard Department Safety and Security Entity Aga Khan Hospital, Karimabad Location Karachi, Pakistan Introduction The Aga Khan University Hospital (AKUH) is a not-for-profit healthcare institute that...
- ...seeking a Cybersecurity Analyst to monitor, analyze, and triage security alerts, ensuring a proactive defense against evolving threats... ...Develop and implement risk mitigation plans to reduce attack vectors. Security Policy & Compliance: Ensure adherence to...
- ...make a real impact in the fast-evolving world of digital banking? We’re seeking a dynamic Cybersecurity Engineer to take charge of securing our cutting-edge Digital Retail Bank (DRB) infrastructure. This role is perfect for someone who thrives on deploying state-of-the...
- ...technology and create impactful solutions that drive success for our clients. Position Overview AHOY is seeking a skilled Cyber Security Specialist to join our team. In this role, you will be responsible for safeguarding our company's information systems and...
- ...Are you an experienced cybersecurity professional eager to take on a key role in securing Digital Retail Banking (DRB) operations? We are looking for a Cybersecurity Specialist to lead the implementation and monitoring of SIEM/SOC solutions, conduct security testing...
- ...Manager Infrastructure and Information Security ~ Manager Infrastructure and Information Security Position title Manager Infrastructure and Information Security Description We are seeking an experienced and highly motivated Manager – Infrastructure and...
- ...General Manager - Security Services & Counter Gas Theft Operations JOB DETAILS: The position will be on contract, renewable based on Company’s requirement and individual’s performance. For internal candidates, age relaxation and continuity of service shall be...
- ...architecture. As a key technical leader, you will design scalable, secure, and reliable solutions, drive cloud migration, and optimize... ...mechanisms, and WebSocket-based real-time AI interactions. Optimize vector databases, embedding-based search, and AI-driven recommendation...
- ...including fine-tuning and deployment Expertise in Agentic AI, multi-agent systems, and Agentic RAG implementations Proficiency with vector databases, LangChain, LangGraph, and modern GenAI toolchains Skilled in advanced prompt engineering and Chain-of-Thought (CoT)...
- ...implementing cutting-edge AI solutions. The ideal candidate will have a minimum of 8 years of experience in AI, with a specific focus on Vector Databases and embeddings. While the primary emphasis is on these areas, there is also the opportunity to contribute to NLP, Machine...
- ...Exposure to Agentic AI , Multi-Agent Systems , RAG implementations Familiarity with LangChain , LangGraph , Vector Databases (e.g., Pinecone, FAISS) Demonstrated success in delivering at least 3+ production-grade GenAI applications...
- ...prompt engineering. Strong knowledge of Django and FastAPI. Experience with SQL and NoSQL databases (preferred). Knowledge of vector databases and embedding models. Additional Information: What do we have to offer you? Join Disrupt.com for an extraordinary...
- ...Lead sprint planning, story refinement, and prioritization in collaboration with project managers. Review and approve code for security, functionality, scalability, and adherence to team standards. Guide the team in identifying and avoiding anti-patterns; promote...
- ...and production environments. Drive automation across development, testing, and operations. Implement and enforce information security practices across the org (SSO, MFA, encryption, etc.). Coordinate audits, vulnerability scans, and business continuity planning...
- ...inventory systems, and checkout processes Implement tracking and analytics tools to monitor site performance Ensure website security and compliance with e-commerce best practices Stay updated with Shopify platform updates and new features Required...
- ...Perform day-to-day operations of the Security Operations Center (SOC), including monitoring security alerts, incidents, and events. Administer and maintain security monitoring tools, including Security Information and Event Management (SIEM), Endpoint Detection...
- ...business applications. Handle the setup and installation of VPN and NCCPL business software on external client terminals, ensuring secure connectivity through PSX LAN, fiber leased lines, or internet. Maintain accurate IT inventory records and ensure compliance...
- ...with headquarters or regional management to align local goals with broader company objectives. Maintain facility cleanliness, security, and functionality. Prepare and submit reports on sales, staffing, and operational metrics. Represent the company in...
15000 - 30000 PKR
...operations. Key Responsibilities: Support server administration tasks, including user account management, backup solutions, and security updates. Maintain accurate documentation of network configurations, server setups, and support tickets. Provide technical...- ...design) Business intelligence software MS Windows servers, MS Azure Information modeling/data contextualization Cyber security Microsoft tools (Excel, Word, Outlook, Teams, etc.) Domain experience within energy production (solar, wind, hydro, BESS, hybrid...
- ...execute corresponding actions. - Integrate AI models and agents with internal and third-party APIs, ensuring robust, scalable, and secure data exchange. - Develop and manage data pipelines to ingest, process, and clean data from various sources, including feeds...
- ...Ethical Considerations ~ Collaborate with legal and compliance teams to ensure products align with responsible AI, data privacy, and security standards. Qualifications and Skills: ~ Bachelor’s or Master’s degree in Business, Computer Science, Product Management, or...
- ...project progress. Coordinate with IT vendors, consultants, and internal teams for effective project execution. Implement IT security policies, ensuring data protection and compliance . Troubleshoot system issues and provide technical support for IT...
- ...transform, scale, and accelerate by adopting digital and exponential technologies. Our work has ranged from creating highly usable, secure digital experiences, mobile and software products, to helping businesses modernize through cloud adoption and development and the...
- ...features Monitor application performance metrics and implement optimizations to enhance system responsiveness Implement robust security measures to protect user data and prevent vulnerabilities Architect scalable backend systems with fault-tolerance and...
- ...teams and working within a matrix organization. Manage relationships with other Procurement staff remotely. Risk Management ~ Secure the supply chain through integrating a risk management approach as a foundation of Procurement mission. Evaluate and mitigate risk...
- ...expertise in product management, user experience/design, cloud architecture, software development, data insights and intelligence, cyber security, emerging tech, and quality assurance ensures that we are delivering solutions that address business needs. 10Pearls is proud to...
- ...To maintain network in optimsed targeted energy cost. To maintain accurate network database. Management of FLM and security vendors in targeted area of responsibility. Audit sites in area of responsibility to identify shortcomings and get them resolved...
- ...expertise in product management, user experience/design, cloud architecture, software development, data insights and intelligence, cyber security, emerging tech, and quality assurance ensures that we are delivering solutions that address business needs. 10Pearls is proud to...
- ...native apps , data pipelines , and AI/ML-driven platforms , ensuring they meet the highest standards of quality, performance, and security. This is a hybrid role based in Pakistan , with the exciting opportunity to engage in onsite client projects in Abu Dhabi ....