Get new jobs by email
- ...points and verify IDs. Patrol areas to prevent theft or damage. Respond to emergencies and report incidents. Monitor CCTV and security equipment. Support junior security staff when needed. Follow all security rules and discipline. Prepare daily security...
- ...Technical/Functional Expertise (Primary) GRC (Governance, Risk & Compliance), Information Security Policies, Risk Assessment, ISO 27001:2022 Controls, Security Documentation, Audit Support Technical/Functional Expertise (Secondary) SOC Monitoring, Security Event...
- ...Job Title: Security Engineer Experience: 4–6 Years Location: Pakistan (Hybrid) Employment Type: Full-Time Job Summary We are seeking an experienced Security Engineer to design, implement, and maintain security controls across cloud and on-premises environments...
- ...transformative solutions and creating significant impact. For our clients and strategic partners. Job Description: Aqovia is seeking a Security Officer to lead and enhance our Information Security Management System (ISMS) and strengthen our global security posture. This...
- ...We are seeking a highly skilled and motivated Mid-Tier Cyber Security Consultant with 4–5 years of proven experience in Vulnerability... ...Stay updated on emerging threats, vulnerabilities, and attack vectors to enhance testing methodologies. Red Teaming: Plan and...
- ...~ Bachelors degree in Computer Science, Information Technology, or a related field. ~5+ years of hands-on experience in network security and enterprise networking environments. ~ Strong hands-on experience with BGP configuration and troubleshooting. ~ Solid understanding...
- ...Job Title: SDLC Security Operations Engineer (DevSecOps) Experience: 7–9 Years Location: Pakistan - Remote (UAE Business Hours) Employment Type: Full-Time Job Summary We are looking for a hands-on SDLC Security Operations Engineer to embed security controls...
- ...Jordan. We have offices in Riyadh, Jeddah, Madinah, Dammam, Khobar, Amman, Lahore, and Karachi. Job Brief: The Lead IT Security and Compliance Officer will establish and oversee Jeeny’s security and compliance program, ensure alignment with ISO 27001, SOC 2...
- ...Managed IT Services company (Managed Service Provider). Since 1997 we have specialized in providing managed IT services and managed security services for our clients. which are made up of small to medium-sized enterprises. We are looking for highly passionate individuals...
- ...Job Summary We are looking for an Application Security Engineer with 5 years of working experience to join our Development team and help with DevSecOps. The ideal candidate will also have a strong focus on AI Security. Job Responsibilities Threat Modeling & Risk...
- ...Job Title: Cyber Security Specialist (SOC / Incident Response) Experience: 7–9 Years Location: Pakistan (Hybrid) (UAE Business Hours) Employment Type: Full-Time Job Summary We are seeking a Cyber Security Specialist to support day-to-day cybersecurity operations...
- We are seeking a highly skilled Azure Security Engineer to design, implement, and maintain secure cloud environments across our Microsoft Azure ecosystem. The ideal candidate brings deep expertise in Azure security architecture, identity management, compliance frameworks...
- ...Job brief We are looking for a skilled Security Engineer to analyze software designs and implementations from a security perspective, and identify and resolve security issues. You will include the appropriate security analysis, defences and countermeasures at each...
- ...have the technical skills to contribute to our fast-growing business, feel free to apply! We are looking for an experienced Dev-Secure-Ops Engineer who will be responsible for: Responsibilities: # Collaborate with a cross-functional team of application developers...
- Senior Information Security Analyst page is loaded## Senior Information Security Analystlocations: Lahoretime type: Full timeposted on: Posted Yesterdayjob requisition id: JR102012**Job Overview:**As a Senior Information Security Analyst, you will play a critical role...
- A dynamic software company in Lahore seeks an experienced network administrator to maintain and optimize all network operations. You will be responsible for managing network infrastructure, ensuring consistency and stability, and providing support to team members. The ideal...
- ...support compliance requirements, specifically PCI DSS, within its FOG Software group. The ideal candidate will document and implement security policies, conduct risk assessments, and manage audits. With a minimum of 3 years' experience in information or cyber security risk...
- ...penetration testing . The ideal candidate should be able to identify security vulnerabilities, misconfigurations, and weaknesses across... ...protocols, authentication mechanisms, and common attack vectors Nice to Have Experience with Purple Team exercises...
- ...Address and solve typical enterprise GenAI challenges such as: Data security, governance, and privacy controls,Hallucination reduction and... ...~ Deep understanding of: Large language models, embeddings, vector search , ~ Deep understanding of: AG architectures and LLM...
- ...AFAC) that has uncovered more than $100M in ad fraud and national security threats, you'll have the autonomy to pursue groundbreaking... ...Augmented Generation) architectures: Design high-performance vector databases and hybrid search systems Implement advanced chunking...
- ...developing strategies for document ingestion, chunking, embedding, and vector search to ensure answers are accurate, contextual, and free... ...industries with a strong focus on compliance and data security . Success Profile In your first few months, you will have...
- ...to support GenAI use cases at scale Ensure enterprise-grade security, privacy, and compliance standards in deployments... ...OpenAI, Claude, Gemini, Mistral, or Llama2 ~ Embedding models, vector databases (FAISS, Pinecone, Weaviate, etc.) ~ Prompt engineering...
- ...models and inference trade-offs ~ Experience with embeddings, vector search, and RAG architectures ~ Experience with AWS, GCP, or... ...Implement monitoring, logging, and alerting for AI services Ensure security, data privacy, and compliance across AI pipelines Build...
- ...architecture discussions , ensuring scalability, reliability, security, and performance . Deploy AI systems on cloud platforms (... ...Research emerging AI technologies such as LLMs, multimodal AI, and vector search , and evaluate their practical applicability. Mentor...
- ...experiments, research emerging AI techniques (LLMs, RAG, multimodal AI, vector search), and apply findings to real-world use cases.... ...systems. Ensure high standards of code quality, documentation, security, and compliance throughout the AI development lifecycle....
- ...AI. Work with LLM APIs and integrate them into production-grade applications. Build and manage embedding pipelines and vector search solutions . Apply machine learning principles for model evaluation, optimization, and performance improvement....
- ...Platform (GCP) . ~ Experience with Docker, Kubernetes, and CI/CD pipelines . ~ Knowledge of Generative AI, embeddings, vector search, or LLM frameworks is a plus. ~ Strong English communication skills . Work Setup This role requires working...
- ...to-Have (Strong Bonuses) Engineering Drawings Domain Experience with engineering drawings and technical documents PDF vector vs raster workflows, line detection, symbol detection Table/diagram understanding, CAD-like concepts, annotation workflows...Remote job
- ...This role requires strong problem-solving skills, practical experience with modern AI frameworks, and the ability to integrate APIs, vector databases, and external tools to build scalable and reliable AI systems. QUALIFICATIONS, SKILLS, AND EXPERIENCE: ~3-4 years...
- ...capabilities on top of xquic content including voice interactions. - Optimize reasoning and retrieval pipelines using embeddings, vector databases, and prompt engineering. - Develop, train, and fine-tune ML models using frameworks like PyTorch, TensorFlow, or scikit...
